๐ฟRed Teaming All The Things
About Red Teaming All The Things
Scanning & Enumeration
Port Scanning
nmap -sC -sV -p- --min-rate 10000 x.x.x.xnmap -A -sS -Pn -n x.x.x.xnmap -sU -p- --max-retries 0 --min-rate 500 x.x.x.xWeb Fuzzing
gobuster dns -d haxtables.htb -w ~/Tools/SecLists/Discovery/DNS/subdomains-top1million-20000.txtgobuster -u x.x.x.x -w /usr/share/seclists/Discovery/Web_Content/common.txt -t 20gobuster -u x.x.x.x -w /usr/share/seclists/Discovery/Web_Content/quickhits.txt -t 20gobuster -u x.x.x.x -w /usr/share/seclists/Discovery/Web_Content/common.txt -t 20 -x .txt,.phpwfuzz -w /usr/share/seclists/Discovery/Web_Content/common.txt --hc 400,404,500 http://x.x.x.x/FUZZwfuzz -w /usr/share/seclists/Discovery/Web_Content/quickhits.txt --hc 400,404,500 http://x.x.x.x/FUZZSMB
SNMP
Git
PHP filter chain generator
Enumerate for Web
Enumerate for Linux
DNS Zone Transfer
WPscan
id_rsa
Dirsearch
Linux Privilege Escalation
find SUID
Ubuntu 16.04 4.4 Exploit
Linux privilege escalation
Spawn Interactive Shell and set env
Restricted bash
Automated scripts
Check environment
Applications and services
Application config files
Jobs / CRONS
Network
USER and sensitive info
FileSystem
Find SUID Files
Writable file and nobody files
Writable by current user
Any script files that we can modify?
Any service running by root?
Find password
Exploitation techniques
SUID
Is there a custom SUID / SUDO application?
NFS priv esc
Linux capability
Mysql run by root
Docker group
SSH bad keys attack
LINKS
Windows Privilege Escalation
Windows
Windows Privilege Escalation
Check OS, Patch level, Basic
Firewall / AV / Defender
Network
Checklist automated tools
Installed applications and services
Scheduled Tasks
Startups and autoruns
Service Permissions
Unquoted Service Path
AlwaysInstallElevated << IF 64 bits use: %SystemRoot%\Sysnative\reg.exe
Service only available from inside
Pasword in files
Registry
LINK
Last updated