eJPTv2 Tree Notes
Search
CTRL + K
eJPTv2 Tree Notes
Search
CTRL + K
1. Assessment Methodologies
Active & Passive Recon
Active recon
Passive Recon
MetaSploit
!ntro MSF
Armitage
MSF Auxiliary Module
msfvenomβοΈ
Payloads
Services
HTTP (80)
Apache Tomcat
Directory Listing
HTTP
php
rejetto HFS (80)
Word Press
!ntro Services
01-FTP (21)β¬οΈ
02-SSH (22)
03-SMTP (25)
04-WebDAV (80,443)
05-Microsoft IIS (80,443)
06-DNS (53)
07-NetBIOS (137,138,139)
08-SNMP (161)
09-SMB (445)
10-Rsync 873
11-MSSQL (1433)
12-MySQL (3306)
13-NFS (2049)
14-RDP (3389)
15-WinRM (5985,5986)
Services
Shells
Bind Shells
meterpreter
Obfuscation
Reverse Shells
webshell
Tools
Brute Force
Hashcat πββ¬
John The Ripper
Directory bruteforce
Dirb
GoBuster
wfuzz
nmap
Scan Types
Ping Sweeping
netdiscover
nmap ποΈ
Useful Scans
PrivEsc Tools
UACMe
wesng
To Exploit WebDAV
Cadaver
Davtest
Binwalk
crackmapexec
Hydra π
John the Ripper
Nessus
Netcat
Powershell Empire
Tools
WordLists
Wordlists
2. Host Exploitation
AV Evasion
AV Evasion Techniques
Shellter
Exploits
Compiling Exploits
Exploitation
Linux
Exploits & Vulnerability
CVE-2014-6271 (ShellShock) Bash
Linux Exploit Suggester
Linux Password Hashes
Linux
Misplaced Passwords
Windows
Credential Dumping
Credential Dumping
Kiwi
MimiKatz
NTLM
Unattended Installation
Exploits & Vulnerability
CVE-2017-0144 (EternalBlue) SMB
CVE-2019-0708 (BlueKeep) RDP
Pass-The-Hash
SMB PsExec
Access Tokens
Alternate Data Streams
Persistence
Windows Exploits Suggester
Windows Services πͺ
Windows
2. Host Exploitation
Digital Garden Home
Alternate Data Streams
Embed data (Malware) in any file π²π²
Tutorial link:
:LiYoutube:
https://youtu.be/MZevjpUJ-I8