1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2024-10-28 08:59:45 +01:00

Compare commits

...

8 commits

Author SHA1 Message Date
Juri Dispan
9802735d61
Merge 442408bc9b into 12182f2a52 2024-10-28 06:42:46 +01:00
Juri Dispan
12182f2a52
nxc-nfs: add page (#14381) 2024-10-28 06:42:42 +01:00
Juri Dispan
15e885e2f0
nxc-vnc: add page (#14380) 2024-10-28 06:42:08 +01:00
Juri Dispan
9adede99be
nxc-rdp: add page (#14384) 2024-10-28 06:40:59 +01:00
Juri Dispan
13dc1d169d
nxc-mssql: add page (#14385) 2024-10-28 06:40:45 +01:00
Lena
9574cfde6a
ntpctl: add page (#14382) 2024-10-27 20:47:14 -07:00
Juri Dispan
b0d1fca234
nxcdb: add page (#14386) 2024-10-27 20:38:02 -07:00
Juri Dispan
442408bc9b nxc-winrm: add page 2024-10-24 20:59:29 +02:00
7 changed files with 148 additions and 0 deletions

20
pages/common/ntpctl.md Normal file
View file

@ -0,0 +1,20 @@
# ntpctl
> Display information about the running instance of OpenNTPD.
> More information: <https://man.openbsd.org/ntpctl>.
- Show all data:
`ntpctl -s {{a|all}}`
- Show information about each peer:
`ntpctl -s {{p|peers}}`
- Show the status of peers and sensors, and whether the system clock is synced:
`ntpctl -s {{s|status}}`
- Show information about each sensor:
`ntpctl -s {{S|Sensors}}`

28
pages/common/nxc-mssql.md Normal file
View file

@ -0,0 +1,28 @@
# nxc mssql
> Pentest and exploit Microsoft SQL servers.
> More information: <https://www.netexec.wiki/mssql-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc mssql {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Execute the specified SQL [q]uery on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --query '{{SELECT * FROM sys.databases;}}'`
- Execute the specified shell command on the target server through MSSQL:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the target server through MSSQL without retrieving output:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} -X {{whoami}} --no-output`
- Download a remote file from the target server and store it in the specified location:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --get-file {{C:\path\to\remote_file}} {{path/to/local_file}}`
- Upload a local file to the specified location on the target server:
`nxc mssql {{192.168.178.2}} -u {{username}} -p {{password}} --put-file {{path/to/local_file}} {{C:\path\to\remote_file}}`

24
pages/common/nxc-nfs.md Normal file
View file

@ -0,0 +1,24 @@
# nxc nfs
> Pentest and exploit NFS servers. Currently supports anonymous mode only.
> More information: <https://www.netexec.wiki/nfs-protocol>.
- Detect the version of a remote NFS server:
`nxc nfs {{192.168.178.0/24}}`
- List the available NFS shares:
`nxc nfs {{192.168.178.2}} --shares`
- Enumerate the exposed shares recursively to the specified depth:
`nxc nfs {{192.168.178.2}} --enum-shares {{5}}`
- Download the specified remote file:
`nxc nfs {{192.168.178.2}} --get-file {{path/to/remote_file}} {{path/to/local_file}}`
- Upload the specified local file to the remote share:
`nxc nfs {{192.168.178.2}} --put-file {{path/to/local_file}} {{path/to/remote_file}}`

20
pages/common/nxc-rdp.md Normal file
View file

@ -0,0 +1,20 @@
# nxc rdp
> Pentest and exploit RDP servers.
> More information: <https://www.netexec.wiki/rdp-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc rdp {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Take a screenshot after waiting the for specified number of seconds:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --screentime {{10}}`
- Take a screenshot in the specified resolution:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --screenshot --res {{1024x768}}`
- Take a screenshot of the RDP login prompt if Network Level Authentication is disabled:
`nxc rdp {{192.168.178.2}} -u {{username}} -p {{password}} --nla-screenshot`

16
pages/common/nxc-vnc.md Normal file
View file

@ -0,0 +1,16 @@
# nxc vnc
> Pentest and exploit VNC servers.
> More information: <https://www.netexec.wiki/>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc vnc {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Avoid rate limiting through VNC-sleep:
`nxc vnc {{192.168.178.2}} -u {{{path/to/usernames.txt}}} -p {{path/to/passwords.txt}} --vnc-sleep {{10}}`
- Take a screenshot on the remote system after waiting the specified amount of time:
`nxc vnc {{192.168.178.2}} -u {{{username}}} -p {{password}} --screenshot --screentime {{10}}`

20
pages/common/nxc-winrm.md Normal file
View file

@ -0,0 +1,20 @@
# nxc winrm
> Pentest and exploit Windows Remote Management (winrm).
> More information: <https://www.netexec.wiki/winrm-protocol>.
- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords:
`nxc winrm {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}`
- Specify the domain to authenticate to (avoids an initial SMB connection):
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -d {{domain_name}}`
- Execute the specified command on the host:
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} -x {{whoami}}`
- Execute the specified PowerShell command on the host as administrator using LAPS:
`nxc winrm {{192.168.178.2}} -u {{username}} -p {{password}} --laps -X {{whoami}}`

20
pages/common/nxcdb.md Normal file
View file

@ -0,0 +1,20 @@
# nxcdb
> Interact with the NetExec database.
> More information: <https://www.netexec.wiki/getting-started/database-general-usage>.
- Enter an interactive database session:
`nxcdb`
- Display the currently active workspace:
`nxcdb --get-workspace`
- Create a new workspace:
`nxcdb --create-workspace {{workspace_name}}`
- Activate the specified workspace:
`nxcdb --set-workspace {{workspace_name}}`