pentest-resources
  • Penetration Testing Resources
  • Repository & File Structure
  • General
    • Resources
      • Link collection
      • Toolkits
      • General guides
      • OSCP experience write-ups
      • Practice resources
    • OS basics
      • Users
        • User info
        • Add low-privilege user
        • Add admin user
        • Change privileges of existing user
        • Delete user
      • Filesystem
        • Find a file / directory
        • File Analysis
        • Services and Autostart
        • CLI tools: grep and friends
      • Network
        • Netcat
        • DNS tools
        • Web tools: curl / wget
    • Python scripting
    • Metasploit
  • Recon
    • Passive Recon
      • OSINT
        • Google operators
    • Active Recon
      • Port Scanning
      • Manual service enumeration
      • Enumeration with system access
  • Vulnerability analysis
    • Standard Ports & Common Services
      • 00 - Service unknown
      • 21 - FTP
      • 22 - SSH
      • 23 - Telnet
      • 25 - SMTP
      • 53 - DNS
      • 69 - TFTP
      • 80 - HTTP
      • 88 - Kerberos
      • 110 - POP3
      • 111 - RPCbind
      • 119 - NTP
      • 135 - MSRPC
      • 139 - SMB
      • 143 - IMAP
      • 161 - SNMP
      • 162 - SNMP
      • 199 - SMUX
      • 389 - LDAP
      • 443 - HTTPS
      • 445 - SMB
      • 554 - RTSP
      • 587 - Outgoing SMTP
      • 631 - CUPS
      • 636 - LDAP
      • 993 - IMAP (secure)
      • 993 - POP3
      • 1433 - MSSQL
      • 1521 - Oracle Database
      • 2049 - NFS
      • 3306 - MySQL
      • 3389 - RDP
      • 5432 - PostgreSQL
      • 5900 - VNC
    • Finding vulnerabilities
  • Gaining access
    • Physical Access
    • Client-side Attacks
    • Web Application Attacks
    • Reverse Shells
    • Common Vulnerabilities
      • MS17-010 - EternalBlue
  • Post Exploitation
    • Restricted Shell Escape
    • Privilege Escalation
      • Scripts & Tools
      • Further Enumeration
    • Persistence
    • Loot
    • Password Cracking
    • Reducing Forensic Evidence
  • Reporting
  • My methodology
    • Example Pentest
    • My Toolkit
      • Software
      • Hardware
Powered by GitBook
On this page
  • Wiki-like guides to Penetration Testing
  • Enumeration
  • Privilege Escalation

Was this helpful?

  1. General
  2. Resources

General guides

PreviousToolkitsNextOSCP experience write-ups

Last updated 6 years ago

Was this helpful?

Wiki-like guides to Penetration Testing

Enumeration

Privilege Escalation

Escape restricted shell

General Privesc:

https://guide.offsecnewbie.com/
https://backdoorshell.gitbooks.io/oscp-useful-links/content/
https://github.com/rewardone/OSCPRepo
https://sushant747.gitbooks.io/total-oscp-guide/
https://411hall.github.io/OSCP-Preparation/
https://github.com/nixawk/pentest-wiki
https://github.com/AnasFullStack/Penetration-Testing-Study-Notes/blob/master/bookmarks.md
https://github.com/pythonmaster41/Go-For-OSCP
https://github.com/nixawk/pentest-wiki/tree/master/1.Information-Gathering/Linux
https://github.com/DigitalAftermath/EnumerationVisualized/wiki
http://securebean.blogspot.com/2014/05/escaping-restricted-shell_3.html
https://github.com/cornerpirate/socat-shell
https://medium.com/bugbountywriteup/pimp-my-shell-5-ways-to-upgrade-a-netcat-shell-ecd551a180d2
http://pentestmonkey.net/tools/audit/unix-privesc-check
https://guif.re/linuxeop
https://github.com/rebootuser/LinEnum
https://www.rebootuser.com/?p=1623
https://github.com/sleventyeleven/linuxprivchecker
https://www.slideshare.net/nullthreat/fund-linux-priv-esc-wprotections
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://github.com/ngalongc/AutoLocalPrivilegeEscalation
https://www.youtube.com/watch?v=dk2wsyFiosg
https://github.com/GDSSecurity/Windows-Exploit-Suggester