{"version":1,"pages":[{"id":"1cNB6ey3Uwuo2Ub1bjLZ","title":"Home","pathname":"/","siteSpaceId":"sitesp_hVOr5"},{"id":"RrGR7UD701xnCjvIqhHE","title":"Commands Only Summary","pathname":"/commands-only-summary","siteSpaceId":"sitesp_hVOr5","description":"🪟 = Windows, 🐧 = Linux"},{"id":"dpJqLVnNNm4pXStBGxWM","title":"Kali installation packages","pathname":"/commands-only-summary/kali-installation-packages","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Commands Only Summary"}]},{"id":"uxsMeX5qjKzaPnvnvfmn","title":"Some other cool websites","pathname":"/commands-only-summary/some-other-cool-websites","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Commands Only Summary"}]},{"id":"9ASWarKyTkd1Y94mBR8h","title":"Preparation","pathname":"/preparation","siteSpaceId":"sitesp_hVOr5"},{"id":"5EBacTm7SvhJKtXhRPr1","title":"Documents","pathname":"/preparation/documents","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Preparation"}]},{"id":"JLjNFNn6U1pkFVbmITN7","title":"Contract - Checklist","pathname":"/preparation/contract-checklist","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Preparation"}]},{"id":"i7tnrQBpS96kIVNywQB4","title":"Rules of Engagement - Checklist","pathname":"/preparation/rules-of-engagement-checklist","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Preparation"}]},{"id":"A6u9I6fqoZWBYFvOCu5U","title":"Contractors Agreement - Checklist for Physical Assessments","pathname":"/preparation/contractors-agreement-checklist-for-physical-assessments","siteSpaceId":"sitesp_hVOr5","description":"If the penetration test also includes physical testing, then an additional contractor's agreement is required.","breadcrumbs":[{"label":"Preparation"}]},{"id":"mVbca9SdxA79RMdR9rJe","title":"Information Gathering","pathname":"/information-gathering","siteSpaceId":"sitesp_hVOr5"},{"id":"hwrLE0bivQD5pMSSqCSS","title":"Vulnerability Assessment","pathname":"/vulnerability-assessment","siteSpaceId":"sitesp_hVOr5"},{"id":"8TvweWUZ0pJNfsgQVkKo","title":"Pentesting Machine","pathname":"/pentesting-machine","siteSpaceId":"sitesp_hVOr5"},{"id":"E9isAU7IkH2173ueexS2","title":"Enumeration","pathname":"/enumeration","siteSpaceId":"sitesp_hVOr5","description":"Enumeration phase tools. Fuzzing, Discovery, ..."},{"id":"I4NMnYA9X07HJT3TGaMA","title":"NMAP Scan types explained","pathname":"/enumeration/nmap-scan-types-explained","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Enumeration"}]},{"id":"whDkbWzxs2nbfbyX9Wmb","title":"Firewall and IDS/IPS Evasion","pathname":"/enumeration/firewall-and-ids-ips-evasion","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Enumeration"}]},{"id":"7ZFCueHbSZUL2bkaNzQ1","title":"Footprinting","pathname":"/footprinting","siteSpaceId":"sitesp_hVOr5"},{"id":"3zd52WMxQdZ4wgAMobdd","title":"Google Dorks","pathname":"/footprinting/google-dorks","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Footprinting"}]},{"id":"g8i0S1LW7QAGZhOMey7g","title":"Samba (smb)","pathname":"/footprinting/samba-smb","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Footprinting"}]},{"id":"4a78BqamE2N9AAEvjMTz","title":"NFS","pathname":"/footprinting/nfs","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Footprinting"}]},{"id":"OXyBWVh4JqiXqh9qH0cI","title":"DNS","pathname":"/footprinting/dns","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Footprinting"}]},{"id":"mbdAijPvG9BP72vC9a8v","title":"SMTP","pathname":"/footprinting/smtp","siteSpaceId":"sitesp_hVOr5","description":"Typical ports: TCP/25 TCP/465","breadcrumbs":[{"label":"Footprinting"}]},{"id":"UPggwiBdvWGnIRekAPfW","title":"IMAP/POP3","pathname":"/footprinting/imap-pop3","siteSpaceId":"sitesp_hVOr5","description":"IMAP on ports: TCP/143 or TCP/993 | POP3 on ports: TCP/110 and TCP/995","breadcrumbs":[{"label":"Footprinting"}]},{"id":"fVeR5TE95Y6CdJGQzdX2","title":"SNMP","pathname":"/footprinting/snmp","siteSpaceId":"sitesp_hVOr5","description":"Port: UDP/161 and Traps at UDP/162","breadcrumbs":[{"label":"Footprinting"}]},{"id":"F9rVvLlEasHZCwa4ZIfy","title":"MySQL","pathname":"/footprinting/mysql","siteSpaceId":"sitesp_hVOr5","description":"Port: TCP/3306","breadcrumbs":[{"label":"Footprinting"}]},{"id":"6FTx49Mrva6hE5s07ib0","title":"MSSQL","pathname":"/footprinting/mssql","siteSpaceId":"sitesp_hVOr5","description":"Port: TCP/1433","breadcrumbs":[{"label":"Footprinting"}]},{"id":"WSgIahMHQ7rBU9F6n3eI","title":"Oracle TNS","pathname":"/footprinting/oracle-tns","siteSpaceId":"sitesp_hVOr5","description":"Port: TCP/1521","breadcrumbs":[{"label":"Footprinting"}]},{"id":"jBTFUROZDFq5bAmMUGkx","title":"IPMI","pathname":"/footprinting/ipmi","siteSpaceId":"sitesp_hVOr5","description":"Port