HackNotes
Private Notes for Bug Hunters, CTF Players, Pentesters of Zishan Ahamed Thandar
Contents
You can also read for Active Directory Notes and Bug Bounty Methodology from My Pentester Guide Repo https://github.com/ZishanAdThandar/pentest.
Penetration Testing Workflow
Network Scan
- Identify live hosts
- Scan for open ports
- Identify services and versions
- Tools: Nmap, Masscan
Recon
- Passive Reconnaissance
- WHOIS Lookup
- Shodan
- OSINT Tools: Recon-ng, Maltego
- Active Reconnaissance
- Subdomain Enumeration
- Directory Enumeration: Dirbuster, Gobuster
- Tools: Nikto, Wappalyzer
Exploitation
- Identify vulnerabilities
- CVE Search
- Vulnerability Scanners: Nessus, OpenVAS
- Use exploit frameworks
- Custom Exploits
- Write or modify exploits for specific vulnerabilities.