Skip to content

A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.

Notifications You must be signed in to change notification settings

botesjuan/PenTestMethodology

Repository files navigation

Penetration Testing Methodology

Practical Penetration Testing References

This repository provides a guideline/methodology for conducting professional penetration tests across environments.
A holistic approach to penetration testing, assessing an organization's security posture by simulating real-world attacks, across all aspects of its systems, not just focusing on individual vulnerabilities.




Buy Me A Coffee

Thanks too all for your support by buying me coffee, thanks you so much \o/


Sections

  • Active Directory Windows Hosts Attacks

    • Reconnaissance Unauthenticated
      • Initial Network Enumeration
      • Passive Reconnaissance
      • Active Host Discovery
      • Detect Active Directory Domain
      • MITM - LLMNR/NBT-NS Poisoning
      • Crack NTLMv2 hashes stolen
    • Enumeration Unauthenticated
      • RID Bruteforce Enumerate
      • Brute Forcing
      • Username as Password Attack
      • Password Spraying
    • Authenticated Initial Access
      • AD Password Policy
      • Vulnerability Scanning
      • ESC7 Certificate Authority
      • Coercing Authentication
      • PetitPotam - Authenticated
      • Coercer Tool Identify vulnerabilities
      • Active Directory Enumeration
        • Computer Account Admin
        • Users Generic Write All
        • Targeted Kerberoasting attack
      • Relay Attacks
        • NTLM Relay
      • Kerberos
      • Convert kirbi to Ccache
      • Dump KRBTGT Hash
    • Persistence or Lateral
      • ESC8 NTLM Relay to AD CS
        • Lab CA Configuration
        • Check CA for NTLM
        • CA Enumeration
        • Start NTLM Relay
        • Coercing DC
        • Stolen Certificate
        • Authenticate as DC
        • Computer DCSYNC Attack
        • User DCSYNC Attack
      • Certificate Authority Exploit ESC1..ESC16
      • Other Relay & MITM References
      • IPv6 attacks
  • Penetration Testing Methodology - Holistic Approach

    • Reconnaissance
    • Enumeration
    • Research
    • Exploitation
      • Hosting
      • File transfer
      • Shells & Payloads
      • Cracking
      • Exploits
      • Metasploit
      • Code Reverse Engineering
    • POST Exploitation
      • Microsoft Windows / AD
      • Linux
    • APIs & Web Applications
      • OWASP Web Application Testing
      • OWASP Large Language Model Apps
    • Attacking Systems
      • Active Directory
      • Email / SMTP / Microsoft Exchange / Outlook Web Access
      • Printers
      • DNS
      • Oracle
      • Wireless
      • OT, SCADA, PLC & EWS
    • Reporting
    • Foundation Skills
      • PenTest Practice Learning Platforms
      • Knowledge-Base

Repository

✅ Offensive engagement lifecycle, scoping, rules of engagement, reporting and remediation.
✅ Includes checks and recommended tools for enumeration, exploitation, privilege escalation, and persistence.
✅ Continuously updated on shifting landscape, assessments, emerging threats, and evolving best practices.


Frameworks


Tools are only as powerfull as the hands that use them.  

Tools can reveal a crack in our armor.  

Our job is to find and seal the cracks in the armor.  

Best hackers think like attackers, but act as protectors.

Stay curious, stay ethical, and keep learning.  

About

A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages