No Skids Allowed! A Pentester's Primer

Table of Contents

  • Fundamentals
  • Tools and Techniques
  • Walk-Throughs
    • HackTheBox
      • Legacy
        • Enumeration
        • Vulnerability Assessment
        • Exploitation
        • Capturing Flags
      • Lame
    • VulnHub
  • Quick Reference
  • Glossary
No Skids Allowed! A Pentester's Primer
  • Docs »
  • Walk-Throughs »
  • HackTheBox »
  • Legacy
  • View page source

Legacy¶

Difficulty

Easy

Reference

The Metasploit Framework: Hacking on Rails

Meterpreter: MSF’s Premier Payload

Nmap: the Network Mapper

SearchSploit: a Searchable Database of Exploits

Windows Post-Exploitation

Walk-Through Contents

  • Enumeration
    • Pinging the Target
    • Scanning for Ports
    • Identifying Services
  • Vulnerability Assessment
    • Finding Vulnerabilities with Google
    • Finding Exploits with SearchSploit
    • Confirming Vulnerabilities with Nmap Scripting Engine
  • Exploitation
  • Capturing Flags
Next → ← Previous

© Copyright 2019, Christopher M. Steffen.

Built with Sphinx.