Logo
KDSN

KALDEI’S SEC NOTES

1 – Enumeration

Enumeration step – a note for enumerating hosts, ports, subdomains, web paths, users, ...

2 – Vulns Assessment

Vulnerability Assessment step – a note for finding and assessing vulnerabilities.

3 - Active Directory Exploitation

Gaining Access step – a note for attacking Windows.

3 – Brute Force

Gaining Access step – a note for brute forcing passwords, login pages, archives, ...

3 – Reverse Shell

Gaining Access step – a note for obtaining a reverse shell on the target.

4 – Foothold

Foothold step – a note for confirming foothold and adding a little persistence.

5 – Privesc Linux

Privilege Escalation step – a note for elevating privileges on a Linux machine.

5 – Privesc Windows

Privilege Escalation step – a note for elevating privileges on a Windows machine.

6 – Post Exploitation

Post Exploitation step – a note for maintaining access and cleaning attacks traces.