Homepage
Pentest Workflow
Stage | Details |
---|---|
Plan. Scope. Investigate, OSINT, Recon | |
nmap, nikto, burp, fuzzing | |
Find your foothold. Exploit a service. Get user access. | |
WebApps are full of vulnerabilities: IIS, LFI, SQLi, php, wordpress | |
Cipher, Decrypt, Stego, Hash Cracking, Dictionaries, Hydra | |
Enum > PrivEsc > Exploit ... Plus: Pivots, Moving Files, Tricks | |
Enum > PrivEsc > Exploit ... Plus: Active Directory, Kerberos, Powershell |
Last updated