Useful penetration testing tools Cheat Sheet
Highon.Coffee has published a useful high level overview of the typical commands you would run when performing a penetration test.
Here the table of contents:
Recon and Enumeration
SMB enumeration
Python Local Web Server
Mounting File Shares
Basic Finger Printing
SNMP Enumeration
DNS Zone Transfers
DNSRecon
HTTP / HTTPS Webserver Enumeration
Packet Inspection
Username Enumeration
Passwords
Brute Forcing Services
Password Cracking
Exploit Research
Windows Penetration Testing Commands
Linux Penetration Testing Commands
Compiling Exploits
- Identifying if C code is for Windows or Linux
- Build Exploit GCC
- GCC Compile 32Bit Exploit on 64Bit Kali
- Compile Windows .exe on Linux
SUID Binary
Reverse Shells
TTY Shells
- Python TTY Shell Trick
- Spawn Interactive sh shell
- Spawn Perl TTY Shell
- Spawn Ruby TTY Shell
- Spawn Lua TTY Shell
- Spawn TTY Shell from Vi
- Spawn TTY Shell NMAP
Metasploit
- Meterpreter Payloads
- Windows reverse meterpreter payload
- Windows VNC Meterpreter payload
- Linux Reverse Meterpreter payload
Meterpreter Cheat Sheet
Common Metasploit Modules
- Remote Windows Metasploit Modules (exploits)
- Local Windows Metasploit Modules (exploits)
- Auxilary Metasploit Modules
- Metasploit Powershell Modules
- Post Exploit Windows Metasploit Modules
Networking
IPv4
ASCII Table Cheat Sheet
CISCO IOS Commands
Cryptography
SQLMap Examples
Read the whole article at:
[embed]https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/[/embed]