{"version":1,"pages":[{"id":"-M4xwwkZgXlhRXNakgA3","title":"Initial page","pathname":"/","siteSpaceId":"sitesp_UQP1V","description":"Welcome to N7W Era (Newerasec.com) penetration testing notes."},{"id":"-M76zHCVepbIXntlDkbZ","title":"Table Of Content","pathname":"/table-of-content","siteSpaceId":"sitesp_UQP1V","description":"All the pages, taken from: https://github.com/N7WEra/Testing-notes/blob/master/SUMMARY.md"},{"id":"-M4y-qyZiKOThidpA3xJ","title":"Enumeration","pathname":"/infrastructure-testing/enumeration","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M4y49SGkEtugZbe1anP","title":"Packet Capture","pathname":"/infrastructure-testing/enumeration/packet-capture","siteSpaceId":"sitesp_UQP1V","description":"Packet capture is a computer networking term for intercepting a data packet that is crossing or moving over a specific computer network.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"}]},{"id":"-M4y4tUdliv3Tiyb6sXe","title":"Host Discovery","pathname":"/infrastructure-testing/enumeration/host-disocvery","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"}]},{"id":"-M4y5CwIy5nldOCTCrFq","title":"Services / Ports","pathname":"/infrastructure-testing/enumeration/services-ports","siteSpaceId":"sitesp_UQP1V","description":"Specific services/ports enumeration","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"}]},{"id":"-M5CPj9-GCd8Dtm1ObCh","title":"21 - FTP","pathname":"/infrastructure-testing/enumeration/services-ports/ftp","siteSpaceId":"sitesp_UQP1V","description":"The File Transfer Protocol is a standard network protocol used for the transfer of computer files between a client and server on a computer network.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5CREvQYPHvxLyg-W4O","title":"22 - SSH","pathname":"/infrastructure-testing/enumeration/services-ports/ssh","siteSpaceId":"sitesp_UQP1V","description":"Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. applications include remote command-line, login, and remote command execution.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DAlSyg174Y2LBvnF7","title":"25 - SMTP","pathname":"/infrastructure-testing/enumeration/services-ports/smtp","siteSpaceId":"sitesp_UQP1V","description":"The Simple Mail Transfer Protocol is a communication protocol for electronic mail transmission.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5Co69hdMUwdlX683qg","title":"53 - DNS","pathname":"/infrastructure-testing/enumeration/services-ports/dns","siteSpaceId":"sitesp_UQP1V","description":"The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5CvPIm9hoKD2hUATKy","title":"67 - DHCP","pathname":"/infrastructure-testing/enumeration/services-ports/dhcp","siteSpaceId":"sitesp_UQP1V","description":"The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks whereby a DHCP server dynamically assigns an IP address.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-MAfooTOd-5sr9hB0hb5","title":"69 - TFTP","pathname":"/infrastructure-testing/enumeration/services-ports/69-tftp","siteSpaceId":"sitesp_UQP1V","description":"Trivial File Transfer Protocol is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWCa5agSzTWhYhso0","title":"79 - Finger","pathname":"/infrastructure-testing/enumeration/services-ports/finger","siteSpaceId":"sitesp_UQP1V","description":"Finger is a program you can use to find information about computer users.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M772gaadd4EGWd-FIqz","title":"88 - Kerberos","pathname":"/infrastructure-testing/enumeration/services-ports/88-kerberos","siteSpaceId":"sitesp_UQP1V","description":"Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure way.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DFaYY_ACQzyVQ0ND6","title":"111 - RPC","pathname":"/infrastructure-testing/enumeration/services-ports/rpc","siteSpaceId":"sitesp_UQP1V","description":"Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWExpQvVboBfCW8VD","title":"113 - ident","pathname":"/infrastructure-testing/enumeration/services-ports/ident","siteSpaceId":"sitesp_UQP1V","description":"Internet protocol that helps identify the user of a particular TCP connection. One popular daemon program for providing the ident service is identd.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M774KIHHshr7pQrkUsm","title":"135 - MSRPC","pathname":"/infrastructure-testing/enumeration/services-ports/135-msrpc","siteSpaceId":"sitesp_UQP1V","description":"Microsoft RPC is a modified version of DCE/RPC.