backattempt 2 notes
tools
FerntoolEAPHammertool-
Rubeustool LPD- port515otherwise known asLine Printer Daemon
wireshark
- Wireshark predefined columns:
No | Time | Source | Destination | Protocol | Length | Info

[!note] REMEMBER NO, TIME, SOURCE
Metasploit Architecture
https://www.linkedin.com/pulse/metasploit-framework-explained-understanding-its-joel-mutiso-yvihf
It is important to know that there are 3 components in the Metasploit Architecture:
- Libraries
- Interfaces
- Modules Classes DO NOT exist in this architecture

MITRE Caldera
SandCat Agent plugin in Caldera 54ndc47 ability
Abilities like 54ndc47 are commonly tied to discovery-phase techniques, not destructive payloads.
So the most realistic simulation is:
✔️ Enumerating users and gathering process/host information (T1087, T1057, T1033, etc.)
concepts
stacked query - SQL injection where multiple SQL statements or procedures are executed together in the same call to the database. (Chapter 9 - Exploiting Application Vulnerabilities, Exploiting Injection Vulnerabilities)
will add more later lol