Homepage

Pentest Workflow

StageDetails

Plan. Scope. Investigate, OSINT, Recon

nmap, nikto, burp, fuzzing

Find your foothold. Exploit a service. Get user access.

WebApps are full of vulnerabilities: IIS, LFI, SQLi, php, wordpress

Cipher, Decrypt, Stego, Hash Cracking, Dictionaries, Hydra

Enum > PrivEsc > Exploit ... Plus: Pivots, Moving Files, Tricks

Enum > PrivEsc > Exploit ... Plus: Active Directory, Kerberos, Powershell

Last updated