All the pages, taken from: https://github.com/N7WEra/Testing-notes/blob/master/SUMMARY.md
Enumerationarrow-up-right
Packet Capturearrow-up-right
Host Discoveryarrow-up-right
Services / Portsarrow-up-right
21 - FTParrow-up-right
22 - SSHarrow-up-right
25 - SMTParrow-up-right
53 - DNSarrow-up-right
67 - DHCParrow-up-right
79 - Fingerarrow-up-right
88 - Kerberosarrow-up-right
111 - RPCarrow-up-right
113 - identarrow-up-right
135 - MSRPCarrow-up-right
137 - Netbiosarrow-up-right
139/445 - SMBarrow-up-right
161 - SNMParrow-up-right
177 - XDMCParrow-up-right
363 - LDAParrow-up-right
500 - IKE (IPSEC)arrow-up-right
512/513 - R Servicesarrow-up-right
623 - IPMIarrow-up-right
1099 - Java RMIarrow-up-right
1433 - Microsoft SQLarrow-up-right
1521 - Oracle DBarrow-up-right
2049 - NFSarrow-up-right
3306 - MySQLarrow-up-right
3389 - RDParrow-up-right
5432 - PostgresSQLarrow-up-right
5900 - VNCarrow-up-right
5985 - WinRMarrow-up-right
6000 - X11arrow-up-right
6379 - Redisarrow-up-right
11211 - Memcachedarrow-up-right
RDSarrow-up-right
SQLitearrow-up-right
IPV6arrow-up-right
Scanningarrow-up-right
Transfering filesarrow-up-right
Pivoting and routesarrow-up-right
THC IPv6arrow-up-right
Gaining Accessarrow-up-right
IP Forwardingarrow-up-right
VLAN hoppingarrow-up-right
Psexecarrow-up-right
Upgrading shellarrow-up-right
Reverse Shells One-Linersarrow-up-right
Bruteforcearrow-up-right
MITM cleartext protocolsarrow-up-right
Null sessionarrow-up-right
LLMNR / NBT NS Spoofingarrow-up-right
Port knockingarrow-up-right
Downloading/Transfer filesarrow-up-right
Remote Desktoparrow-up-right
NAC Bypassarrow-up-right
Pass-The-Hasharrow-up-right
Exploitationarrow-up-right
Solarisarrow-up-right
IPv6arrow-up-right
Windowsarrow-up-right
Compiling Codearrow-up-right
SMB Vulnerabilitiesarrow-up-right
Kerberos Attacksarrow-up-right
Privilege Escalationarrow-up-right
Situational Awarenessarrow-up-right
Linuxarrow-up-right
Registryarrow-up-right
PowerViewarrow-up-right
FSMO Rolesarrow-up-right
Disable Apps and Firewallarrow-up-right
Add user scriptarrow-up-right
UAC Bypassarrow-up-right
icaclsarrow-up-right
SUID Shell scriptarrow-up-right
Automated toolsarrow-up-right
Metasploit Modulesarrow-up-right
Password Dumpingarrow-up-right
Breakoutarrow-up-right
LOLBasarrow-up-right
powershell constrained language byassarrow-up-right
Alternatives to command promptarrow-up-right
Windows utilitiesarrow-up-right
Applockerarrow-up-right
Restricted shellsarrow-up-right
Environmental Variables / Bypassing Path Restrictionsarrow-up-right
Presistancearrow-up-right
Pivotingarrow-up-right
Adding routesarrow-up-right
Password Crackingarrow-up-right
Hashcatarrow-up-right
Johnarrow-up-right
Cisco Passwordsarrow-up-right
Passwords Listsarrow-up-right
Toolsarrow-up-right
Nishangarrow-up-right
UACMEarrow-up-right
Bypass-UACarrow-up-right
MSBuildAPICallerarrow-up-right
Impacketarrow-up-right
SharpPersistarrow-up-right
Terminalsarrow-up-right
IP Calculationarrow-up-right
pwsharrow-up-right
psTools / Sysinternalsarrow-up-right
Unlock applockerarrow-up-right
enum4linuxarrow-up-right
Bloodhoundarrow-up-right
mitm6arrow-up-right
Enyxarrow-up-right
nfsshellarrow-up-right
Metasploitarrow-up-right
msfvenomarrow-up-right
Othersarrow-up-right
Last updated 5 years ago