• my big hackbook
  • Introduction
  • METHODOLOGY- CHECKLIST
  • Scanning & Enumeration
    • open port scan
    • Information Gathering
    • common services
      • DNS port 53
      • rpc
      • smb
      • smtp
      • pop3
      • snmp
      • mssql
      • webmin
      • ftp
      • telnet
      • tftp
      • ntp
      • oracle port 1521
      • rdp
    • vulnerability scanning
    • subnet reference
    • VLAN hopping
    • Port knocking
  • Exploitation
    • Finding Exploits
    • Payload generation
      • Msfvenom
      • php file uploader
    • manual exploitation
      • windows
  • bigtip
  • reverse shell
  • Powershell
  • OSCP
  • METHODOLOGY- CHECKLIST
Powered by GitBook

windows

https://stormsecurity.wordpress.com/2012/06/05/manual-pentesting-cheatsheet-windows/

https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit

http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf

https://www.scribd.com/document/100182787/Windows-Post-Exploitation-Command-List

https://github.com/mubix/post-exploitation

https://github.com/emilyanncr/Windows-Post-Exploitation

https://backdoorshell.gitbooks.io/oscp-useful-links/content/windows-post-exploitation.html

https://hackertor.com/2018/01/28/manual-post-exploitation-on-windows-pc-system-command/

http://www.hackingarticles.in/manual-post-exploitation-windows-pc-system-command/

https://www.windows-commandline.com/add-user-to-group-from-command-line/

https://www.askvg.com/how-to-launch-command-prompt-or-other-programs-using-ease-of-access-button-at-login-screen-in-windows-vista-and-7/

https://4sysops.com/archives/forgot-the-administrator-password-the-sticky-keys-trick/

https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/

results matching ""

    No results matching ""