Internal Pentest
Scan
Host && Port Scanning
# Ping discovery, Top 20, fragment packets, no DNS resolution
sudo nmap -v --top-ports 20 X.X.X.0/24 -f -n --open -oA
# Ping discovery, Top 200, fragment packets, no DNS resolution, service version
sudo nmap -v --top-ports 200 X.X.X.0/24 -f -n -sV --open -oA
# Top 1000, fragment packets, no DNS resolution, service version, all alive (no ping)
sudo nmap -v --top-ports 1000 X.X.X.0/24 -f -n -sV -Pn --open -oAWeb detection
# httpx
cat ip.txt | httpx -silent -random-agent -status-code -timeout 15 -title -web-server -tech-detect -o httpx.txt
cat ip.txt | httpx -silent -ports <UNCOMMON.PORTS> -random-agent -status-code -timeout 15 -title -web-server -tech-detect -o httpx_uncommon.txtEnum
AD no credentials
AD with credentials
Attacks
LLMNR & NBT-NS Poisoning (Responder)
Kerberos
Dumps
AMSI Bypass
Common Exploits
PrivEsc
Local Privilege Escalation
Extra
Oneliners
Native commands
AV Bypasses
Last updated
Was this helpful?