Wr3nch0x1
  • $id
  • Field Manual
    • Pentest Cheatsheet
    • Useful Google Dorks
  • 0x0 Recon
    • Monitoring the Environment: Nmap Diffing
    • Scheduling Nmap - LazyNmap
  • 0x1 Code Injection
    • T1038: DLL Hijacking / Injection
    • Backdooring PE Files
  • 0x2 Thick Client Security Testing
    • CWE-316: Sensitive Information Stored in Memory
  • Reviews
    • PentesterAcademy Windows Red Team Labs
  • Cloud Security
    • Exploiting Misconfigured IAM assume-role in AWS
Powered by GitBook
On this page
  • $cat /root/important.txt
  • $ whoami
  • $ cat Goals

$id

"Man is more complex than any of his machines." ~ Samuel B. Griffith II

NextPentest Cheatsheet

Last updated 9 months ago

$cat /root/important.txt

This are publicly accessible notes about my red teaming and penetration testing experiments which I have learned or developed in a controlled environment that involve playing with various tools and techniques used by penetration testers, red teamers and actual adversaries.

  • Do not take copy or publish anything from this blogs without permission

  • Do not expect the notes to be reliable in every case scenarios

  • If you found any mistake or suggestion. Please contact me on twitter @wr3nch0x1

  • Have a nice read

Most of these techniques are discovered by other security researchers and I do not claim their ownership. I try to reference the sources whenever possible, but if you think I've missed something, please let me know.

$ whoami

  • Akshay Jain - Hacker since 2016

  • Known as wr3nch0x1

  • https://www.linkedin.com/wr3nch0x1

  • https://www.x.com/wr3nch0x1

  • Experienced with Red Team Labs such as , , etc

$ cat Goals

  • Field Manual

  • 0x0 Recon

  • 0x1 Code Injection

  • 0x2 Payload Evasion

  • 0x3 Thick Client Security Testing

  • 0x3 AD Recon

  • 0x4 Audit

  • 0x5 Post Exploitation

  • 0x6 Password Cracking

  • 0x7 Misc

  • Reviews

Windows Red Team Lab
RastaLabs
Offshore
Page cover image