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DFxsM_7V-3rqJhQvM","title":"137 - Netbios","pathname":"/infrastructure-testing/enumeration/services-ports/netbios","siteSpaceId":"sitesp_UQP1V","description":"NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DEA-9xGZAJenr3uG9","title":"139/445 - SMB","pathname":"/infrastructure-testing/enumeration/services-ports/smb","siteSpaceId":"sitesp_UQP1V","description":"The Microsoft Server Message Block protocol was often used with NetBIOS over TCP/IP (NBT) over UDP, using port numbers 137 and 138, and TCP port numbers 137 and 139.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5CwBd053qBm-L0qZZI","title":"161 - SNMP","pathname":"/infrastructure-testing/enumeration/services-ports/snmp","siteSpaceId":"sitesp_UQP1V","description":"UDP 161 - Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWC550gJv8TiXbBay","title":"177 - XDMCP","pathname":"/infrastructure-testing/enumeration/services-ports/xdmcp","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DIjpL9LGuiU6GHBGl","title":"363 - LDAP","pathname":"/infrastructure-testing/enumeration/services-ports/ldap","siteSpaceId":"sitesp_UQP1V","description":"The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-MHzj6C4vV9kFJq5oe61","title":"443 - HTTPS","pathname":"/infrastructure-testing/enumeration/services-ports/443-https","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5D-EoH2XDtr2Az-fN6","title":"500 - IKE (IPSEC)","pathname":"/infrastructure-testing/enumeration/services-ports/ike","siteSpaceId":"sitesp_UQP1V","description":"IKE is aprt of IPSec protocol, which is part of VPN's, it uses UDP port 500","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DGpt46yJ5WrCoC9tM","title":"512/513/514 - R Services","pathname":"/infrastructure-testing/enumeration/services-ports/rservices","siteSpaceId":"sitesp_UQP1V","description":"The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWFgq-9x--apWPI4j","title":"623 - IPMI","pathname":"/infrastructure-testing/enumeration/services-ports/ipmi","siteSpaceId":"sitesp_UQP1V","description":"Intelligent Platform Management Interface (IPMI)  is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities independently.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-MIds9K8OxoPiaxZ7PWX","title":"873 - RSYNC","pathname":"/infrastructure-testing/enumeration/services-ports/873-rsync","siteSpaceId":"sitesp_UQP1V","description":"Rsync is a utility for transferring and synchronizing files between two servers (usually Linux).","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5mMyPUy1tCcNf_4_1f","title":"1099 - Java RMI","pathname":"/infrastructure-testing/enumeration/services-ports/1099-java-rmi","siteSpaceId":"sitesp_UQP1V","description":"Java Remote Method Invocation (Java RMI) is a Java API that performs remote method invocation, the object-oriented equivalent of remote procedure calls (RPC)","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M6ij3G8JsP5ahX3745U","title":"1433 - Microsoft SQL","pathname":"/infrastructure-testing/enumeration/services-ports/1433-microsoft-sql","siteSpaceId":"sitesp_UQP1V","description":"Microsoft SQL Server is a relational database management system developed by Microsoft.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M6jHg42LfQLkWwVsGOK","title":"1521 - Oracle DB","pathname":"/infrastructure-testing/enumeration/services-ports/1521-oracle-db","siteSpaceId":"sitesp_UQP1V","description":"Oracle Database is a multi-model database management system produced and marketed by Oracle Corporation.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5DBgBbYQSOWYTzPK7d","title":"2049 - NFS","pathname":"/infrastructure-testing/enumeration/services-ports/nfs","siteSpaceId":"sitesp_UQP1V","description":"NFS security is partially based on the remote user mounting the filesystem having the same UID (User ID) and GID (Group ID) as the owner of that share.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M6_USodAQbIQQV3Om0-","title":"3306 - MySQL","pathname":"/infrastructure-testing/enumeration/services-ports/3306-mysql","siteSpaceId":"sitesp_UQP1V","description":"MySQL is a very popular open-source relational database management system.