mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-07-01 12:32:12 +00:00
Update README.md
This commit is contained in:
parent
eef292172a
commit
5ee1a94f32
1 changed files with 12 additions and 12 deletions
24
README.md
24
README.md
|
@ -499,11 +499,11 @@ In this section, we will perform tests on the **[Conpot](http://conpot.org/)** h
|
||||||
|
|
||||||
**Verify if Conpot exposes the expected services (e.g., port 80 for HTTP, port 502 for Modbus, port 161 for SNMP):**
|
**Verify if Conpot exposes the expected services (e.g., port 80 for HTTP, port 502 for Modbus, port 161 for SNMP):**
|
||||||
```sh
|
```sh
|
||||||
nmap -sV -p 1-65535 <indirizzo-IP>
|
nmap -sV -p 1-65535 <IP-address>
|
||||||
|
|
||||||
nmap -sS -p- <indirizzo-IP> # TCP SYN scan (all ports)
|
nmap -sS -p- <IP-address> # TCP SYN scan (all ports)
|
||||||
nmap -sU -p- <indirizzo-IP> # UDP scan (all ports)
|
nmap -sU -p- <IP-address> # UDP scan (all ports)
|
||||||
nmap -sV <indirizzo-IP> # Service version detection
|
nmap -sV <IP-address> # Service version detection
|
||||||
```
|
```
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
|
@ -542,34 +542,34 @@ python3 start.py
|
||||||
|
|
||||||
### **Brute force attack examples using Hydra:**
|
### **Brute force attack examples using Hydra:**
|
||||||
```sh
|
```sh
|
||||||
hydra -l <utente> -P <file_wordlist> ssh://<indirizzo-IP>
|
hydra -l <user> -P <file_wordlist> ssh://<IP-address>
|
||||||
hydra -l <utente> -P <file_wordlist> ftp://<indirizzo-IP>
|
hydra -l <user> -P <file_wordlist> ftp://<IP-address>
|
||||||
hydra -l <utente> -P <file_wordlist> http-get://<indirizzo-IP>
|
hydra -l <user> -P <file_wordlist> http-get://<IP-address>
|
||||||
```
|
```
|
||||||
|
|
||||||
### **Exploitation example using Metasploit:**
|
### **Exploitation example using Metasploit:**
|
||||||
```sh
|
```sh
|
||||||
msfconsole
|
msfconsole
|
||||||
use exploit/linux/ssh/sshexec
|
use exploit/linux/ssh/sshexec
|
||||||
set RHOST <indirizzo-IP>
|
set RHOST <IP-address>
|
||||||
set USERNAME <utente>
|
set USERNAME <user>
|
||||||
set PASSWORD <password>
|
set PASSWORD <password>
|
||||||
exploit
|
exploit
|
||||||
```
|
```
|
||||||
|
|
||||||
### **Example of an XSS attack using curl:**
|
### **Example of an XSS attack using curl:**
|
||||||
```sh
|
```sh
|
||||||
curl -X POST -d "username=<script>alert('XSS')</script>" http://<indirizzo-IP>/login
|
curl -X POST -d "username=<script>alert('XSS')</script>" http://<IP-address>/login
|
||||||
```
|
```
|
||||||
|
|
||||||
### **SQL injection example using sqlmap:**
|
### **SQL injection example using sqlmap:**
|
||||||
```sh
|
```sh
|
||||||
sqlmap -u "http://<indirizzo-IP>/page?id=1" --risk=3 --level=5
|
sqlmap -u "http://<IP-address>/page?id=1" --risk=3 --level=5
|
||||||
```
|
```
|
||||||
|
|
||||||
### **Netcat example to connect to port 80 (HTTP):**
|
### **Netcat example to connect to port 80 (HTTP):**
|
||||||
```sh
|
```sh
|
||||||
nc -v <indirizzo-IP> 80
|
nc -v <IP-address> 80
|
||||||
```
|
```
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
Loading…
Reference in a new issue