OSCP Playbook
Search
⌃
K
OSCP Playbook
Search
⌃
K
Introduction
General
Learning tips
How to hack without Metasploit
Port scanning
Nmap Scanning
Nmap Scripts
Services Enumeration
SNMP
HTTP(S)
NFS
SMB
DNS
FTP
MsSQL
Oracle
Telnet
TFTP
SSH
SMTP
RDP
POP3
MySQL
LDAP
Kerberos
Finger
(MS)RPC
Password attack (Brute-force)
Brute-force service password
Wordlist dictionary
Cracking Password
Custom wordlist
Reverse Shell
Cheatsheet
Msfvenom
Linux reverse shell
Interactive TTYs Shell
Listener setup
Linux Post Exploitation
Post Exploitation methodology
Checklist
Exploiting SUID Executables
Exploiting SUDO Users
Linux exploitation
Linux post exploitation scripts
Linux Post Exploitation Command List
Windows Post exploitation
General
Windows PrivEsc Technique
Automated enumeration script
Resources Windows Post Exploitation
Manual enumeration
Others
Active Directory attack
Port Forwarding / SSH Tunneling
File transfer Methodology
BOF tips
Powered By
GitBook
Comment on page
Checklist
Abusing Sudo Rights
SUID Bit
Kernel Exploit
Path Variable
Enumeration
MySQL
Crontab
Wildcard Injection
Capabilities
Writable /etc/passwd file
Writable files or script as root
Buffer Overflow
Docker
Chkrootkit
Bruteforce
Crack /etc/shadow
NFS
Json
Redis
LXD
All
Exim
Apache2 Writable
Linux Post Exploitation - Previous
Post Exploitation methodology
Next - Linux Post Exploitation
Exploiting SUID Executables
Last modified
3yr ago