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M72vSWMdNHmWH9p5AAW","title":"3389 - RDP","pathname":"/infrastructure-testing/enumeration/services-ports/3389-rdp","siteSpaceId":"sitesp_UQP1V","description":"Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M6jKI6dZ2wLgKlTe8Ti","title":"5432 - PostgresSQL","pathname":"/infrastructure-testing/enumeration/services-ports/5432-postgressql","siteSpaceId":"sitesp_UQP1V","description":"PostgreSQL is an open source database which can be found mostly in Linux operating systems.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWB-TkCj50zi6VGd5","title":"5900 - VNC","pathname":"/infrastructure-testing/enumeration/services-ports/vnc","siteSpaceId":"sitesp_UQP1V","description":"Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It transmits the keyboard and mouse events","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M5hJlHDFyeviaYPtun3","title":"5985 - WinRM","pathname":"/infrastructure-testing/enumeration/services-ports/winrm","siteSpaceId":"sitesp_UQP1V","description":"Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based. Usaully run on port 5985.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWBLYN2ut4zPrG9U1","title":"6000 - X11","pathname":"/infrastructure-testing/enumeration/services-ports/x11","siteSpaceId":"sitesp_UQP1V","description":"The X Window System (X11, or simply X) is a windowing system for bitmap displays, common on Unix-like operating systems. X provides the basic framework for a GUI environment.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWFHlFDeHlnqR6mIV","title":"6379 - Redis","pathname":"/infrastructure-testing/enumeration/services-ports/redis","siteSpaceId":"sitesp_UQP1V","description":"Redis is an in-memory data structure project implementing a distributed, in-memory key-value database with optional durability. Redis supports different kinds of abstract data structures, such as stri","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-MKyrYdM4AlcAsX5Zv4J","title":"8080 - Jenkins","pathname":"/infrastructure-testing/enumeration/services-ports/8080-jenkins","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4y5QF_tQ8Lfs2hxl4e","title":"11211 - Memcached","pathname":"/infrastructure-testing/enumeration/services-ports/memcached","siteSpaceId":"sitesp_UQP1V","description":"Memcached is a general-purpose distributed memory-caching system. It is often used to speed up dynamic database-driven websites by caching data and objects in RAM to reduce the number of times an exte","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4yWBegwDsjhznrtO6k","title":"RDS","pathname":"/infrastructure-testing/enumeration/services-ports/rds","siteSpaceId":"sitesp_UQP1V","description":"RDS can be utilized to provide users with remote access to an entire desktop or just specific applications and programs required for their day-to-day work. RDS is server-based and allows for multiple","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M6jJR5cHwmTo6Q-xzZJ","title":"SQLite","pathname":"/infrastructure-testing/enumeration/services-ports/sqlite","siteSpaceId":"sitesp_UQP1V","description":"SQLite is a relational database management system contained in a C library. In contrast to many other database management systems","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-MJQsDi3OKSHApAN-71y","title":"Docker","pathname":"/infrastructure-testing/enumeration/services-ports/docker","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"Services / Ports"}]},{"id":"-M4y5NQ0kU2VHaurNASQ","title":"IPV6","pathname":"/infrastructure-testing/enumeration/ipv6","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"}]},{"id":"-M520XGZSNDuPott6pPC","title":"Scanning","pathname":"/infrastructure-testing/enumeration/ipv6/scanning","siteSpaceId":"sitesp_UQP1V","description":"Find your IPv6 and find other hosts","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"IPV6"}]},{"id":"-M520WsUCJzFQn9G7_ul","title":"Enumeration","pathname":"/infrastructure-testing/enumeration/ipv6/enumeration","siteSpaceId":"sitesp_UQP1V","description":"Credit to Roxana Kovaci (https://twitter.com/RoxanaKovaci) and her SteelCon IPv6 workshop","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"IPV6"}]},{"id":"-M520UYkoj8axYs2dBLE","title":"Transfering files","pathname":"/infrastructure-testing/enumeration/ipv6/transfering-files","siteSpaceId":"sitesp_UQP1V","description":"Credit to Roxana Kovaci (https://twitter.com/RoxanaKovaci) and her SteelCon