Tag: htb
All the articles with the tag "htb".
-
SMB & RPC Enumeration Cheatsheet
Fast SMB, RPC and Windows service enumeration for HTB, CTFs and real-world AD pentests
-
Active Directory PrivEsc Cheatsheet
ACL abuses, delegations, AD CS, RBCD, Shadow Credentials, and domain privilege escalation paths
-
Active Directory Pentesting Cheatsheet
Fast enumeration, common attack paths, and practical commands for HTB, CTFs and OSCP-like environments
-
Windows Privilege Escalation Cheatsheet
Fast techniques, tools, and commands for HTB, CTFs and OSCP-like environments
-
Linux Privilege Escalation Cheatsheet
Fast techniques, tools, and commands for HTB, CTFs and OSCP-like environments
-
Docker & Kubernetes Abuse Cheatsheet
Container escapes, docker.sock exploitation, K8s privilege escalation and misconfigurations for HTB, CTFs and cloud pentests
-
Advanced Web Hacking & Pivoting Cheatsheet
SSRF, Request Smuggling, Prototype Pollution, WAF bypass, OAuth, SAML, advanced logic flaws and internal pivoting
-
Web Exploitation Cheatsheet
SQLi, RCE, LFI/RFI, File Uploads, Deserialization, SSTI, Auth bypass and manual exploitation for HTB, CTFs and real-world pentests
-
Web Attack Surface & Enumeration Cheatsheet
Discovery, fingerprinting, content discovery, parameter fuzzing, virtual hosts and technology mapping for HTB, CTFs and real-world pentests
-
Password Attacks & Credential Hunting Cheatsheet
Bruteforce, credential harvesting, hash cracking, spraying and password reuse attacks for HTB, CTFs and real-world pentests