Hacking Notes
What is this?
Active Directory
Basics
Domain Enumeration
Lateral Movement
Domain Persistence
Domain Privilege Escalation
Cross Forest Attacks
Forest Persistence
Active Directory Certificate Services
Hardening Active Directory
AD Attacks
Client Side Attacks
Evil PDF
Microsoft Office Macros
HTML Application (HTA)
Enumeration
Host Discovery
DNS Enumeration
OS Discovery
Port Scanning
WAF Evasion
Exploiting
Buffer Overflow
Windows BoF
Linux BoF
Hacking Wifi
Theory
Hacking Wifi - WEP
Hacking Wifi - WPA/WPA2 PSK
Hacking Wifi - WPA/WPA2 PEAP (Enterprise)
Movil
iOS
Other
Hacking AWS
Hacking with PowerShell
Hacking with Python
Post Exploitation
AV Evasion
Bypass UAC
Gathering Credentials
Password Cracking
Port Forwarding and Tunneling
Reverse Shell
Transfering Files
ATA Evasion
Bypass APPLocker
Privilege Escalation
Linux Privesc
Windows Privesc
Run Commands As
Reconnaissance
Information Gathering
Services
PORT 21/tcp - FTP
PORT 22/tcp - SSH
PORT 25/tcp - SMTP
PORT 53/tcp - DNS
PORT 80/tcp, 443/tcp - HTTP Server
PORT 111/tcp - RPCBind
PORT 143/tcp, 993/tcp - IMAP
PORT 139/tcp, 445/tcp - SMB
PORT 161/udp - SNMP
PORT 1100/tcp - Java RMI
PORT 1433/tcp - Microsoft SQL Server
PORT 2049/tcp - NFS
PORT 3306/tcp - MySQL Server
PORT 3389/tcp - RDP
Software
WordPress
Drupal
Tomcat
Jenkins
PyPI Server
OWA Exchange
Web
File Inclusion
Login Panes
SQL Injection (SQLi)
NoSQL Injection (NoSQLi)
Server Side Templates Injections (SSTI)
Unrestricted File Upload
OAuth 2.0 Bypass
Change Log
Exploiting
Buffer Overflow
Introduction