yuyudhn's notes
  • About
  • πŸš‰QUICKSTART
    • Prerequisite
    • Reconnaissance
    • Exploitation
    • Post Exploitation
    • β›ˆοΈMisc
  • πŸͺŸActive Directory
    • Basic Command
    • Enumeration
      • PowerView
    • Service Exploitation
      • LDAP
      • SMB
        • MS17-010
      • MSSQL
    • Privilege Escalation
      • Unquoted Service Path
      • UAC Bypass
      • Token Abuse
    • Post Exploitation
      • Tunneling with Ligolo-ng
    • Credential Hunting
      • Group Policy Preferences
      • DPAPI
  • MITRE ATT&CK
    • Defense Evasion
      • Physical Attack: Remove EDR
      • AMSI Bypass
    • Credential Access
      • Dump SAM Hashes via Registry
  • 🐧Linux
    • Misc
    • Linux Post Exploitation
    • Linux Password Hunting
  • 🐚Backdoor Stuff
    • Simple PHP Webshell
    • MSFvenom Generate Payload
  • πŸ“³Mobile Pentest: iOS
    • iOS Penetration Testing
    • Objection
  • πŸ•ΈοΈWeb Application
    • Common Applications
      • Tomcat
      • Joomla
    • SSTI
    • File Inclusion
    • XSS
    • Misc
  • πŸ–ŠοΈMachine Writeup
    • HackTheBox
      • Perfection
      • Pilgrimage
      • PC
      • Shoppy
      • GoodGames
      • Photobomb
      • Support
Powered by GitBook
On this page
  • AD Resource / Checklists
  • Windows / AD Attack Tools
  • Linux Attack Tools
  • Pivoting
  • Thick Client Pentest
  • Other Useful Checklists
  • Living Off The Land Projects

Was this helpful?

  1. QUICKSTART

Misc

This page contain useful Web, Linux, Windows, and Active Directory Attack Cheatsheet

PreviousPost ExploitationNextBasic Command

Last updated 7 months ago

Was this helpful?

AD Resource / Checklists

Windows / AD Attack Tools

This is common tools for AD / Windows exploitation. I give the keyword, Google it how to use.

  • NetExec / CrackMapExec

  • Impacket

  • Bloodhound / Sharphound /Rusthound

  • Powersploit / PowerView / PowerUp

  • GhostPack-Compiled Binaries

  • PowerUpSQL

  • UACME (for UAC bypass)

  • Mimikatz / LaZagne

  • WinPEAS / Moriarty

  • Windows Exploit Suggester - Next Generation (WES-NG)

  • GodPotato (for Impersonate PE)

Linux Attack Tools

Common tools for Linux enumeration and exploitation.

  • LinPEAS

  • pspy

  • sund3num

  • traitor

Pivoting

Common tools for pivoting. Google it.

  • chisel

  • rpivot

  • sshuttle

  • ligolo

  • ligolo-ng

Thick Client Pentest

Common tools for thick client pentesting.

  • dnSpy / ILSpy (A .NET debugger and assembly editor)

Thick Client Playground:

Other Useful Checklists

Living Off The Land Projects

What is LOTL Technique?

Unlike traditional malware attacks, which leverage signature files to carry out the attack plan, LOTL attacks are fileless β€” meaning they do not require an attacker to install any code or scripts within the target system. Instead, the attacker uses tools that are already present in the environment, such as PowerShell, Windows Management Instrumentation (WMI) or the password-saving tool, Mimikatz, to carry out the attack.

Using native tools makes LOTL attacks far more difficult to detect, especially if the organization is leveraging traditional security tools that search for known malware scripts or files. Because of this gap in the security toolset, the hacker is often able to dwell undetected in the victim’s environment for weeks, months or even years.

(For DLL Hijacking Enumeration)

(Request sniffing and modification)

(For UI modification)

(For network monitoring)

(For Proccess Monitoring)

(For digital signature details enumeration)

Note: This page is incomplete and will be regularly updated. If you have any ideas or resources that need to be added, please contact me at .

πŸš‰
β›ˆοΈ
Active Directory Cheat Sheet
Living Off The Land Binaries, Scripts and Libraries
Red Teaming Toolkit
Active Directory Kill Chain Attack & Defense
OSEP Code Snippets
SharpCollection
Proccess Monitor
Echo Mirage
WinSpy
Wireshark
Proccess Hacker
Signcheck
https://github.com/srini0x00/dvta
https://notes.vulndev.io/wiki
https://www.thehacker.recipes/
https://notthehiddenwiki.com/
https://www.ired.team/
https://www.pudn.com/Download/item/id/1705669525391893.html
https://swisskyrepo.github.io/PayloadsAllTheThings/
Living Off The Land Active Directory
Living Off The Land Drivers
GTFOBins
Living Off The Land Binaries, Scripts and Libraries
Living Off The Land Applications
yuyudhn@gmail.com