Friday, July 17, 2015

Command For Backtrack

Backtrack Command for beginners


1. ? - help menu
2. background - moves the current session to the background
3. bglist - provides a list of all running background scripts
4. channel - displays active channels
5. close - closes a channel
6. exit - terminates a meterpreter session
7. migrate - moves the active process to a designated PID
8. run - executes the meterpreter script designated after it
9. use - loads a meterpreter extension


Backtrack Command for Network management


1. Ifconfig-Provide the IP address of private network
2. Ifconfig eth0-Display the ethernet adapter
3. ifconfig eth0 down-Disable the adapter
4. ifconfig eth0  192.168.0.1-manually set up the IP address
5. ifconfig eth0 netmask 255.255.255.0-manuall set the subnet mask
6. ifconfig eth0 up-Enable the adapter



Backtrack command for file management


1. cat - read and output to stdout the contents of a file
2. cd - change directory on the victim
3. del - delete a file on the victim
4. download - download a file from the victim system to the attacker system
5. edit - edit a file with vim
6. ls - list files in current directory
7. mkdir - make a directory on the victim system
8. pwd - print working directory
9. rm - delete a file
10. rmdir - remove directory on the victim system
11. upload - upload a file from the attacker system to the victim



Command for exploiting victim computer


1. clear - clears the screen
2. Ifconfig- show the IP address of computer
3. execute - executes a command
4. getpid - gets the current process ID (PID)
5. getuid - get the user that the server is running as
6. kill - terminate the process designated by the PID
7. ps - list running processes
8. reboot - reboots the victim computer
9. reg - interact with the victim's registry
10. shell - opens a command shell on the victim machine
11. shutdown - shuts down the victim's computer
12. sysinfo - gets the details about the victim computer such as OS and name
13. keyscan_start - starts the software keylogger when associated with a process such as Word or browser
14. keyscan_stop - stops the software keylogger
15. keyscan_dump - dumps the contents of the software keylogger
16. screenshot - grabs a screenshot of the meterpreter desktop
17. set_desktop - changes the meterpreter desktop

No comments:

Post a Comment

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...