πŸ“”CRTP Cheat Sheet

ToBeUpdated

Networking

Routing

# Linux
ip route

# Windows
route print

# Mac OS X / Linux
netstat -r

IP

# Linux
ip a
ip -br -c a

# Windows
ipconfig /all

# Mac OS X / Linux
ifconfig

ARP

Ports

Connect and Scan

Information Gathering

Passive

Google Dorks

DNS

Host Discovery

Footprinting & Scanning

Network Discovery

Enumeration

Nmap

Nmblookup

User Enumeration

Kerbrute

PowerView

  • Find all machines on the current domain where the current user has local admin access

  • Find computers where a domain admin (or specified user/group) has sessions:

  • List sessions on remote machines Users

Domain Enumeration

PowerView

BloodHound

SMB

SMB Enumeration and Common attacks

SMBMap

SMB Connection

Netexec

  1. Enumerate Domain Machines for SMB Signing

  2. Validate Credentials

  3. Find Valid Machines for Connection

  4. Enumerate Shared Resources

  5. Enumerate Users and Groups

  6. Dump LSA and NTDS If you have domain admin privileges:


PowerHuntShares

RPCClient

Enum4Linux

Hydra

We can use a wordlist generator tools (how Cewl), to create custom wordlists.

Metasploit

FTP

Nmap

Ftp Client

Hydra

SSH

Nmap

Netcat

SSH

Hydra

Metasploit

HTTP

Nmap

Alternative

Metasploit

SQL

Nmap

Hydra

Metasploit

SMTP

Nmap

Metasploit

Windows Exploitation

IIS WebDav / FTP

OPENSSH

SMB

MYSQL

SMB

RDP

WinRM

Payloads

MSFVenom shells

MSF Staged and Non Staged Payload

Windows Post-Exploitation

File system discovery

HTTP/HFS

Dump Hashes

Lateral Movement

Pass-The-Hash (PTH)

OverPass-The-Hash (Pass-the-Key)

DCSync Attack (Extracting Credentials from the Domain Controller)

Start Session

Windows Privilege Escalation

Kernel

UAC

Access Token

Windows Credential Dumping

Token Impersonation

Relaying

Unquoted Service Path

Persistence

Clearing tracks

Shells

Obfuscation

Transferring Files

Shells

TTY Shells

Dumping & Cracking

Tools Installation

Last updated