- Pentest Cheat Sheet
- 1. Scanning & Enumeration
- 2. Information Gathering (Reconnaissance)
3. Linux
- 3.1. Enumeration
- 3.2. Reverse Shell
- 3.3. Privesc
- 3.4. Buffer Overflow
- 3.5. Check-list
4. Windows
- 4.1. File Upload
- 4.2. Buffer Overflow
- 4.3. Active Directory
- 4.4. Privesc
- 4.5. Port Forwarding/Tunneling
- 4.6. Reverse Shell
- 4.7. NTLM Hashes
- 4.8. Maintaining Access
- 4.9. Check-list
- 5. Brute-Force
6. Web Applications
- 6.1. Enumeration
- 6.2. SQL Injection
- 6.3. File Upload
- 6.4. Fuzzing
- 6.5. LFI
- 6.6. XSS
- 7. Steganography
- 8. MSF-Venom
- 9. Memory Forensics
- 10. Wireless Penetration Testing
- 11. Open-Source Intelligence
- 12. External Pentest Playbook