📘
Hacktricks
  • GitHub: Welcome to the page where you will find each trick/technique/whatev
  • About the author
  • Getting Started in Hacking
  • Pentesting Methodology
  • External Recon Methodology
  • Phishing Methodology
  • Exfiltration
  • Tunneling and Port Forwarding
  • Brute Force - CheatSheet
  • Search Exploits
  • shells
    • Shells (Linux, Windows, MSFVenom)
  • linux-unix
    • Checklist - Linux Privilege Escalation
    • Linux Privilege Escalation
    • Useful Linux Commands
    • Linux Environment Variables
  • macos
    • MacOS Security & Privilege Escalation
  • windows
    • Checklist - Local Windows Privilege Escalation
    • Windows Local Privilege Escalation
    • Active Directory Methodology
    • NTLM
    • Stealing Credentials
    • Authentication, Credentials, UAC and EFS
    • Basic CMD for Pentesters
    • Basic PowerShell for Pentesters
    • AV Bypass
  • mobile-apps-pentesting
    • Android APK Checklist
    • Android Applications Pentesting
    • iOS Pentesting Checklist
    • iOS Pentesting
  • pentesting
    • Pentesting Network
  • Stargazers
  • blob
    • master
      • hacktricks/LICENSE.md at master
  • network
    • Forks
  • Issues
  • Pull requests
  • Actions
  • Projects
  • GitHub: Welcome to the page where you will find each trick/technique/whatev
  • Build software better, together
  • Pulse
  • tree
    • Build software better, together
    • GitHub at 1e46f267c2ce5c79bb9a8a146f468f214419f708
    • master
      • .gitbook
        • hacktricks/.gitbook/assets at master
      • hacktricks/.github at master
      • a.i.-exploiting
        • hacktricks/a.i.-exploiting/bra.i.nsmasher-presentation at master
      • hacktricks/backdoors at master
      • hacktricks/blockchain at master
      • hacktricks/cloud-security at master
  • Branches
  • Releases
  • Commits
    • Commits
  • Commits
  • commit
    • GitBook: [master] one page modified@1e46f26
    • GitBook: [master] 3 pages and 6 assets modified@e741d40
    • Update FUNDING.yml@c7e5a37
    • GitBook: [master] one page modified@5b5b28a
    • GitBook: [master] 511 pages and one asset modified@73a4b96
Powered by GitBook
On this page
  • 0- Physical Attacks
  • 5- Pentesting Services
  • 5.2 Brute-Forcing services
  • 7- Inside
  • 9- Privilege Escalation
  • 9.1- Local Privesc
  • 9.2- Domain Privesc
  • 10 - POST
  • 10.1 - Looting
  • 10.2 - Persistence
  • 11 - Pivoting
  • MORE
  • Exploiting
  • Crypto tricks

Was this helpful?

Pentesting Methodology

PreviousGetting Started in HackingNextExternal Recon Methodology

Last updated 3 years ago

Was this helpful?

Do you use Hacktricks every day? Did you find the book very useful? Would you like to receive extra help with cybersecurity questions? Would you like to find more and higher quality content on Hacktricks? so we can dedicate more time to it and also get access to the Hacktricks private group where you will get the help you need and much more!

If you want to know about my latest modifications/additions or you have any suggestion for HackTricks or PEASS, join the ​, or follow me on Twitter ​. If you want to share some tricks with the community you can also submit pull requests to that will be reflected in this book and don't forget to give ⭐ on github to motivate me to continue developing this book.

0- Physical Attacks

Depending if the test you are perform is an internal or external test you may be interested on finding hosts inside the company network (internal test) or finding assets of the company on the internet (external test).

Note that if you are performing an external test, once you manage to obtain access to the internal network of the company you should re-start this guide.

Once you know which services are running, and maybe their version, you have to search for known vulnerabilities. Maybe you get lucky and there is a exploit to give you a shell...

5- Pentesting Services

If there isn't any fancy exploit for any running service, you should look for common misconfigurations in each service running.

Inside this book you will find a guide to pentest the most common services (and others that aren't so common). Please, search in the left index the PENTESTING section (the services are ordered by their default ports).

If your service is not inside the index, search in Google for other tutorials and let me know if you want me to add it. If you can't find anything in Google, perform your own blind pentesting, you could start by connecting to the service, fuzzing it and reading the responses (if any).

5.2 Brute-Forcing services

If at this point you haven't found any interesting vulnerability you may need to try some phishing in order to get inside the network. You can read my phishing methodology here:

Specially in Windows you could need some help to avoid antiviruses: **[Check this page](windows/av-bypass.md).**

7- Inside

If you have troubles with the shell, you can find here a small compilation of the most useful commands for pentesters:

9- Privilege Escalation

9.1- Local Privesc

9.2- Domain Privesc

10 - POST

10.1 - Looting

10.2 - Persistence

TODO: Complete persistence Post in Windows & Linux

11 - Pivoting

MORE

Exploiting

Crypto tricks

Do you have physical access to the machine that you want to attack? You should read some and others about .

This section only applies if you are performing an internal test. Before attacking a host maybe you prefer to steal some credentials from the network or sniff some data to learn passively/actively(MitM) what can you find inside the network. You can read .

The first thing to do when looking for vulnerabilities in a host is to know which services are running in which ports. Let's see the.

I want to make a special mention of the part (as it is the most extensive one). Also, a small guide on how to can be found here.

There are also several tools that can perform automatic vulnerabilities assessments. I would recommend you to try , which is the tool that I have created and it's based on the notes about pentesting services that you can find in this book.

In some scenarios a Brute-Force could be useful to compromise a service. .

Somehow you should have found some way to execute code in the victim. Then, .

You will probably need to extract some data from the victim or even introduce something (like privilege escalation scripts). Here you have a .

If you are not root/Administrator inside the box, you should find a way to escalate privileges. Here you can find a guide to escalate privileges locally in and in . You should also check this pages about how does Windows work:

How to in Windows

Some tricks about ​

Don't forget to checkout the best tools to enumerate Windows and Linux local Privilege Escalation paths: ​

Here you can find a . Even if this is just a subsection of a section, this process could be extremely delicate on a Pentesting/Red Team assignment.

Check if you can find more passwords inside the host or if you have access to other machines with the privileges of your user. Find here different ways to .

Use 2 o 3 different types of persistence mechanism so you won't need to exploit the system again. Here you can find some .

With the gathered credentials you could have access to other machines, or maybe you need to discover and scan new hosts (start the Pentesting Methodology again) inside new networks where your victim is connected. In this case tunnelling could be necessary. Here you can find . You definitely should also check the post about . There you will find cool tricks to move laterally, escalate privileges and dump credentials. Check also the page about , it could be very useful to pivot on Windows environments..

​​

tricks about physical attacks
escaping from GUI applications
Pentesting Network
basic tools to scan ports of hosts
Pentesting Web
find known vulnerabilities in software
Legion
Find here a CheatSheet of different services brute forcing
a list of possible tools inside the system that you can use to get a reverse shell would be very useful
post about common tools that you can use with these purposes
Linux
Windows
steal credentials
Active Directory
Suite PEAS
methodology explaining the most common actions to enumerate, escalate privileges and persist on an Active Directory
dump passwords in Windows
persistence tricks on active directory
a post talking about tunnelling
Active Directory pentesting Methodology
NTLM
Buy me a coffee here
Support Hacktricks through github sponsors
💬
telegram group
🐦
@carlospolopm
https://github.com/carlospolop/hacktricks