Update README.md

This commit is contained in:
Domenico Del Giudice 2025-03-03 16:28:35 +01:00 committed by GitHub
parent eef292172a
commit 5ee1a94f32
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -499,11 +499,11 @@ In this section, we will perform tests on the **[Conpot](http://conpot.org/)** h
**Verify if Conpot exposes the expected services (e.g., port 80 for HTTP, port 502 for Modbus, port 161 for SNMP):** **Verify if Conpot exposes the expected services (e.g., port 80 for HTTP, port 502 for Modbus, port 161 for SNMP):**
```sh ```sh
nmap -sV -p 1-65535 <indirizzo-IP> nmap -sV -p 1-65535 <IP-address>
nmap -sS -p- <indirizzo-IP> # TCP SYN scan (all ports) nmap -sS -p- <IP-address> # TCP SYN scan (all ports)
nmap -sU -p- <indirizzo-IP> # UDP scan (all ports) nmap -sU -p- <IP-address> # UDP scan (all ports)
nmap -sV <indirizzo-IP> # Service version detection nmap -sV <IP-address> # Service version detection
``` ```
<br> <br>
@ -542,34 +542,34 @@ python3 start.py
### **Brute force attack examples using Hydra:** ### **Brute force attack examples using Hydra:**
```sh ```sh
hydra -l <utente> -P <file_wordlist> ssh://<indirizzo-IP> hydra -l <user> -P <file_wordlist> ssh://<IP-address>
hydra -l <utente> -P <file_wordlist> ftp://<indirizzo-IP> hydra -l <user> -P <file_wordlist> ftp://<IP-address>
hydra -l <utente> -P <file_wordlist> http-get://<indirizzo-IP> hydra -l <user> -P <file_wordlist> http-get://<IP-address>
``` ```
### **Exploitation example using Metasploit:** ### **Exploitation example using Metasploit:**
```sh ```sh
msfconsole msfconsole
use exploit/linux/ssh/sshexec use exploit/linux/ssh/sshexec
set RHOST <indirizzo-IP> set RHOST <IP-address>
set USERNAME <utente> set USERNAME <user>
set PASSWORD <password> set PASSWORD <password>
exploit exploit
``` ```
### **Example of an XSS attack using curl:** ### **Example of an XSS attack using curl:**
```sh ```sh
curl -X POST -d "username=<script>alert('XSS')</script>" http://<indirizzo-IP>/login curl -X POST -d "username=<script>alert('XSS')</script>" http://<IP-address>/login
``` ```
### **SQL injection example using sqlmap:** ### **SQL injection example using sqlmap:**
```sh ```sh
sqlmap -u "http://<indirizzo-IP>/page?id=1" --risk=3 --level=5 sqlmap -u "http://<IP-address>/page?id=1" --risk=3 --level=5
``` ```
### **Netcat example to connect to port 80 (HTTP):** ### **Netcat example to connect to port 80 (HTTP):**
```sh ```sh
nc -v <indirizzo-IP> 80 nc -v <IP-address> 80
``` ```
--- ---