πCRTP Cheat Sheet
ToBeUpdated
Networking
Routing
# Linux
ip route
# Windows
route print
# Mac OS X / Linux
netstat -rIP
# Linux
ip a
ip -br -c a
# Windows
ipconfig /all
# Mac OS X / Linux
ifconfigARP
Ports
Connect and Scan
Information Gathering
Passive
Google Dorks
DNS
Host Discovery
Footprinting & Scanning
Network Discovery
Enumeration
Nmap
Nmblookup
User Enumeration
Kerbrute
PowerView
Find all machines on the current domain where the current user has local admin access
Find computers where a domain admin (or specified user/group) has sessions:
List sessions on remote machines Users
Domain Enumeration
PowerView
BloodHound
SMB
SMB Enumeration and Common attacks
SMBMap
SMB Connection
Netexec
Enumerate Domain Machines for SMB Signing
Validate Credentials
Find Valid Machines for Connection
Enumerate Shared Resources
Enumerate Users and Groups
Dump LSA and NTDS If you have domain admin privileges:
PowerHuntShares
RPCClient
Enum4Linux
Hydra
We can use a wordlist generator tools (how Cewl), to create custom wordlists.
Metasploit
FTP
Nmap
Ftp Client
Hydra
SSH
Nmap
Netcat
SSH
Hydra
Metasploit
HTTP
Nmap
Alternative
Metasploit
SQL
Nmap
Hydra
Metasploit
SMTP
Nmap
Metasploit
Windows Exploitation
IIS WebDav / FTP
OPENSSH
SMB
MYSQL
SMB
RDP
WinRM
Payloads
MSFVenom shells
MSF Staged and Non Staged Payload
Windows Post-Exploitation
File system discovery
HTTP/HFS
Dump Hashes
Lateral Movement
Pass-The-Hash (PTH)
OverPass-The-Hash (Pass-the-Key)
DCSync Attack (Extracting Credentials from the Domain Controller)
Start Session
Windows Privilege Escalation
Kernel
UAC
Access Token
Windows Credential Dumping
Token Impersonation
Relaying
Unquoted Service Path
Persistence
Clearing tracks
Shells
Obfuscation
Transferring Files
Shells
TTY Shells
Dumping & Cracking
Tools Installation
Last updated