Kali Survivor Skills
Set the Target IP address to the $ip system variable:
export ip=192.168.17.131Find the location of a file:
locate sbd.exeSearch through directories in the $PATH environment variable:
which sbdFind/search for a file that contains a specific string in it’s name:
find / -name sbd\\*Show active internet connections:
netstat -lntpChange password:
passwdVerify if a service is running and listening:
netstat -antp | grep apacheStart a service:
systemctl start sshsystemctl start apache2Have a service start at boot:
Stop a service:
Unzip a gz file:
Unzip a tar.gz file:
Search command history:
Download a webpage:
Open a webpage:
String manipulation
Count number of lines in a file:
Get the start or end of a file:
Extract all the lines that contain a string:
Cut a string by a delimiter, filter results then sort:
Using Grep and regular expressions and output to a file:
Use a bash loop to find the IP address behind each host:
Collect all the IP Addresses from a log file and sort by frequency:
Decoding using Kali
Decode Base64 Encoded Values:
Decode Hexidecimal Encoded Values:
Netcat - Read and write TCP and UDP Packets
Download Netcat for Windows (handy for creating reverse shells and transfering files on windows systems): https://joncraton.org/blog/46/netcat-for-windows/
Connect to a POP3 mail server:
Listen on TCP/UDP port:
Connect to a netcat port:
Send a file using netcat:
Receive a file using netcat:
Some OSs (OpenBSD) will use nc.traditional rather than nc so watch out for that...
Create a reverse shell with netcat using cmd.exe on Windows:
Create a reverse shell with netcat using bash on Linux:
Netcat for Banner Grabbing:
Ncat - Netcat for Nmap project which provides more security avoiding IDS
Reverse shell from windows using cmd.exe using ssl:
Listen on port 4444 using ssl:
Wireshark
Show only SMTP (port 25) and ICMP traffic:
Show only traffic in the LAN (192.168.x.x), between workstations and servers -- no Internet:
Filter by a protocol ( e.g. SIP ) and filter out unwanted IPs:
Some commands are equal:
Tcpdump
Display a pcap file:
Display ips and filter and sort:
Grab a packet capture on port 80:
Check for ACK or PSH flag set in a TCP packet:
IPTables
Deny traffic to ports except for Local Loopback:
Clear ALL IPTables firewall rules:
Last updated
Was this helpful?