GeorgeBanu
  • About me
  • Pentesting CheatSheets
    • Information Gathering
    • Ports Enumeration
      • FTP-21
      • SSH-22
      • Telnet-23
      • SMTP - 25,465,587
      • DNS-53
      • NetBIOS, SMB - 139,445
      • SNMP-161
      • MySQL-3306
      • RDP-3389
      • WinRM-5985
    • Web Cheat Sheet
    • Privilege Escalation
      • Linux Enumeration
      • Linux Privesc Techniques
    • Tricks
    • Template
  • TryHackMe Writeups
    • Starter
    • Dreaming
    • ColddBox: Easy
    • Ollie
    • Blog
    • KoTH Hackers
    • Brooklyn Nine Nine
    • Chill Hack
    • Undiscovered
    • Archangel
    • Jason
    • GLITCH
    • VulnNet: Node
    • Road
    • VulnNet:Internal
    • W1seGuy
  • CyberEDU Writeups
    • flag-is-hidden
    • file-crawler
    • reccon
    • this-file-hides-something
    • wifiland
    • old-tickets
    • inodat
    • pattern
    • ultra-crawl
  • eJPT
Powered by GitBook
On this page
  • Lab Setup
  • Reconnaissance
  • Ports Enumeration
  • Exploitation
  • Post Exploitaion
  • Reporting
  1. Pentesting CheatSheets

Template

Lab Setup

export directory=/path/to/directory

mkdir $directory
cd $directory
mkdir recon enumeration notes
touch notes/{README.md,creds,vulns}

export IP=
export URL=http://$IP
export domain= 

Reconnaissance

Network Reconnaissance

Hosts Eumeration

TCP Ports

UDP Ports

Vulns

Open Ports
Service
Version


Ports Enumeration

Analysis & Planning

Analyze the data collected to identify potential attack vectors. Use this information to plan your penetration test, such as what tools and exploits to use.


Exploitation


Post Exploitaion

Initial Access

Privilege Escalation


Reporting

Document all discovered vulnerabilities, exploited systems, and recommended remediation strategies in a detailed report for the client. Give solution for system hardening.

Vulnerabilities

  • First vuln

  • Second

  • Third

System hardening

PreviousTricksNextTryHackMe Writeups

Last updated 1 year ago