Homepage
Pentest Workflow
Stage
Details
Plan. Scope. Investigate, OSINT, Recon
nmap, nikto, burp, fuzzing
Find your foothold. Exploit a service. Get user access.
WebApps are full of vulnerabilities: IIS, LFI, SQLi, php, wordpress
Cipher, Decrypt, Stego, Hash Cracking, Dictionaries, Hydra
Enum > PrivEsc > Exploit ... Plus: Pivots, Moving Files, Tricks
Enum > PrivEsc > Exploit ... Plus: Active Directory, Kerberos, Powershell
Last updated