IPv6 workshop","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"IPV6"}]},{"id":"-M52Hi3Z-G5bV-m4DZBl","title":"Pivoting and routes","pathname":"/infrastructure-testing/enumeration/ipv6/pivoting-and-routes","siteSpaceId":"sitesp_UQP1V","description":"Credit to Roxana Kovaci (https://twitter.com/RoxanaKovaci) and her SteelCon IPv6 workshop","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"IPV6"}]},{"id":"-M52HhNsyTNUGjKb7sHF","title":"THC IPv6","pathname":"/infrastructure-testing/enumeration/ipv6/thc-ipv6","siteSpaceId":"sitesp_UQP1V","description":"THC-IPV6-ATTACK-TOOLKIT  (c) 2005-2020 vh@thc.org https://github.com/vanhauser-thc/thc-ipv6","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Enumeration"},{"label":"IPV6"}]},{"id":"-M4y-rZNzKhc23odeBdL","title":"Gaining Access","pathname":"/infrastructure-testing/gaining-access","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M4yg3-bKSktUuT9Zavp","title":"IP Forwarding","pathname":"/infrastructure-testing/gaining-access/ip-forwarding","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M4yg8fkv2NkfK7FXR1_","title":"VLAN Information","pathname":"/infrastructure-testing/gaining-access/vlan-hopping","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5HPwHiuA4K-XriWELX","title":"Psexec","pathname":"/infrastructure-testing/gaining-access/psexec","siteSpaceId":"sitesp_UQP1V","description":"Execute a command-line process on a remote machine.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5HQiF1ieQlDp3IAu7T","title":"Upgrading shell","pathname":"/infrastructure-testing/gaining-access/upgrading-shell","siteSpaceId":"sitesp_UQP1V","description":"Have fully interactive shell","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5HRXeki48mrRdHlxRD","title":"Reverse Shells One-Liners","pathname":"/infrastructure-testing/gaining-access/reverse-shells-one-liners","siteSpaceId":"sitesp_UQP1V","description":"Common reverse shells","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5aPpxIGSciyXDvOjMT","title":"Bruteforce","pathname":"/infrastructure-testing/gaining-access/bruteforce","siteSpaceId":"sitesp_UQP1V","description":"force your way through","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5aQI3LcrmtneDtEuJH","title":"MITM cleartext protocols","pathname":"/infrastructure-testing/gaining-access/mitm-cleartext-protocols","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5aQZUeonFB6rh8rJvh","title":"Null session","pathname":"/infrastructure-testing/gaining-access/null-session","siteSpaceId":"sitesp_UQP1V","description":"null session is an anonymous connection to an inter-process communication network service on Windows-based computers","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5aRGyKEOJPHTAfQDqb","title":"LLMNR / NBT NS Spoofing","pathname":"/infrastructure-testing/gaining-access/llmnr-nbt-ns-spoofing","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5aRpysTDicoS_sU007","title":"Port knocking","pathname":"/infrastructure-testing/gaining-access/port-knocking","siteSpaceId":"sitesp_UQP1V","description":"Port Knocking is a well-established method used by both defenders and adversaries to hide open ports from access.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5aSV3fy7JJnj1a8G1F","title":"Downloading/Transfer files","pathname":"/infrastructure-testing/gaining-access/downloading-transfer-files","siteSpaceId":"sitesp_UQP1V","description":"Download files to the victim machine","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5fyXmi7KEo2OebJjY2","title":"Remote Desktop","pathname":"/infrastructure-testing/gaining-access/remote-desktop","siteSpaceId":"sitesp_UQP1V","description":"How to use RDP (Remote desktop protocol) to gain access to a host, rdp runs on port 3389 by default in windows.