๐Ÿฐ
Pentesting Playbook
CtrlK
  • Pentesting Playbook
    • ๐ŸฐAbout
    • ๐Ÿ–ฅ๏ธThe Process
      • ๐Ÿ”ŽReconnaissance
        • ๐Ÿ”ญPassive Reconnaissance
        • ๐Ÿ‘ฃFootprinting
        • ๐Ÿ•ต๏ธActive Reconnaissance
        • ๐Ÿค–Automated Reconnaissance
      • ๐Ÿ›Vulnerability Scanning & Testing
        • ๐Ÿ•ธ๏ธWeb Hacking
      • ๐Ÿ’ฃExploitation
        • ๐Ÿ Local File Inclusion (LFI)
        • ๐ŸšShells
        • ๐Ÿ’‰SQL Injection (SQLi)
          • ๐Ÿ—„๏ธDatabases
          • ๐ŸฌMySQL
          • ๐Ÿ—ƒ๏ธDatabase Enumeration
          • ๐Ÿ“–Reading & Writing Files
          • ๐Ÿ—บ๏ธSQLMap
            • Database Enumeration
            • OS Exploitation
            • Bypassing Protection
        • โš”๏ธCross Site Scripting (XSS)
      • ๐Ÿ”“Authentication
        • ๐ŸงLinux Authentication
        • ๐ŸชŸWindows Authentication
        • ๐Ÿ”‘Brute Forcing Logins
        • ๐Ÿ”งCracking Tools
      • โฌ†๏ธPrivilege Escalation
        • ๐ŸงLinux Escalation
        • ๐ŸชŸWindows Escalation
    • โ™ฅ๏ธUseful Extras
    • โ˜‘๏ธEngagement Checklist
  • Main Topics
    • ๐Ÿ–ฅ๏ธNetworking
    • โš”๏ธAttacking Common Services
      • ๐ŸฌMySQL
      • โšซMSSQL
      • ๐Ÿ–ฅ๏ธRDP
      • ๐ŸฆSMB
      • ๐Ÿ—ƒ๏ธFTP
      • ๐ŸŒDNS
      • โœ‰๏ธEmail
    • ๐Ÿ“Active Directory
      • ๐Ÿ”Initial Enumeration
      • ๐ŸฆถGetting a Foothold
      • ๐ŸงบPassword Hunting and Gathering
      • ๐Ÿ’ฆPassword Spraying
      • ๐Ÿ”Enumerating Security Controls
      • ๐Ÿ”‘Credentialed Enumeration with Linux
      • ๐Ÿ”‘Credentialed Enumeration with Windows
      • ๐ŸšœLiving Off the Land
      • ๐Ÿ”ฅKeberoasting with Linux
      • ๐Ÿ”ฅKeberoasting with Windows
      • ๐Ÿ›‚Access Control List (ACL)
      • ๐Ÿ—๏ธPrivileged Access
      • ๐Ÿ”ชBleeding Edge Vulnerabilities
      • โš™๏ธMisconfigurations
      • ๐ŸคDomain Trusts
        • ๐ŸชŸAttacking Domain Trusts From Windows
        • ๐ŸงAttacking Domain Trusts From Linux
        • ๐ŸŒฒCross-Forest Trust Abuse From Windows
        • ๐ŸŒณCross-Forest Trust Abuse From Linux
    • โ†—๏ธPivoting, Port Forwarding and Tunnelling
    • ๐Ÿ› ๏ธReverse Engineering
    • ๐Ÿ•ต๏ธForensics
    • ๐ŸฆˆPcap Analysis
    • ๐Ÿ—„๏ธFile Transfers
    • ๐ŸšœLiving off The Land
    • ๐Ÿ’ŽMetasploit Framework
    • โœ๏ธDocumentation & Reporting
  • Other Resources
    • โ„น๏ธInteresting Attacks
  • Exam Prep
    • eCPPTv2 Prep
    • OSCP Prep
  • CTF
    • THM Rooms
      • Mustacchio
      • Plethora THM
      • Break Out The Cage
      • Probe
  • HTB Skill Assessments
    • AD Enumeration & Attacks - Skills Assessment Part I
    • AD Enumeration & Attacks - Skills Assessment Part II
Powered by GitBook
On this page

Was this helpful?

  1. Pentesting Playbook
  2. ๐Ÿ–ฅ๏ธThe Process

๐Ÿ”ŽReconnaissance

๐Ÿ”ญPassive Reconnaissance๐Ÿ•ต๏ธActive Reconnaissance๐Ÿ›Vulnerability Scanning & Testing
PreviousThe ProcessNextPassive Reconnaissance

Last updated 1 year ago

Was this helpful?