KillChain Compendium: PenTest & Security Handbook
Go to file
Stefan Friese e3b5eaf747 added stuff 2023-03-28 21:30:56 +02:00
Cryptography bump 2023-03-25 15:31:51 +01:00
Enumeration bump 2023-03-25 15:31:51 +01:00
Exfiltration restructured exfiltration 2022-11-13 01:37:38 +01:00
Exploits added stuff 2023-03-28 21:30:56 +02:00
Forensics bump 2023-02-26 21:45:17 +01:00
Miscellaneous added stuff 2023-03-28 21:30:56 +02:00
Open Source Intelligence
Persistence further restructuring 2022-11-12 23:18:06 +01:00
Post Exploitation bump 2023-03-25 15:31:51 +01:00
Reverse Engineering bump 2023-02-14 21:05:04 +01:00
Reverse Shells smb exploit 2022-12-29 01:37:26 +01:00
Steganography further restructuring 2022-11-12 23:18:06 +01:00
README.md added stuff 2023-03-28 21:30:56 +02:00

README.md

Pentesting

Campaign

  • Checklist

  • vectr.io

  • Engagement --> Concept of Operations (CONOPS), Resource and Personnel Requirements, Timelines

  • Operations --> Operators, Known Information, Responsibilities

  • Mission --> Exact commands to run and execution time of the engagement

  • Remediation --> Report, Remediation consultation

Methodology

  • Steps
    • Reconnaissance
    • Enumeration/Scanning
    • Gaining Access
    • Privilege Escalation
    • Covering Tracks
    • Reporting

Reconnaissance

  • Duck / SearX / metacrawler / google
  • Wikipedia
  • Shodan.io
  • PeopleFinder.com
  • who.is
  • sublist3r
  • hunter.io
  • builtwith.com
  • wappalyzer

Enumeration

  • nmap
  • nikto
  • gobuster
  • dirbuster
  • metasploit
  • enum4linux / linpeas / winpeas / linenum

Exploitation

Post Exploitation

  • Pivoting

Privilege Escalation

  • Vertically or horizontally

Covering Tracks

Reporting

  • Includes
    • Vulnerabilities
    • Criticality
    • Description
    • Countermeasures
    • Finding summary

Frameworks