Template
IP:
Enumeration
Nmap scan
// Some code
Service Enumeration
TCP/00
Document here:
Screenshots (web browser, terminal screen)
Service version numbers
Document your findings when interacting with the service at various stages
UDP/00
Document here:
Screenshots (web browser, terminal screen)
Service version numbers
Document your findings when interacting with the service at various stages
Exploit
Document here:
Exploit used (link to exploit)
Explain how the exploit works against the service
Any modified code (and why you modified it)
Proof of exploit (screenshot of reverse shell with target IP address output)
Post-Exploit Enumeration
Current User
OS & Kernel
Users
Groups
Network
Processes
Services
Scheduled Tasks
Interesting Files
Privilege Escalation
Document here:
Exploit used (link to exploit)
Explain how the exploit works
Any modified code (and why you modified it)
Proof of privilege escalation (screenshot showing ip address and privileged username)\
Persistence
Document here how you set up persistence on the target
Flags
Shell
Root
Template partially courtesy of 0xC0FFEE https://notes.benheater.com
Last updated
Was this helpful?