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5hKpVdMDGyO6bOVRd7","title":"NAC Bypass","pathname":"/infrastructure-testing/gaining-access/nac-bypass","siteSpaceId":"sitesp_UQP1V","description":"Bypassing annoying network access controls","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M5hLGmKFSlnGCFhGQDZ","title":"Pass-The-Hash","pathname":"/infrastructure-testing/gaining-access/pass-the-hash","siteSpaceId":"sitesp_UQP1V","description":"Pass the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Gaining Access"}]},{"id":"-M4y-t82TnOb8Y4QueFK","title":"Exploitation","pathname":"/infrastructure-testing/exploitation","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M5lNyJnskGh3hu-mFJE","title":"Solaris","pathname":"/infrastructure-testing/exploitation/solaris","siteSpaceId":"sitesp_UQP1V","description":"Information gathering and exploitation","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Exploitation"}]},{"id":"-M5mIOypvrtXqcoRqrS_","title":"IPv6","pathname":"/infrastructure-testing/exploitation/ipv6","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Exploitation"}]},{"id":"-M5mIxkK2VX64hEklqXw","title":"Windows","pathname":"/infrastructure-testing/exploitation/windows","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Exploitation"}]},{"id":"-M5pllP3_e34VDeioERM","title":"Compiling Code","pathname":"/infrastructure-testing/exploitation/windows/compiling-code","siteSpaceId":"sitesp_UQP1V","description":"Compiling a C code for exploitation, such as adding users","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Exploitation"},{"label":"Windows"}]},{"id":"-M5mJ1q_fnDe2xZPah45","title":"SMB Vulnerabilities","pathname":"/infrastructure-testing/exploitation/windows/smb-vulnaribilites","siteSpaceId":"sitesp_UQP1V","description":"Common smb vulns","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Exploitation"},{"label":"Windows"}]},{"id":"-M5mJU0yaDX6z-Q9_oaB","title":"Kerberos Attacks","pathname":"/infrastructure-testing/exploitation/windows/kerberos-attacks","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Exploitation"},{"label":"Windows"}]},{"id":"-M4y-tqcFD0pMrWxYOzM","title":"Privilege Escalation","pathname":"/infrastructure-testing/privilege-esclation","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M4y4oXoVvIW0u-Sr_q-","title":"Situational Awareness","pathname":"/infrastructure-testing/privilege-esclation/situational-awareness","siteSpaceId":"sitesp_UQP1V","description":"A common step in the life-cycle of a red team engagement is to gather as much information is possible for the compromised environments.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M6jyfeNAx9FRZs-FZ_F","title":"Linux","pathname":"/infrastructure-testing/privilege-esclation/situational-awareness/linux","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Situational Awareness"}]},{"id":"-M6jyZXXF62BvD2_QPqN","title":"Windows","pathname":"/infrastructure-testing/privilege-esclation/situational-awareness/windows","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Situational Awareness"}]},{"id":"-M4y5gCCVjD9v-SICUSl","title":"Registry","pathname":"/infrastructure-testing/privilege-esclation/situational-awareness/windows/registry","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Situational Awareness"},{"label":"Windows"}]},{"id":"-M4y5bnlu4R1OGgAj2vb","title":"PowerView","pathname":"/infrastructure-testing/privilege-esclation/situational-awareness/windows/powerview","siteSpaceId":"sitesp_UQP1V","description":"PowerView is a PowerShell tool to gain network situational awareness on Windows domains.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Situational Awareness"},{"label":"Windows"}]},{"id":"-M4y5YS2vGt8MZXaRqEa","title":"FSMO Roles","pathname":"/infrastructure-testing/privilege-esclation/situational-awareness/windows/fsmo-roles","siteSpaceId":"sitesp_UQP1V","description":"Flexible single master operation (FSMO) is a Microsoft Active Directory feature that is a specialized domain controller task used when standard data transfer and update methods are inadequate.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Situational Awareness"},{"label":"Windows"}]},{"id":"-M5pmwhnGw7_aUv7GZXT","title":"Windows","pathname":"/infrastructure-testing/privilege-esclation/windows","siteSpaceId":"sitesp_UQP1V","description":"manual techniques for privilege escalation","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M6JuI1lfurJac7H6Iyt","title":"Disable Apps and Firewall","pathname":"/infrastructure-testing/privilege-esclation/windows/disable-apps-and-firewall","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"-M6-NQ3U7y52Dg8yZmvD","title":"Add user script","pathname":"/infrastructure-testing/privilege-esclation/windows/add-user-script","siteSpaceId":"sitesp_UQP1V","description":"If your able to run a executable to escalate privilege, you can use the following code to add a new user in the administratior group","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"-M6JvpNy1lpfL4jFYN8m","title":"UAC Bypass","pathname":"/infrastructure-testing/privilege-esclation/windows/uac-bypass","siteSpaceId":"sitesp_UQP1V","description":"Windows User Account Control (UAC) allows a program to elevate its privileges to perform a task under administrator-level permissions by prompting the user for confirmation.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"-M6K2PX-MtRXX6JQduq_","title":"icacls","pathname":"/infrastructure-testing/privilege-esclation/windows/icacls","siteSpaceId":"sitesp_UQP1V","description":"icacls is a command-line utility that can be used to modify NTFS file system permissions in Windows.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"-MJX4OvuWV0hniHibiG-","title":"Running services","pathname":"/infrastructure-testing/privilege-esclation/windows/running-services","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"-M8VB4Z8DSNZwOzE9tqC","title":"Common Exploits","pathname":"/infrastructure-testing/privilege-esclation/windows/common-exploits","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"-M5pmzA3F8pn4HL8pzct","title":"Linux","pathname":"/infrastructure-testing/privilege-esclation/linux","siteSpaceId":"sitesp_UQP1V","description":"Manual privilege escalation techniques to look for","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M6-MuMZyUI3VhRBhn7i","title":"SUID Shell script","pathname":"/infrastructure-testing/privilege-esclation/linux/suid-shell-script","siteSpaceId":"sitesp_UQP1V","description":"If  your able to run a executable to escalate privilege, you can use the following code to gain root privileges:","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"-MJrHlHYOnlOuyOR3vy4","title":"CVE-2019-14287","pathname":"/infrastructure-testing/privilege-esclation/linux/cve-2019-14287","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"-MJfpUgUnjW-B_spptoQ","title":"Kernel exploit","pathname":"/infrastructure-testing/privilege-esclation/linux/kernel-exploit","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"-M6K3JuLSNlgY4Nnd1gu","title":"Solaris","pathname":"/infrastructure-testing/privilege-esclation/solaris","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-MIUdZZ3emW5ETeJ8n7E","title":"FreeBSD","pathname":"/infrastructure-testing/privilege-esclation/freebsd","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M5pn-j_XO00FDkHZS9S","title":"Automated tools","pathname":"/infrastructure-testing/privilege-esclation/automated-tools","siteSpaceId":"sitesp_UQP1V","description":"Tools which will make your life easier in a search for privilege escalation paths","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M5uqKXWh7N5YHoSE2gq","title":"Metasploit Modules","pathname":"/infrastructure-testing/privilege-esclation/metasploit-modules","siteSpaceId":"sitesp_UQP1V","description":"useful metasploit modules for privilege escalation","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M6-C9Gp8DLF5daX6VJ3","title":"Password Dumping","pathname":"/infrastructure-testing/privilege-esclation/password-dumping","siteSpaceId":"sitesp_UQP1V","description":"process of obtaining account login and password information, normally in the form of a hash or a clear text password.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Privilege Escalation"}]},{"id":"-M4y-uCpTJuskxe-ACtu","title":"Breakout","pathname":"/infrastructure-testing/breakout","siteSpaceId":"sitesp_UQP1V","description":"Gained access to a lockdown host and need to find way to escape the restrict shell?","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M6LNl6f_IgfOaBo3vih","title":"LOLBas","pathname":"/infrastructure-testing/breakout/lolbas","siteSpaceId":"sitesp_UQP1V","description":"Living Off The Land Binaries And Scripts","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M6LRBk6WTZVp5rmGu19","title":"powershell constrained language byass","pathname":"/infrastructure-testing/breakout/powershell-constrained-language-byass","siteSpaceId":"sitesp_UQP1V","description":"methods to bypass powershell constrained language mode","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M6VEapmNY6CQ7aJwsQu","title":"Alternatives to command prompt","pathname":"/infrastructure-testing/breakout/alternatives-to-command-prompt","siteSpaceId":"sitesp_UQP1V","description":"Different options to cmd and powershell","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M6VI0gjYafYchSy4bKy","title":"Windows utilities","pathname":"/infrastructure-testing/breakout/windows-utilities","siteSpaceId":"sitesp_UQP1V","description":"Windows utilities that can be used to bypass restrictions","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M6VLTIcgJdjBZ3Lrk3p","title":"Applocker","pathname":"/infrastructure-testing/breakout/applocker","siteSpaceId":"sitesp_UQP1V","description":"advances the app control features and functionality of Software Restriction Policies.