Reconnaissance / Enumeration
Extracting Live IPs from Nmap Scan
nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ipsNmap
Simple Port Knocking
DNS lookups, Zone Transfers & Brute-Force
Banner Grabbing
NFS Exported Shares
Kerberos Enumeration
HTTP Brute-Force & Vulnerability Scanning
RPC / NetBios / SMB
SNMP
SMTP
Active Directory
Listen on a port (Powershell)
Gaining Access
Reverse Shell One-Liners
JDWP RCE
Working with Restricted Shells
Interactive TTY Shells
Uploading/POSTing Files Through WWW Upload Forms
PUTing File on the Webhost via PUT verb
Generating Payload Pattern & Calculating Offset
Bypassing File Upload Restrictions
Injecting PHP into JPEG
Uploading .htaccess to interpret .blah as .php
Cracking Passwords
Generating Payload with msfvenom
Compiling Code From Linux
Compiling Assembly from Windows
Local File Inclusion to Shell
Local File Inclusion: Reading Files
Remote File Inclusion Shell: Windows + PHP
SQL Injection to Shell or Backdoor
SQLite Injection to Shell or Backdoor
MS-SQL Console
Upgradig Non-Interactive Shell
Python Input Code Injection
Local Enumeration & Privilege Escalation
Check AppLocker Policies
Applocker: Writable Windows Directories
Find Writable Files/Folders in Windows
Check if Powershell Logging is Enabled
Check WinEvent Logs for SecureString Exposure
Check WinEvent for Machine Wake/Sleep times
Audit Policies
Check if LSASS is running in PPL
Binary Exploitation with ImmunityDebugger
Cracking a ZIP Password
Setting up Simple HTTP server
MySQL User Defined Fuction Privilge Escalation
Docker Privilege Esclation
Resetting root Password
Uploading Files to Target Machine
Whois Data Exfiltration
Cancel Data Exfiltration
rlogin Data Exfiltration
Bash Ping Sweeper
Brute-forcing XOR'ed string with 1 byte key in Python
Generating Bad Character Strings
Converting Python to Windows Executable (.py -> .exe)
Port Scanning with NetCat
Port Scanning with Masscan
Exploiting Vulnerable Windows Services: Weak Service Permissions
Find File/Folder Permissions Explicitly Set for a Given User
AlwaysInstallElevated MSI
Stored Credentials: Windows
Unquoted Service Path
Persistence via Services
Port Forwarding / SSH Tunneling
RunAs / Start Process As
Recursively Find Hidden Files: Windows
General File Search
Post-Exploitation & Maintaining Access
Browsing Registry Hives
Decrypting RDG Passwords
Decrypting VNC Password
Creating User and Adding to Local Administrators
Hide Newly Created Local administrator
Creating SSH Authorized Keys
Creating Backdoor User w/o Password
Creating Another root User
Generating OpenSSL Password
Persistent Back Doors
Code Execution / Application Whitelist Bypass
Ieframe.dll
Last updated

