# Summary ###### tags: ` Summary ` 1. **Methodolgy** * [Active Directory Attacks](/4yHneu4KTVGMG6VNF3oExg) * [Linux - Persistence](/TtiJvBAKSwm154QJspfsZA) * [Linux - Privilege Escalation](/pkSTLFo9R9e9BFQH68gmOw) * [Metasploit](/COQJO_OTTyW4LWsZ1vGp2g) * [Bug Hunting Methodology and Enumeration](/J6yajeOoSbWpgq8VvbcsiA) * [Network Discovery](/p6zz7JtXQAS9CuWPRini2A) * [Network Pivoting Techniques](/DotLB6YUSSWvYLcrlPWe8A) * [Reverse Shell Methods](/8q-pWBGnT-S4Dm8YlinqKg) * [Subdomains Enumeration](/OwwTX2U6TwSOB-QLA_9IvQ) * [Windows - Download and execute methods](/RG-4i8QbSHWSR94g5P6Fkw) * [Windows - Mimikatz](/Eu9_qfIcSsuf92N081XokQ) * [Windows - Persistence](/6Yx8Zqi-T6Gw_qpJIpk0BA) * [Windows - Privilege Escalation](/cQUJOtmkTiObTi7jTWQmxw) * [Windows - Using credentials](/s7pqOSV6ThyLa0TxF2oFJw) 2. **Web Pentest** * [Amazon Bucket S3 AWS](/Irmdc7AmSPWcr2zYnupDWw) * [Command Injection](/ldId2UEfT2e0IEAlDgT8qg) * [Common Vulnerabilities and Exposures](/lApOXucUTxqrNuTdjjwlOQ) * [CRLF](/ZS1kP7CPQZevfD01wSuz0g) * [Cross Site Scripting](/DzY5jAqJSceMdNycSs_jfQ) * [CSV Injection (Formula Injection)](/HkybNnDvRiGV6K10xf_Nnw) * [Directory traversal](/_Z93YwEZQoeFP-_YLSwUKQ) * [File Inclusion](/_k0BWIxoTv-fkhpXLD3tkw) * [Insecure Deserialization](/R5-gsxQLSZC2YSsTRmBBxg) * [Insecure management interface](/N7pVNAIaS3-xM6gB_SpShA) * [Insecure source code management](/HB8A8ouGR926yZcCRGezhQ) * [JWT - JSON Web Token](/Zj2SVkE7QwKqg7WlGFP90Q) * [LaTex Injection](/N4afXPutTBCl73ye5vFUEg) * [LDAP injection](/feV58Yy1Q6O4QoaWuTGLJA) * [OAuth 2 - Common vulnerabilities](/GNWZkek9TqiW-FZnYVlIfg) * [Open URL Redirection](/JZ7cnfM4QymOx2z9tEH0wA) * [PHP Juggling type and magic hashes](/hp5mVlkbSg29nUcpty_evA) * [Server-Side Request Forgery](/oecJCMRAThaOum2NvuYrPA) * [SQL injection](/bz_obVAvT16zEzbjRrcbnw) * [TAR Command Execution](/1z0sZwUTRSi2mYJEpR2Rlg) * [Templates Injections](/wBdF1kNGQXesskJnqWMDfQ) * [Upload](/BOUAtRvASR-Lc7BPY2jHeg) * [XPATH injection](/bnlrGPmJQpmHTuKVAPid2w) * [XML External Entity](/3Ev9TUUFTwWpTZDUBd_ozg) * [Web Cache Deception Attack](/BM6KeiFXQ66RFPUdrYOrnA) 3. **Mobile Pentest** 4. **Infra** 5. **Resources** * [Active Directory Kill Chain Attack & Defense](/hqKRB9ABTxybbIpIXC0pnw)
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up