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M6VMNxF9Z-BxRxfJKb2","title":"Restricted shells","pathname":"/infrastructure-testing/breakout/restricted-shells","siteSpaceId":"sitesp_UQP1V","description":"Bypass restricted shells","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M6VQdx_Ix_fsg0HCFl_","title":"Environmental Variables / Bypassing Path Restrictions","pathname":"/infrastructure-testing/breakout/environmental-variables-bypassing-path-restrictions","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-MIxMpbC-u2uDJWCR6N_","title":"Docker escape","pathname":"/infrastructure-testing/breakout/docker-escape","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-MVpe8faDEMpUCCJzwz7","title":"Just Enough Administration (JEA)","pathname":"/infrastructure-testing/breakout/just-enough-administration-jea","siteSpaceId":"sitesp_UQP1V","description":"Just Enough Administration, or JEA. It allows administrators to limit the commands that specific users can run","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Breakout"}]},{"id":"-M4y2DoHbEWiNy-mIOI7","title":"Presistance","pathname":"/infrastructure-testing/presistance","siteSpaceId":"sitesp_UQP1V","description":"Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M6jV3Pqd13yYEZ0rDsy","title":"Windows","pathname":"/infrastructure-testing/presistance/windows","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Presistance"}]},{"id":"-M4y2EDQc7DURrhrPEa9","title":"Pivoting","pathname":"/infrastructure-testing/pivoting","siteSpaceId":"sitesp_UQP1V","description":"Pivoting is a set of techniques used during red team/pentest engagements which make use of attacker-controlled hosts as logical network hops with the aim of amplifying network visibility.","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M6jUwL0TRlRiaIeQvTM","title":"Adding routes","pathname":"/infrastructure-testing/pivoting/adding-routes","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Pivoting"}]},{"id":"-M4y2KuY2jf1kYTj13WJ","title":"Password Cracking","pathname":"/infrastructure-testing/password-cracking","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M6jMoj88aCKdQRpVXvZ","title":"Hashcat","pathname":"/infrastructure-testing/password-cracking/hashcat","siteSpaceId":"sitesp_UQP1V","description":"Advanced password recovery","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Password Cracking"}]},{"id":"-M6jMrIBmGSCbiEi3wuG","title":"John","pathname":"/infrastructure-testing/password-cracking/john","siteSpaceId":"sitesp_UQP1V","description":"John (aka John the Ripper) is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Password Cracking"}]},{"id":"-M6At4QVahOV63m-KIQS","title":"Cisco Passwords","pathname":"/infrastructure-testing/password-cracking/cisco-passwords","siteSpaceId":"sitesp_UQP1V","description":"Breaking different types of cisco passwords which can be obtained from the configuration file","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Password Cracking"}]},{"id":"-M73PkK8t9qluAGqwYPz","title":"Passwords Lists","pathname":"/infrastructure-testing/password-cracking/passwords-lists","siteSpaceId":"sitesp_UQP1V","description":"Common passwords lists","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Password Cracking"}]},{"id":"-MA6oV9htgiHYwDrQY9W","title":"Generating wordlist","pathname":"/infrastructure-testing/password-cracking/generating-wordlist","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Password Cracking"}]},{"id":"-M4y2K-uEHVQjQYPiQmh","title":"Tools","pathname":"/infrastructure-testing/tools","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"}]},{"id":"-M6jcvf0ZGdud0R33gFv","title":"Nishang","pathname":"/infrastructure-testing/tools/nishang","siteSpaceId":"sitesp_UQP1V","description":"Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of pene","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6JwgwRsY5MPaw77_f_","title":"UACME","pathname":"/infrastructure-testing/tools/uacme","siteSpaceId":"sitesp_UQP1V","description":"Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jeM-Q9NLgf8bteykF","title":"Bypass-UAC","pathname":"/infrastructure-testing/tools/bypass-uac","siteSpaceId":"sitesp_UQP1V","description":"Bypass-UAC provides a framework to perform UAC bypasses based on auto elevating IFileOperation COM object method calls.