Skip to content

A collection of snippets of codes and commands to make your life easier!

Notifications You must be signed in to change notification settings

54N4L/Pentest-Cheat-Sheets

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

95 Commits
 
 
 
 
 
 

Repository files navigation

Pentest Cheat Sheets

Pentest-Cheat-Sheets

This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.

Ninja Tricks

Recon

DNS

Nslookup

Resolve a given hostname to the corresponding IP.

nslookup targetorganization.com
Reverse DNS lookup
nslookup -type=PTR IP_address
MX(Mail Exchange) lookup
nslookup -type=MX domain
Zone Transfer
Using nslookup Command
nslookup
server domain.com
ls -d domain.com
Using HOST Command

host -t ns(Name Server) < domain >

host -t ns domain.com

after that test nameservers

host -l < domain > < nameserver >

host -l domain.com ns2.domain.com
Nmap Dns Enumaration
nmap -F --dns-server <dns server ip> <target ip range>

Auto tools

DNSenum
dnsenum targetdomain.com
dnsenum --target_domain_subs.txt -v -f dns.txt -u a -r targetdomain.com
DNSmap
dnsmap targetdomain.com -w <Wordlst file.txt>

Brute Force, the file is saved in /tmp

dnsmap targetdomain.com -r
DNSRecon DNS Brute Force
dnsrecon -d TARGET -D /usr/share/wordlists/dnsmap.txt -t std --xml ouput.xml
Fierce.pl
fierce -dns targetdomain.com
HostMap
hostmap.rb -only-passive -t <IP>

We can use -with-zonetransfer or -bruteforce-level

Online Tools

Resources

Contribution

HOW TO

About

A collection of snippets of codes and commands to make your life easier!

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 61.0%
  • Batchfile 24.0%
  • PowerShell 15.0%