mirror of
https://github.com/tldr-pages/tldr.git
synced 2024-10-28 08:59:45 +01:00
Compare commits
8 commits
bdd7a7ff9d
...
9802735d61
Author | SHA1 | Date | |
---|---|---|---|
|
9802735d61 | ||
|
12182f2a52 | ||
|
15e885e2f0 | ||
|
9adede99be | ||
|
13dc1d169d | ||
|
9574cfde6a | ||
|
b0d1fca234 | ||
|
442408bc9b |
7 changed files with 148 additions and 0 deletions
20
pages/common/ntpctl.md
Normal file
20
pages/common/ntpctl.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# ntpctl
|
||||
|
||||
> Display information about the running instance of OpenNTPD.
|
||||
> More information: <https://man.openbsd.org/ntpctl>.
|
||||
|
||||
- Show all data:
|
||||
|
||||
`ntpctl -s {{a|all}}`
|
||||
|
||||
- Show information about each peer:
|
||||
|
||||
`ntpctl -s {{p|peers}}`
|
||||
|
||||
- Show the status of peers and sensors, and whether the system clock is synced:
|
||||
|
||||
`ntpctl -s {{s|status}}`
|
||||
|
||||
- Show information about each sensor:
|
||||
|
||||
`ntpctl -s {{S|Sensors}}`
|
28
pages/common/nxc-mssql.md
Normal file
28
pages/common/nxc-mssql.md
Normal file
|
@ -0,0 +1,28 @@
|
|||
# nxc mssql
|
||||
|
||||
> Pentest and exploit Microsoft SQL servers.
|
||||
> More information: <https://www.netexec.wiki/mssql-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
|
||||
- Execute the specified SQL [q]uery on the target server:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
|
||||
|
||||
- Execute the specified shell command on the target server through MSSQL:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
|
||||
|
||||
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
|
||||
|
||||
- Download a remote file from the target server and store it in the specified location:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
|
||||
|
||||
- Upload a local file to the specified location on the target server:
|
||||
|
||||
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`
|
24
pages/common/nxc-nfs.md
Normal file
24
pages/common/nxc-nfs.md
Normal file
|
@ -0,0 +1,24 @@
|
|||
# nxc nfs
|
||||
|
||||
> Pentest and exploit NFS servers. Currently supports anonymous mode only.
|
||||
> More information: <https://www.netexec.wiki/nfs-protocol>.
|
||||
|
||||
- Detect the version of a remote NFS server:
|
||||
|
||||
`nxc nfs {{192.168.178.0/24}}`
|
||||
|
||||
- List the available NFS shares:
|
||||
|
||||
`nxc nfs {{192.168.178.2}} --shares`
|
||||
|
||||
- Enumerate the exposed shares recursively to the specified depth:
|
||||
|
||||
`nxc nfs {{192.168.178.2}} --enum-shares {{5}}`
|
||||
|
||||
- Download the specified remote file:
|
||||
|
||||
`nxc nfs {{192.168.178.2}} --get-file {{path/to/remote_file}} {{path/to/local_file}}`
|
||||
|
||||
- Upload the specified local file to the remote share:
|
||||
|
||||
`nxc nfs {{192.168.178.2}} --put-file {{path/to/local_file}} {{path/to/remote_file}}`
|
20
pages/common/nxc-rdp.md
Normal file
20
pages/common/nxc-rdp.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# nxc rdp
|
||||
|
||||
> Pentest and exploit RDP servers.
|
||||
> More information: <https://www.netexec.wiki/rdp-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
|
||||
- Take a screenshot after waiting the for specified number of seconds:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
|
||||
|
||||
- Take a screenshot in the specified resolution:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
|
||||
|
||||
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
|
||||
|
||||
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`
|
16
pages/common/nxc-vnc.md
Normal file
16
pages/common/nxc-vnc.md
Normal file
|
@ -0,0 +1,16 @@
|
|||
# nxc vnc
|
||||
|
||||
> Pentest and exploit VNC servers.
|
||||
> More information: <https://www.netexec.wiki/>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
|
||||
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
|
||||
- Avoid rate limiting through VNC-sleep:
|
||||
|
||||
`nxc vnc {{192.168.178.2}} -u {{{path/to/usernames.txt}}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}`
|
||||
|
||||
- Take a screenshot on the remote system after waiting the specified amount of time:
|
||||
|
||||
`nxc vnc {{192.168.178.2}} -u {{{username}}} -p {{password}} --screenshot --screentime {{10}}`
|
20
pages/common/nxc-winrm.md
Normal file
20
pages/common/nxc-winrm.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# nxc winrm
|
||||
|
||||
> Pentest and exploit Windows Remote Management (winrm).
|
||||
> More information: <https://www.netexec.wiki/winrm-protocol>.
|
||||
|
||||
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
|
||||
|
||||
- Specify the domain to authenticate to (avoids an initial SMB connection):
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -d {{domain_name}}`
|
||||
|
||||
- Execute the specified command on the host:
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
|
||||
|
||||
- Execute the specified PowerShell command on the host as administrator using LAPS:
|
||||
|
||||
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} --laps -X {{whoami}}`
|
20
pages/common/nxcdb.md
Normal file
20
pages/common/nxcdb.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
# nxcdb
|
||||
|
||||
> Interact with the NetExec database.
|
||||
> More information: <https://www.netexec.wiki/getting-started/database-general-usage>.
|
||||
|
||||
- Enter an interactive database session:
|
||||
|
||||
`nxcdb`
|
||||
|
||||
- Display the currently active workspace:
|
||||
|
||||
`nxcdb --get-workspace`
|
||||
|
||||
- Create a new workspace:
|
||||
|
||||
`nxcdb --create-workspace {{workspace_name}}`
|
||||
|
||||
- Activate the specified workspace:
|
||||
|
||||
`nxcdb --set-workspace {{workspace_name}}`
|
Loading…
Reference in a new issue