refabr1k's Pentest Notebook
  • refabr1k's Pentest Notebook
  • Steganography
  • Kali USB with persistence memory
  • useful tools
  • Understanding ICACLS permissions
  • INFO GATHERING
    • Port Knocking
    • 22 tcp - SSH
      • SSH Tunneling
    • 25 tcp - SMTP
    • 53 tcp/udp - DNS
    • 88 tcp - Kerberos
    • 161 udp - SNMP
    • 445 tcp - SMB
    • 1098,1099 tcp - Java RMI
    • 8009 tcp - AJP
    • 5901,5902 tcp - VNC
  • Web
    • XSS cookie stealing
    • PHP
    • Webdav
    • Wordpress
    • XML RPC
    • SQL Injection
    • SSRF
  • EXPLOITATION
    • File Transfers
    • Buffer Overflow
    • Bruteforce
      • Hashcat
      • Ophcrack (rainbow tables)
      • John The Ripper
    • PHP rce
    • Compiling
    • msfvenom
    • Reverse shell
    • Using ENV to escape Bad Characters
    • shellshock
    • Ncat Persistent Backdoor
  • PRIVESC - LINUX
    • Basic checks
    • Upgrading Shells
    • SUID
  • Privesc - Windows
    • Basic checks / powershell
    • Privesc Openings
    • LonelyPotato - SeImpersonatePrivilege
    • Enable RDP @ Firewall
    • NTLM (Pass The Hash)
  • Windows
    • NTDS.dit
    • Responder / SMB Relay
    • Attacking AD
      • AD Hacking Lab Setup
  • Metasploit
    • Basic Usage
    • Meterpreter
      • Pivoting
      • Windows Post Exploitation
  • Unsorted
    • other notes
  • eLearnSecurity eJPT
    • eJPT notes
  • OSWP
  • Getting started
  • WEP Attacks
    • WEP Attack (OPEN) - Clients connected
    • WEP Attack (OPEN) - Clientless
    • WEP Attack (SKA)
  • WPA/WPA2 Attacks
  • Scripts
    • get port from nmap
    • Curl response
    • ping sweep
    • iptables-counter.sh
    • (DNS) zonetransfer_check.sh
    • (DNS) dns-rev-brute.sh
    • (DNS) dns-fwd-brute.sh
    • (SMB) vuln-scan.sh
    • (SMB) samba-checker.sh
    • (SMTP) vrfy.py
    • (SNMP) mib-check.sh
  • Zeroday vulnerabilities explained
    • 2020-12 Solarwind supply chain
Powered by GitBook
On this page
  • Must read
  • Must do
  • Must use

Was this helpful?

refabr1k's Pentest Notebook

Hello! refabr1k is my handle and I'm a pentester. I originally created this for my OSCP prep, but now I use this note book as reference when I'm performing pentesting. Feel free to use for your gain!

NextSteganography

Last updated 5 years ago

Was this helpful?

:bulb: Use the search function to look for a command.

Must read

Must do

  • Try harder

Must use

Windows Privilege Escalation -

Linux Privilege Escalation -

hakluke's OSCP guide pt. 1 -

hakluke's OSCP guide pt. 2 -

hakluke's OSCP guide pt. 3 -

Abatchy's OSCP guide -

TJnull's OSCP study guide -

James Hall's OSCP Prep -

KongWenBin OSCP Review -

TJnull's HTB and Vulnhub machines -

Georgia Weidman's Cybrary Pentest Course (Free!) -

OverTheWire: Bandit linux challenges -

Windows/Linux Privesc Workshop (lpeworkshop) -

Metasploit Unleashed -

SecLists wordlists -

PentestMonkey cheatsheet -

PayloadsAllTheThings cheatsheet -

OSCP Prep Discord Channel -

SecWiki windows kernel exploits -

AutoRecon.py -

OBS Recorder for OSCP EXAM -

https://www.fuzzysecurity.com/tutorials/16.html
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440
https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-2-workflow-and-documentation-tips-9dd335204a48
https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97
https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html
https://411hall.github.io/OSCP-Preparation/
https://kongwenbin.wordpress.com/2017/02/23/officially-oscp-certified/
https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html#vulnerable-machines
https://www.cybrary.it/course/advanced-penetration-testing/
https://overthewire.org/wargames/bandit/
https://github.com/sagishahar/lpeworkshop
https://www.offensive-security.com/metasploit-unleashed/
https://github.com/danielmiessler/SecLists
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://github.com/swisskyrepo/PayloadsAllTheThings
https://discord.gg/2AG6TCm
https://github.com/SecWiki/windows-kernel-exploits
https://github.com/Tib3rius/AutoRecon
https://obsproject.com/
Logorefabr1k's Pentest Notebookrefabr1k's Pentest Notebook