Initializing VAULT-TEC OS...
Loading security protocols...
Establishing secure connection...
Connection established.
SYSTEM READY

Vault-Tec Terminal

ABOUT POSTS NOTES TOOLS

CheatSheets

CURL DNS File Transfer Hydra Impacket JohnTheRipper NCAT NMAP Online Resources Reverse Shell Wordlists

Active Directory

Mindmap Attacking AD Linux AD

Cloud

AWS Azure Google Terraform

Container

Docker Kubernetes

Linux

Penetration Testing Checklist Enumeration Privilege Escalation Post Exploitation Services Tools

Network

Data Exfiltration Port Scanning Reconnaissance Pivoting Services Traffic Analysis

Tech Stack

CMS Databases DevOps Enterprise Apps IAM Monitoring Open-Source Utilities Web Servers

Windows

AV/EDR Evasion Enumeration Privilege Escalation Post Exploitation

Web Application

Reconnaissance Common Vulnerabilities Authentication Bypass API Testing

nmap Cheat Sheet

#Ping Sweep
sudo nmap -sP 192.168.0.1-24

#Ping Sweep No DNS
sudo nmap -sP 192.168.0.1-24 -n

#TCP Scan All Ports
sudo nmap -sT -p0- 192.169.0.1

#UDP Scan All Port
sudo nmap -sU -p0- 192.168.0.1

#Version and Operating System Detection
sudo nmap -sV -O -p0- 192.168.0.1

#XMAS Scan
sudo nmap -sX -p0- -Pn 192.168.0.1

#Locate Nmap Scripts
sudo locate *.nse | grep string

#Update Nmap Scripts
sudo nmap --script-updatedb

#Banner Grab
sudo nmap --script=banner 192.168.0.1

#SSL Certificate
sudo nmap --script ssl-cert -p 443 domain.com

#SSL Ciphers
sudo nmap -sV --script ssl-enum-ciphers -p 443

#DNS Zone Transfer
sudo nmap --script dns-zone-transfer.nse --script-args dns-zonetransfer.domain=zonetransfer.me -p53 nsztm1.digi.ninja

#SMB Share Enumeration
sudo nmap --script smb-enum-shares.nse -p445 192.168.0.1

#SMB User Enumeration
sudo nmap --script smb-enum-users.nse -p445 192.168.0.1

#FTP Brute Force
sudo nmap --script ftp-brute -p21 192.168.0.1 --script-args userdb=ftp_defuser.lst,passdb=ftp_defuser.lst

#SSH Brute Force
sudo nmap -p 22 --script ssh-brute --script-args userdb=sshuser.txt,passdb=ssh-password.txt 192.168.0.1

#Network Layer Authentication
sudo nmap -p 3389 --script rdp-enum-encryption 192.168.0.1

#SMB Signing
sudo nmap -p137,139,445 --script smb-security-mode 192.168.0.1

#Ping Sweep To File
sudo nmap -n -sn -vv 10.51.0.0/16 | grep 'Host is up' -B 1 | grep Nmap | cut -d " " -f 5 > liveips.txt

#Increase Speed
-T1, -T2, -T3, -T4
sudo nmap -sT -p0- 192.169.0.1 -T4

#Increase Verbosity
-v1, -v2, -v3, -v4
sudo nmap -sT -p0- 192.169.0.1 -v4

#Input List
sudo nmap -iL targets.txt

#Save To File
sudo nmap 192.168.0.1 -oN scan.txt

#Save To XML
sudo nmap 192.168.0.1 -oX scan.xml

#Save To Grepable
sudo nmap 192.168.0.1 -oG scan.grep.txt