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6LPvIRZjkicG3rmz1I","title":"MSBuildAPICaller","pathname":"/infrastructure-testing/tools/msbuildapicaller","siteSpaceId":"sitesp_UQP1V","description":"MSBuild Without MSBuild.exe","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6ijOzWUOpcb_EIIcIO","title":"Impacket","pathname":"/infrastructure-testing/tools/impacket","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jZ320cFePIEjTrNbD","title":"SharpPersist","pathname":"/infrastructure-testing/tools/sharppersist","siteSpaceId":"sitesp_UQP1V","description":"Windows persistence toolkit written in C#","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jaF12pQEKPHHZAA-P","title":"Terminals","pathname":"/infrastructure-testing/tools/terminals","siteSpaceId":"sitesp_UQP1V","description":"Different type of terminals and shells","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jb7bD9qtr2uHxeJZJ","title":"IP Calculation","pathname":"/infrastructure-testing/tools/ip-calculation","siteSpaceId":"sitesp_UQP1V","description":"Useful tools to calculate subnets and ranges","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jbhxSSgBKo0Fuiuo9","title":"pwsh","pathname":"/infrastructure-testing/tools/pwsh","siteSpaceId":"sitesp_UQP1V","description":"powershell on kali ( = Linux)","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jc-Qw90zT1-e0gg8n","title":"psTools / Sysinternals","pathname":"/infrastructure-testing/tools/pstools-sysinternals","siteSpaceId":"sitesp_UQP1V","description":"PsTools is a suite of tools developed by Sysinternals (now Microsoft). They're a great complement to any pen test, and many of my Nmap scripts are loosely based on them.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jdeE9GEuNzI2uME_x","title":"Unlock applocker","pathname":"/infrastructure-testing/tools/unlock-applocker","siteSpaceId":"sitesp_UQP1V","description":"Microsoft Applocker evasion tool","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jfAFQujuqGUDsDL_S","title":"enum4linux","pathname":"/infrastructure-testing/tools/enum4linux","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jfKOGto0-ryfS6_j7","title":"Bloodhound","pathname":"/infrastructure-testing/tools/bloodhound","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M7H-410W4x58_pW_eXK","title":"aclpwn","pathname":"/infrastructure-testing/tools/bloodhound/aclpwn","siteSpaceId":"sitesp_UQP1V","description":"Aclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"},{"label":"Bloodhound"}]},{"id":"-M6jfgp6Iunn-U1yCg4J","title":"mitm6","pathname":"/infrastructure-testing/tools/mitm6","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jfuoLNp-EcLahlMqi","title":"Enyx","pathname":"/infrastructure-testing/tools/enyx","siteSpaceId":"sitesp_UQP1V","description":"Enyx SNMP IPv6 Enumeration Tool","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jg2Lo33PO-4B2IDCY","title":"nfsshell","pathname":"/infrastructure-testing/tools/nfsshell","siteSpaceId":"sitesp_UQP1V","description":"Userspace NFS client shell","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-MJXAs9cf1I3jSXhNqAd","title":"PowerUpSQL","pathname":"/infrastructure-testing/tools/powerupsql","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jcJne5L9nCn6R2SZC","title":"Metasploit","pathname":"/infrastructure-testing/tools/metasploit","siteSpaceId":"sitesp_UQP1V","description":"","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"}]},{"id":"-M6jcYbZXGppV4ktELrZ","title":"msfvenom","pathname":"/infrastructure-testing/tools/metasploit/msfvenom","siteSpaceId":"sitesp_UQP1V","description":"MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.","breadcrumbs":[{"label":"Infrastructure testing"},{"label":"Tools"},{"label":"Metasploit"}]},{"id":"-M4y2Y8oU9ERnVSRGm5S","title":"Others","pathname":"/infrastructure-testing/others","siteSpaceId":"sitesp_UQP1V","description":"other miscellaneous","breadcrumbs":[{"label":"Infrastructure testing"}]}]}