Pentesting Cheatsheets

Reconnaissance / Enumeration

Extracting Live IPs from Nmap Scan

DNS lookups, Zone Transfers & Brute-Force

HTTP Brute-Force & Vulnerability Scanning

Listen on a port (Powershell)

Working with Restricted Shells

Uploading/POSTing Files Through WWW Upload Forms

PUTing File on the Webhost via PUT verb

Generating Payload Pattern & Calculating Offset

Bypassing File Upload Restrictions

Uploading .htaccess to interpret .blah as .php

Generating Payload with msfvenom

Compiling Code From Linux

Compiling Assembly from Windows

Local File Inclusion to Shell

Local File Inclusion: Reading Files

Remote File Inclusion Shell: Windows + PHP

SQL Injection to Shell or Backdoor

SQLite Injection to Shell or Backdoor

Upgradig Non-Interactive Shell

Python Input Code Injection

Local Enumeration & Privilege Escalation

Applocker: Writable Windows Directories

Find Writable Files/Folders in Windows

Check if Powershell Logging is Enabled

Check WinEvent Logs for SecureString Exposure

Check WinEvent for Machine Wake/Sleep times

Check if LSASS is running in PPL

Binary Exploitation with ImmunityDebugger

Setting up Simple HTTP server

MySQL User Defined Fuction Privilge Escalation

Docker Privilege Esclation

Uploading Files to Target Machine

Brute-forcing XOR'ed string with 1 byte key in Python

Generating Bad Character Strings

Converting Python to Windows Executable (.py -> .exe)

Port Scanning with NetCat

Port Scanning with Masscan

Exploiting Vulnerable Windows Services: Weak Service Permissions

Find File/Folder Permissions Explicitly Set for a Given User

AlwaysInstallElevated MSI

Stored Credentials: Windows

Port Forwarding / SSH Tunneling

Recursively Find Hidden Files: Windows

Post-Exploitation & Maintaining Access

Creating User and Adding to Local Administrators

Hide Newly Created Local administrator

Creating SSH Authorized Keys

Creating Backdoor User w/o Password

Creating Another root User

Generating OpenSSL Password

Code Execution / Application Whitelist Bypass

Last updated