Enumeration
Scans
nmap -A $VICTIMnmap -sV -sT -O -p 1-65535 $VICTIMnmap -sC -sV -p- $VICTIMnmap -p1,2,3,4 --script=vuln $VICTIMPorts
TCP/21 - FTP
Common Credentials
Usernames
Passwords
Access FTP
List files
List files (using Curl)
Download files
Download all files
Download all files to the current directory (using Wget)
Upload files
TCP/22 - SSH
SSH into host
Check this page for cracking examples
TCP/25 - SMTP
Check for vulnerabilities
Check this page for cracking examples
UDP/53 - DNS
Find subdomains
TCP/80:443 - HTTP(s)
Web Enumeration
Info gathering info

Create wordlist
Find Directories
Find Pages
Find pages with certain extensions
Find pages and exclude certain extensions
Using filters
Fuzzing parameters
Find Vulnerabilities
Scan for misconfigurations
Scan for SQL injection vulnerabilities.
Authenticated nikito scan
Check for Shellshock
Check for Heartbleed
Fuzzing Subdomains
Proxifying ffuf traffic
SQLMap
Get information
Get Databases
Rescan SQLMap
Cookies

HTTP Headers

Run Web server
Kali
Wordpress
Scan wordpress site
Kali
Enumerate wordpress site
Kali
Bruteforce admin page
Kali
.git folder found
Jenkins
Reverse Shell
UDP/88 - Kerberos
Username Enumeration
Get Ticket
TCP/110 - POP3
Logging in with credentials
Check this page for cracking examples
TCP/135 - RPC
Login with credentials
TCP/139 - NetBIOS
Enumerate SMB
UDP/161 - SNMP
Collect Information
TCP/389 - LDAP
Enumerating Active Directory
Breaching Active Directory
Exploiting Active Directory
Persisting Active Directory
TCP/445 - SMB
Scanning
Common Credentials
Usernames
List Shares
Download files
Option #1
Option #2
Option #3
Upload files
Option #1
Detect Vulnerabilities
TCP/667 - IRC
TCP/873 - RSYNC
Check Modules
List files
Transfer files
TCP/2049 - NFS
Mount drive
TCP/3306 - SQL
TCP/3389 - RDP
Scan
Login to host
TCP/5000 - Docker Registry
Add repositories
List repositories
Get tags of a repository
Get manifests
Download the Docker image to find info
Enter image
Uploading Malicious Docker Images

RCE via Exposed Docker Daemon
Escape via Exposed Docker Daemon
Shared Namespaces
Misconfigured Privileges
Privilege Escalation with 2 shells and host mount
TCP/5327 - Postgres
TCP/5985 - WinRM or wsman
TCP/5986 - WinRM
Dump Hashes
Login with found username and password
Login with found username and hash
TCP/6379 - Redis
Get Users hash
TCP/7070 - AnyConnect
TCP/11211 - Memcache
Dump cache
TCP/27017 - MongoDB
Find Info in DB
Knock
Last updated