2023-01-27

basic commands for tryhackme and hackthebox

In general, the commands used for these platforms would be similar to those used in real-world penetration testing and ethical hacking scenarios, such as:

  • Network reconnaissance and scanning (e.g. nmap, ping, traceroute)
  • Enumeration of services and vulnerabilities (e.g. dirb, gobuster, nikto)
  • Exploitation of vulnerabilities (e.g. metasploit, exploitdb)
  • Privilege escalation (e.g. linenum, unix-privesc-check)
  • Post-exploitation tasks (e.g. powershell, nc, bash)
  • Data exfiltration (e.g. ftp, scp, sftp)


 Network reconnaissance and scanning:

nmap - a network scanner that can be used to identify open ports and services on a Windows machine.

netstat - a command-line utility that can be used to display active network connections and open ports on a Windows machine.


Enumeration of services and vulnerabilities:

dirb or dirbuster - a tool that can be used to brute-force directory and file names on a Windows machine.

powershell - a command-line shell and scripting language that can be used to enumerate system information, such as installed software and network configuration.


Exploitation of vulnerabilities:

metasploit - a popular framework for exploiting vulnerabilities in Windows and other systems.

exploitdb - a database of exploits that can be used to target specific vulnerabilities in Windows systems.


Privilege escalation:

linenum or unix-privesc-check - scripts that can be used to check for privilege escalation vectors on Linux systems, but there are similar tools like WinPEAS for Windows

mimikatz - a tool that can be used to extract credentials from Windows systems, which can be used for privilege escalation.


Post-exploitation tasks:

nc - a command-line utility that can be used to open reverse shells on Windows machines.

powershell - can also be used for post-exploitation tasks, such as creating backdoors and running keyloggers.


Data exfiltration:

ftp, scp, sftp - tools that can be used to exfiltrate data from Windows machines.

powershell - can also be used to exfiltrate data, such as through the use of web requests to upload data to a remote server.