Network Penetration Testing Guide
Introduction
1. Information Gathering
Network Discovery
2. Scanning & Enumeration
2.1 Open Ports scan
2.2 Common Service Scan
HTTP or HTTPS
NFS Port 2049
DNS Port 53
RPC
SMB
SMTP
POP3
SNMP
MS SQL
Webmin
FTP
TELNET
TFTP
NTP
ORACLE Port 1521
RDP
2.3 Vulnerability Scanning
2.4 Subnet reference
2.4 Vlan Hopping
Port Knocking
3. Exploitation
3.1 Finding Exploits
3.2 Payloads Generation
Msfvenom
Generating Empire/Powershell
Empire Usage Guide
Impacket
Reverse Shell
3.3 SMB or Samba
3.4 SNMP
3.5 MSSQL
3.6 VPN
3.7 PPTP
3.8 DNS Tunnelling
3.9 Brute Forcing Services
3.10.1 Password Cracking
3.10.2 NAC Bypass
3.10.3 Common Default login
MITM Attacks
4. Privilege Escalation
4.1 Oracle
4.2 Windows Privilege Escalation
1. More Priv escalation
2. UAC
3. Blind Files
4. Priv with Powershell
4.3 Linux Privilege Escalation
Common Priv excalation
More linux priv escal
Uploading Files
Basic Linux Commands
4.4 Compiling Exploits
4.5 TTY Shell Spawing
Buffer Overflows
Packing Files
5. Scripting
Python
Powershell
Ruby
Perl
6. Post Exploitation
Mounting File Shares
Pivoting & Lateral Movement
Pivoting with Metersploit
Pivoting on Linux
Pivoting on Windows
Backdoors/Web Shells
Linux Post Exploitation
Extract Password
Windows Post-Exploitation
Enable RDP
Windows Commands
Mimikatz
Overpass Kerberos
Post With Powershell
General Web Pentest
Sql Injection
Sql login bypass
common CMS admin url and default login
Powered by
GitBook
3.2 Payloads Generation
Generating payloads
https://github.com/nccgroup/Winpayloads
https://github.com/nccgroup/Winpayloads
https://github.com/EmpireProject/Empire
Delivering payloads
https://github.com/MRGEffitas/Ironsquirrel
results matching "
"
No results matching "
"