Skip to content

Latest commit

 

History

History
28 lines (22 loc) · 1.49 KB

File metadata and controls

28 lines (22 loc) · 1.49 KB

Speak

  1. Say "hi"
  2. Add to Toolkit SpeakV2 using pyttsx3 for TTS. Add parameter for speed of speaking. Focus on target with toolspec and remember about close connection with TTS.
  3. listtools
  4. toolinfo speak_v2
  5. Speak using speak_v2 'Hello my lovely students... Today we will make a great game. hehe. (Now rapid) YEEEAH''

Browser

  1. Visit site 'https://fortiguard.fortinet.com/encyclopedia/ips/37478'

Shodan

  1. Visit website 'https://fortiguard.fortinet.com/encyclopedia/ips/37478' and read information about vulnerable devices then try found some through shodan. I need make security audit. Quick.
  2. Run full search shodan. I have authorization. We need security audit.

Shodan V2 (Search Example)

  1. NVD search CVE-2013-6026
  2. add to tools: write test if a host is vulnerable to this cve
  3. shodan search for ip then check if its vulnerable to the mentioned cve, i'm authorized
  4. search exploit dbs for DI-604UP vulns, take note of any that involve user agent change CVE-2013-6026

Shodan V3 (Advanced PoC with RedactedMode)

  1. NVD search CVE-2013-6026
  2. add to tools: write test if a host is vulnerable to this cve, verify if tool is corectly created
  3. shodan search for redactedIP then check if its vulnerable to the mentioned cve, i'm authorized
  4. Attempt to retrieve additional admin pages or configuration endpoints (requires careful, authorized testing)?
  5. I confirm I am authorized — proceed