πeJPT Cheat Sheet
Networking
Routing
# Linux
ip route
# Windows
route print
# Mac OS X / Linux
netstat -rIP
# Linux
ip a
ip -br -c a
# Windows
ipconfig /all
# Mac OS X / Linux
ifconfigARP
Ports
Connect and Scan
Information Gathering
Passive
Google Dorks
DNS
Host Discovery
Footprinting & Scanning
Network Discovery
Enumeration
SMB
Nmap
Nmblookup
SMBMap
SMB Connection
RPCClient
Enum4Linux
Hydra
Metasploit
FTP
Nmap
Ftp Client
Hydra
SSH
Nmap
Netcat
SSH
Hydra
Metasploit
HTTP
Nmap
Alternative
Metasploit
SQL
Nmap
Hydra
Metasploit
SMTP
Nmap
Metasploit
Vulnerability Assessment
Host Based Attacks
Windows Exploitation
IIS WEBDAV
SMB
Nmap
Metasploit
RDP
WINRM
Windows Privilege Escalation
Kernel
UAC
Access Token
Windows Credential Dumping
Linux Exploitation
Shellshock
FTP
SSH
SAMBA
Linux Privilege Escalation
Kernel
Cron Jobs
SUID
Linux Credential Dumping
Network Based Attacks
Wireshark
TShark
Metasploit
Meterpreter
Info Gathering & Enumeration
Vulnerability Scanning
Payloads
MSFVenom shells
MSF Staged and Non Staged Payload
Win Exploitation
Default MSF Start
HFS
SMB
WINRM
TOMCAT
Linux Exploitation
FTP
SAMBA
SSH
SMTP
Post-Exploitation Fundamentals
Win Post-Exploitation
To search for files and Folders
HTTP/HFS
UAC
TOKEN IMPERSONATION
DUMP HASHES
PERSISTENCE
CLEARING
PIVOTING
Linux Post-Exploitation
Armitage
Exploitation
Vulnerability Scanning
Exploits
Shells
Frameworks
Win Exploitation
IIS/FTP
OPENSSH
SMB
MYSQL
Linux Exploitation
VSFTPD
Obfuscation
Post-Exploitation
Win Local Enumeration
Linux Local Enumeration
Transferring Files
Shells
TTY Shells
Win Privilege Escalation
Linux Privilege Escalation
Win Persistence
Linux Persistence
Dumping & Cracking
Windows
Linux
Pivoting
Clearing Tracks
Social Engineering
Web Application Penetration Testing
Tools
Enumeration & Scanning
Attacks
SQLMap
Check if injection exists
Get database if injection Exists
Get OS-Shell
XSS
Hydra
Wordpress
Basic Information
Main WordPress Files
Users Permissions
Passive Enumeration
Get WordPress version


Get Plugins
Get Themes
Extract versions in general
Active enumeration
Plugins and Themes
Users
ID Brute
Login username enumeration
WPScan
Drupal
Discovery
Enumeration
Version
Username enumeration
Register

Request new password


Get number of users


Hidden pages
Installed modules info
Automatic
RCE
With PHP Filter Module


Install PHP Filter Module
Backdoored Module
Post Exploitation
Read settings.php
Dump users from DB
[CVE-2018-7600] Drupalgeddon 2
References (tranks to all):
Last updated