📘
OSCP Exam Prep
OSCP Exam Prep
OSCP Exam Prep
  • Reference List
  • Guideline
  • Commons
    • Basic Scans
    • Service Enumeration
      • HTTP(S) (80 / 443)
      • SMB (139 / 445)
      • FTP (21)
      • DNS (53)
      • SSH (22)
      • LDAP (389/636/3268)
      • Kerberos (88)
      • SNMP (161)
      • SMTP (25)
      • RDP (3389)
      • Evil-WinRM (5985/5986)
      • MYSQL (3306)
      • MSSQL (1433)
    • Default/Common Credentials
    • Shells
      • TTY Shell
    • File Transfer
    • KeePass Database
    • Port Forwarding
    • File Metadata
  • Attacks
    • Run a command x times
    • Public Exploits
    • User Creation
    • Password Cracking
      • Using custom wordlists
    • LFI/RFI
    • SQLi
    • PwnKit
    • SAM and SYSTEM files
    • Phishing for Access (Requires MailSVR)
    • GitDumper
  • Enumeration
    • Linux
    • Windows
  • Privilege Escalation
    • Linux
    • Windows
  • Port Forwarding Extras
    • Linux
    • Windows
  • Active Directory
    • Enumeration
    • Lateral Movement
    • Privilege Escalation
Powered by GitBook
On this page
  1. Attacks

Run a command x times

for i in $(seq <start> <end>); do <command> $i; done

Examples:
    for i in $(seq 1 254); do nc -zv -w 1 172.16.50.$i 445; done

    for i in $(seq 70 76); do xfreerdp /u:robert /p:P@ssw0rd /v:192.168.218.$i /cert:ignore /size:70% +drive:SHARE,/home/kali/OffSec/Materials; done
    
    for i in $(seq 70 75); do crackmapexec smb 192.168.174.$i -u users.txt -p 'VimForPowerShell123!' -d corp.com --continue-on-success; done
    
    for i in $(seq 9000 9100); do proxychains ./executables/ssh_remote_dynamic_client -i 10.4.110.64 -p $i; done
    
    for i in $(seq 1 254); do proxychains ping -c 2 172.16.174.$i; done

PreviousFile MetadataNextPublic Exploits

Last updated 4 months ago