Pentest Book
search
Ctrlk
  • /home/six2dez/.pentest-book
  • Contribute/Donatearrow-up-right-from-square
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enumchevron-right
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Files
    • SSL/TLS
    • Ports
    • Web Attackschevron-right
    • Web Technologieschevron-right
      • APIs
      • JS
      • ASP.NET
      • JWT
      • GitHub
      • GitLab
      • WAFs
      • Firebird
      • Wordpress
      • WebDav
      • Joomla
      • Jenkins
      • IIS
      • VHosts
      • Firebase
      • OWA
      • OAuth
      • Flask
      • Symfony && Twig
      • Drupal
      • NoSQL (MongoDB, CouchDB)
      • PHP
      • RoR (Ruby on Rails)
      • JBoss - Java Deserialization
      • OneLogin - SAML Login
      • Flash SWF
      • Nginx
      • Python
      • Tomcat
      • Adobe AEM
      • Magento
      • SAP
      • MFA/2FA
      • GWT
      • Jira
      • OIDC (Open ID Connect)
      • ELK
      • Sharepoint
      • Others
    • Cloudchevron-right
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
  • Post Exploitation
    • Linux
    • Pivoting
    • Windowschevron-right
  • Mobile
    • General
    • Android
    • iOS
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • LLM/AI/ML/prompt testing
    • Code review
    • Pentesting Web checklist
    • Internal Pentest
    • Web fuzzers review
    • Recon suites review
    • Subdomain tools review
    • Random
    • Master assessment mindmaps
    • BugBounty
    • Exploiting
    • tools everywhere
    • RT/EDR
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Enumerationchevron-right
  2. Web Technologies

Sharepoint

Good reference:

https://www.crummie5.club/the-lone-sharepoint/www.crummie5.clubchevron-right
LogoTales of sharepoint API misconfigurationsMediumchevron-right
PreviousELKchevron-leftNextOtherschevron-right

Last updated 3 years ago

Was this helpful?

Was this helpful?

# 1. Fuzz exposed endpoints 
# 2. Analyze misconfigs to gain auth access
# 3. Check the list of latest RCEs