Template

IP:

Enumeration

Nmap scan

// Some code

Service Enumeration

TCP/00

Document here:

  • Screenshots (web browser, terminal screen)

  • Service version numbers

  • Document your findings when interacting with the service at various stages

UDP/00

Document here:

  • Screenshots (web browser, terminal screen)

  • Service version numbers

  • Document your findings when interacting with the service at various stages

Exploit

Document here:

  • Exploit used (link to exploit)

  • Explain how the exploit works against the service

  • Any modified code (and why you modified it)

  • Proof of exploit (screenshot of reverse shell with target IP address output)

Post-Exploit Enumeration

Current User

Click to expand

OS & Kernel

Click to expand

Users

Click to expand

Groups

Click to expand

Network

Interfaces
ARP Table
Routes
Open Ports
Ping Sweep

Processes

Click to expand

Services

Click to expand

Scheduled Tasks

Click to expand

Interesting Files

File 1

Privilege Escalation

Document here:

  • Exploit used (link to exploit)

  • Explain how the exploit works

  • Any modified code (and why you modified it)

  • Proof of privilege escalation (screenshot showing ip address and privileged username)\

Persistence

Document here how you set up persistence on the target

Flags

User
Root

Shell

Root

Template partially courtesy of 0xC0FFEE https://notes.benheater.com

Last updated

Was this helpful?