Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

README.md

This is a basic note for Red Teamers, Pentesters, Offsec Enthusiast, CTF Players etc

For Activity Directory notes check Active Directory.

You can use my script Hackify to install tools and wordlist on your linux system.

CTF Box Solving Manual

Recon Tools and Commands

  • Autorecon

  • Port Scan

    • nmap
      • Basic port scan nmap -Pn --min-rate 5000 -T5 -A -oN nmapBasic.txt $TARGET
      • All TCP port nmap -Pn --min-rate 5000 -T5 -A -p- -oN nmapfulltcp.txt $TARGET
      • All UDP port nmap -Pn --min-rate 5000 -T5 -A -sU -p- -oN nmapfulludp.txt $TARGET
      • TCP + UDP Scan with default scripts nmap -sC -sS -sU --min-rate 5000 -Pn -p- -T5 -A -oN nmapvuln.txt $TARGET
      • Windows AD Specific nmap -p 53,88,135,139,389,445,464,593,636,3268,3269,3389,5985,9389,49152-65535 --script smb-enum-shares,smb-enum-users,ldap-rootdse,ldap-search,krb5-enum-users,smb-os-discovery,smb-vuln-ms17-010,smb-enum-domains,smb-enum-sessions,smb-enum-processes,smb2-security-mode,smb2-capabilities,smb-system-info,msrpc-enum,smb-brute,rdp-enum-encryption,rdp-vuln-ms12-020,rdp-ntlm-info,ssl-cert,ssl-enum-ciphers,smb-protocols,ms-sql-info,smb-vuln-regsvc-dos -oN nmapAD.txt $TARGET
    • rustscan
      • TCP rustscan -r 1-65535 -a $TARGET -b 10000 -- -sC -sV -A -Pn
      • udp rustscan --udp -r 1-65535 -a $TARGET -b 10000 -- -sC -sV -A -Pn
    • naabu
      • tcp all naabu -p - -host $TARGET
      • naabu --nmap-cli "nmap -sC -sV -A -Pn" -p - -rate 10000 -host $TARGET
  • Domain or IP Recon

    • dig dig axfr @<ip_address> target.tld
  • Wordlist generator cewl http://domain.tld/ | grep -v CeWL > custom-wordlist.txt

  • Subdomain Enumeration

    • Gobuster gobuster vhost --append-domain -w /usr/share/seclists/Discovery/DNS/namelist.txt -r -u http://domain.tld
    • ffuf ffuf -w /usr/share/seclists/Discovery/DNS/dns-Jhaddix.txt:FUZZ -fw 18 -mc all -ac -u http://domain.tld -H 'Host: FUZZ.domain.tld' [For vpn file and ctf]
    • ffuf ffuf -w /usr/share/seclists/Discovery/DNS/dns-Jhaddix.txt:FUZZ -fw 18 -mc all -ac -u http://FUZZ.domain.tld [For Real World]
    • subauto [Use Hackify to install] subauto domain.tld [Very useful for real world subdomain enumeration.]
  • BruteForce: ssh, kerbrute or any other service using hydra, medusa or any specific tool like kerbrute etc.

  • Check outdated or vulnerable version for any service or software using exploitdb and google

  • Default Crecdentials, Check any software or service is using default credential or easy to crack username password