🪬
Gzzcoo Pentest Notes
Ctrlk
HomeWalkthroughsCheat Sheet
  • Home
  • ACTIVE DIRECTORY PENTESTING
    • Initial Enumeration
    • Abusing Active Directory ACLs/ACEs
    • Active Directory Certificate Services (ADCS)
    • Attacking Kerberos
    • Attacking Domain Trusts
    • BloodHound
    • Tools
  • WINDOWS PENTESTING
    • Windows Privilege Escalation
      • Abusing Tokens
      • AD Recycle Bin Group
      • DnsAdmins to DomainAdmin
      • Dumping credentials
      • Server Operators Group
  • Windows Lateral Movement
  • File Transfer
  • Reverse Shell
  • PowerShell
  • LINUX PENTESTING
    • Basic Enumeration
    • Linux Privilege Escalation
  • File Transfer
  • Shells
  • Reverse Shell
  • Credential Hunting
  • Passwd, Shadow & Opasswd
  • NETWORK SERVICES PENTESTING
    • FTP Port (21)
    • SSH Port (22)
    • DNS Port (53)
    • SMB Port (139, 445)
    • MSSQL Port (1433)
    • MySQL Port (3306)
    • RDP Port (3389)
  • PostgreSQL Port (5432, 5433)
  • Attacking Email Services
  • Pivoting, Tunneling and Port Forwarding
  • WEB PENTESTING
    • Local File Inclusion (LFI)
  • LaTeX Injection
  • Cypher Injection
  • Cross-Site Scripting (XSS)
  • TOOLS
    • John The Ripper
    • NetExec
    • Smbmap
    • Evil-WinRM
  • REVERSING
    • Windows executables and DLL's
    • Android APK
Con tecnología de GitBook
En esta página

¿Te fue útil?

  1. WINDOWS PENTESTING

Windows Privilege Escalation

Abusing TokensAD Recycle Bin GroupDnsAdmins to DomainAdminDumping credentialsServer Operators Group
AnteriorPowerView.pySiguienteAbusing Tokens

¿Te fue útil?

LogoLogo

© 2025 Gzzcoo Corp.