Security Tools Cheat Sheet
Muhammad Zayan’s Post
More Relevant Posts
-
Best Password Cracking Tools-for learning about application security https://lnkd.in/euWqDk-k https://lnkd.in/eEPMCpyh
To view or add a comment, sign in
-
Passing along! Here is a chart of popular security tools. There is a lot to learn. 🛠️ 🧰
Popular Security Tools
To view or add a comment, sign in
-
Fascinating and so simply put.
Popular Security Tools
To view or add a comment, sign in
-
Question about relating searchsploit results to actually finding things in msf console. See the screenshot for guidance here, it's a doozy. I've identified the program I want to use, being this rejetto HTTP File Server (since recon has revealed that it's a 2.3 - ish system run over port 80 of our given target). However, the instructor then pulls the following command out of thin air: use exploit/windows/http/rejetto_hfs_exec This does not match the pathing shown in searchsploit. This is the correct exploit to be used, but the teacher failed to explain how we know to use this path, because it was not in the results of the searchsploit command, (which was supposedly how we would "find" options in the wild). consistently I am disappointed with the lack of quality of cybersecurity lessons... this shouldn't be like pulling teeth to explain how step A leads into B, but they constantly leave out parts of the process, making the overall activity impossible to replicate i.e. not actually conveying the skill at hand.
To view or add a comment, sign in