Since it is hard as well as no point to remember the tons of commands use to penetrate ,this sheet can be used as reference .
##Dos-Attacks with Slowloris
##Information Gathering
##Nikto Webserver Scanner
##ARP spoofing
##Capturing cookies
##WPA cracking
##cracking WEP Auth
##Deauthentication Attack
##DNS spoofing
##Fake Authentication
##FTP exploitation
##Database hacking
##Injecting packets
##JS injection
##MITMF attack
##web server hacking
##Wireshark sniffing spoofing
Checkout some more hacking scripts
SECURING SYSTEM | BLUETOOTH ATTACKS | STEALING AND SNIFFING ATTACKS | KALI LINUX HACKING COMMANDS CHEATSHEET | TROJAN AND BACKDOORS | DICTIONARY AND BURTEFORCING ATTACKS | MAN IN THE MIDDLE ATTACKS |
---|---|---|---|---|---|---|
1. Sign & Verify message | 1. Bluetooth discovery | 1. Stealing saved wifi password from windows | 1. Hacking commands with Kali Linux | 1. Command and Control Trojan | 1. Dictionary Attack | 1. Man in Browser Attack |
2. SandBox Detection | 2. Bluetooth SDP browsing | 2. Sniffing packets | 2. Reverse shell in python | |||
3. TCP Proxy | 3. Bluetooth OBEX | 3. Email Credential sniffers | 3. Keylogger | |||
4. Bluetooth RCOMM channel scanner | 4. Screenshot with Python | |||||
5. Blue Bug Exploit | 5. Backdoor with Python | |||||
6. Blue Snarf Exploit | ||||||
7. Bluetooth spoofing | ||||||
8. Bluetooth sniffing |