Skip to content

botesjuan/PenTestMethodology

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

356 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Penetration Testing Methodology



Buy Me A Coffee

Thanks for the supported coffee, \o/


  • Reconnaissance Unauthenticated
    • Initial Network Enumeration
    • Passive Reconnaissance
    • Active Host Discovery
    • Detect Active Directory Domain
    • MITM - LLMNR/NBT-NS Poisoning
    • Crack NTLMv2 hashes stolen
  • Enumeration Unauthenticated
    • RID Bruteforce Enumerate
    • Brute Forcing
    • Username as Password Attack
    • Password Spraying
  • Authenticated Initial Access
    • AD Password Policy
    • Vulnerability Scanning
    • ESC7 Certificate Authority
    • Coercing Authentication
    • PetitPotam - Authenticated
    • Coercer Tool Identify vulnerabilities
    • Active Directory Enumeration
      • Computer Account Admin
      • Users Generic Write All
      • Targeted Kerberoasting attack
    • Relay Attacks
      • NTLM Relay
    • Kerberos
    • Convert kirbi to Ccache
    • Dump KRBTGT Hash
  • Persistence or Lateral
    • ESC8 NTLM Relay to AD CS
      • Lab CA Configuration
      • Check CA for NTLM
      • CA Enumeration
      • Start NTLM Relay
      • Coercing DC
      • Stolen Certificate
      • Authenticate as DC
      • Computer DCSYNC Attack
      • User DCSYNC Attack
    • Certificate Authority Exploit ESC1..ESC16
    • Other Relay & MITM References
    • IPv6 attacks
  • Arsenal inventory reference of pentest commands
  • Reconnaissance
  • Enumeration
  • Research
  • Exploitation
    • Hosting
    • File transfer
    • Shells & Payloads
    • Cracking
    • Exploits
    • Metasploit
    • Code Reverse Engineering
  • POST Exploitation
    • Microsoft Windows / AD
    • Linux
  • Attacking Systems
    • Active Directory
    • Email / SMTP / Microsoft Exchange / Outlook Web Access
    • Printers
    • DNS
    • Oracle
    • Wireless
    • OT, SCADA, PLC & EWS
  • Android
  • IOS Apple
  • AWS
  • Google
  • Azure
  • Oracle
  • prompt injection
  • API exploit
  • agentic attacks
  • Microsoft Defender
  • Carbon Black
  • Falcon Crowdstrike
  • Sophos
  • Kaspersky

{
context:'AI LLM Agents are only as powerfull as the hands that use them.',  
objective:'Tools can reveal a crack in our armor.',
mission:'Our job is to identify and seal the cracks in the armor.',
principals:'Best hackers think like attackers, but act as protectors.',
vision:'Stay curious, stay ethical, and keep learning.'
}

About

A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages