Template

IP:

Enumeration

Nmap scan

// Some code

Service Enumeration

TCP/00

Document here:

  • Screenshots (web browser, terminal screen)

  • Service version numbers

  • Document your findings when interacting with the service at various stages

UDP/00

Document here:

  • Screenshots (web browser, terminal screen)

  • Service version numbers

  • Document your findings when interacting with the service at various stages

Exploit

Document here:

  • Exploit used (link to exploit)

  • Explain how the exploit works against the service

  • Any modified code (and why you modified it)

  • Proof of exploit (screenshot of reverse shell with target IP address output)

Post-Exploit Enumeration

Current User

chevron-rightClick to expandhashtag

OS & Kernel

chevron-rightClick to expandhashtag

Users

chevron-rightClick to expandhashtag

Groups

chevron-rightClick to expandhashtag

Network

chevron-rightInterfaceshashtag
chevron-rightARP Tablehashtag
chevron-rightRouteshashtag
chevron-rightOpen Portshashtag
chevron-rightPing Sweephashtag

Processes

chevron-rightClick to expandhashtag

Services

chevron-rightClick to expandhashtag

Scheduled Tasks

chevron-rightClick to expandhashtag

Interesting Files

chevron-rightFile 1hashtag

Privilege Escalation

Document here:

  • Exploit used (link to exploit)

  • Explain how the exploit works

  • Any modified code (and why you modified it)

  • Proof of privilege escalation (screenshot showing ip address and privileged username)\

Persistence

Document here how you set up persistence on the target

Flags

chevron-rightUserhashtag
chevron-rightRoothashtag

Shell

Root

Template partially courtesy of 0xC0FFEE https://notes.benheater.com

Last updated