eJPTv2 Tree Notes
Search
CTRL + K
eJPTv2 Tree Notes
Search
CTRL + K
1. Assessment Methodologies
Active & Passive Recon
Active recon
Passive Recon
MetaSploit
!ntro MSF
Armitage
MSF Auxiliary Module
msfvenom⚕️
Payloads
Services
HTTP (80)
Apache Tomcat
Directory Listing
HTTP
php
rejetto HFS (80)
Word Press
!ntro Services
01-FTP (21)⬇️
02-SSH (22)
03-SMTP (25)
04-WebDAV (80,443)
05-Microsoft IIS (80,443)
06-DNS (53)
07-NetBIOS (137,138,139)
08-SNMP (161)
09-SMB (445)
10-Rsync 873
11-MSSQL (1433)
12-MySQL (3306)
13-NFS (2049)
14-RDP (3389)
15-WinRM (5985,5986)
Services
Shells
Bind Shells
meterpreter
Obfuscation
Reverse Shells
webshell
Tools
Brute Force
Hashcat 🐈⬛
John The Ripper
Directory bruteforce
Dirb
GoBuster
wfuzz
nmap
Scan Types
Ping Sweeping
netdiscover
nmap 👁️
Useful Scans
PrivEsc Tools
UACMe
wesng
To Exploit WebDAV
Cadaver
Davtest
Binwalk
crackmapexec
Hydra 🐉
John the Ripper
Nessus
Netcat
Powershell Empire
Tools
WordLists
Wordlists
2. Host Exploitation
AV Evasion
AV Evasion Techniques
Shellter
Exploits
Compiling Exploits
Exploitation
Linux
Exploits & Vulnerability
CVE-2014-6271 (ShellShock) Bash
Linux Exploit Suggester
Linux Password Hashes
Linux
Misplaced Passwords
Windows
Credential Dumping
Credential Dumping
Kiwi
MimiKatz
NTLM
Unattended Installation
Exploits & Vulnerability
CVE-2017-0144 (EternalBlue) SMB
CVE-2019-0708 (BlueKeep) RDP
Pass-The-Hash
SMB PsExec
Access Tokens
Alternate Data Streams
Persistence
Windows Exploits Suggester
Windows Services 🪟
Windows
2. Host Exploitation
Digital Garden Home
Windows Exploits Suggester
MSF Module:
post/multi/recon/local_exploit_suggester