🪬
Gzzcoo Pentest Notes
Ctrlk
HomeWalkthroughsCheat Sheet
  • Home
  • ACTIVE DIRECTORY PENTESTING
    • Initial Enumeration
    • Abusing Active Directory ACLs/ACEs
    • Active Directory Certificate Services (ADCS)
    • Attacking Kerberos
    • Attacking Domain Trusts
    • BloodHound
    • Tools
      • bloodyAD
      • Kerbrute
      • Impacket
      • ldapsearch
      • PowerView.py
  • WINDOWS PENTESTING
    • Windows Privilege Escalation
  • Windows Lateral Movement
  • File Transfer
  • Reverse Shell
  • PowerShell
  • LINUX PENTESTING
    • Basic Enumeration
    • Linux Privilege Escalation
  • File Transfer
  • Shells
  • Reverse Shell
  • Credential Hunting
  • Passwd, Shadow & Opasswd
  • NETWORK SERVICES PENTESTING
    • FTP Port (21)
    • SSH Port (22)
    • DNS Port (53)
    • SMB Port (139, 445)
    • MSSQL Port (1433)
    • MySQL Port (3306)
    • RDP Port (3389)
  • PostgreSQL Port (5432, 5433)
  • Attacking Email Services
  • Pivoting, Tunneling and Port Forwarding
  • WEB PENTESTING
    • Local File Inclusion (LFI)
  • LaTeX Injection
  • Cypher Injection
  • Cross-Site Scripting (XSS)
  • TOOLS
    • John The Ripper
    • NetExec
    • Smbmap
    • Evil-WinRM
  • REVERSING
    • Windows executables and DLL's
    • Android APK
Con tecnología de GitBook
En esta página

¿Te fue útil?

  1. ACTIVE DIRECTORY PENTESTING

Tools

bloodyADKerbruteImpacketldapsearchPowerView.py
AnteriorBloodHoundSiguientebloodyAD

¿Te fue útil?

LogoLogo

© 2025 Gzzcoo Corp.