Anonymity

Anonimity

============

Information Gathering

Active Gathering

Services

Passive Gathering

============

Exploitation

Linux - Exploitation

CVE

Windows - Exploitation

Web Application

File Traversal (LFI - RFI)
Injection
File Upload
Access Control
Session Management
Authentication
CMS

Network

Social Engineering

============

Post-Exploitation

Linux - Post-Exploitation

Enumeration Post-Exploitation
Linux privilege escalation techniques:
Commands
Cron
CVE

 

Windows - Post-Exploitation

CVE Exploits
Enumeration Post-Exploitation

============

Reporting

  • Nothing here yet

============

Tools

Vulnerability scanner

Processes

Password

DOS

Network

Wireless
  • Nothing here yet

Web Application

Enumeration
Dir search
CMS
SQLi