UDP/623","breadcrumbs":[{"label":"Footprinting"}]},{"id":"8uhioAhq4YNUoajA6XP5","title":"SSH","pathname":"/footprinting/ssh","siteSpaceId":"sitesp_hVOr5","description":"Port 22/TCP","breadcrumbs":[{"label":"Footprinting"}]},{"id":"j1nhnA5QGM2FjjVHotmK","title":"RDP","pathname":"/footprinting/rdp","siteSpaceId":"sitesp_hVOr5","description":"Port: TCP/3389","breadcrumbs":[{"label":"Footprinting"}]},{"id":"6K19c3mPZX7qDwCV3iRU","title":"WinRM","pathname":"/footprinting/winrm","siteSpaceId":"sitesp_hVOr5","description":"Ports: TCP/5985, TCP/5986","breadcrumbs":[{"label":"Footprinting"}]},{"id":"2GT0YqnzgBSts0ZEX5pu","title":"Web Information Gathering","pathname":"/web-information-gathering","siteSpaceId":"sitesp_hVOr5"},{"id":"3IBfDauj4FM9zJ9vIoLC","title":"Whois","pathname":"/web-information-gathering/whois","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Information Gathering"}]},{"id":"zwwboYLoh1KzzKnpLCpx","title":"DNS & Subdomains","pathname":"/web-information-gathering/dns-and-subdomains","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Information Gathering"}]},{"id":"0sYyTwmQouD5sMkL2EUH","title":"Fingerprinting","pathname":"/web-information-gathering/fingerprinting","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Information Gathering"}]},{"id":"ZlY1qdyOuPCr1LIuGl24","title":"Crawlers","pathname":"/web-information-gathering/crawlers","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Information Gathering"}]},{"id":"HAsmMYfXurCw1BdTrHwG","title":"Search Engine Discovery","pathname":"/web-information-gathering/search-engine-discovery","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Information Gathering"}]},{"id":"y7gComsVlIyNC8kkVv0O","title":"Automating Recon","pathname":"/web-information-gathering/automating-recon","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Information Gathering"}]},{"id":"8OFmm3JCwYbKTIwBf7I0","title":"Vulnerability Assessment","pathname":"/vulnerability-assessment-1","siteSpaceId":"sitesp_hVOr5"},{"id":"jsVE69fLDaz3icotK2U3","title":"File Transfers","pathname":"/file-transfers","siteSpaceId":"sitesp_hVOr5"},{"id":"GMJksw8Lizgei0H6Z8Q0","title":"Windows Target","pathname":"/file-transfers/windows-target","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"fPtMq2N7EoBAc00Js8of","title":"Linux Target","pathname":"/file-transfers/linux-target","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"vmRAUuJoDxqHvACEwqJ0","title":"Transferring Files with Code","pathname":"/file-transfers/transferring-files-with-code","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"BiLuTlKaT5Acclh12kxR","title":"Miscellaneous File Transfer Methods","pathname":"/file-transfers/miscellaneous-file-transfer-methods","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"meuwirov9kxB0tovTryi","title":"Protected Files Transfer","pathname":"/file-transfers/protected-files-transfer","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"TGB2V0zDQuz1kIJ4deeS","title":"Catching Files over HTTP/S (Nginx)","pathname":"/file-transfers/catching-files-over-http-s-nginx","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"6mSRBjGTU8clinp8kBWf","title":"Living Off The Land","pathname":"/file-transfers/living-off-the-land","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"ya8ncTwxiush9JhOVhd8","title":"Evading Detection","pathname":"/file-transfers/evading-detection","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Transfers"}]},{"id":"loYYAy5tzm0avTiRvNKS","title":"Shells & Payloads","pathname":"/shells-and-payloads","siteSpaceId":"sitesp_hVOr5"},{"id":"W6vDafa0hlLyVYCZrvrc","title":"Reverse Shells + Bind + Web","pathname":"/shells-and-payloads/reverse-shells-+-bind-+-web","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Shells & Payloads"}]},{"id":"NCJWSbPxKfuQBdFut44r","title":"Password Attacks","pathname":"/password-attacks","siteSpaceId":"sitesp_hVOr5"},{"id":"F5ZkVTv7PDRyoEeBx0Du","title":"John the ripper","pathname":"/password-attacks/john-the-ripper","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"TlhUZKhhikVDX1nkuX3F","title":"Introduction to Hashcat","pathname":"/password-attacks/introduction-to-hashcat","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"IOCniPDYH3Po0LiS3tZC","title":"Remote password attacks","pathname":"/password-attacks/remote-password-attacks","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"PMToBMiKc7UjhEsWzYFv","title":"Password mutations","pathname":"/password-attacks/password-mutations","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"jzFPIe9OFwG7UWVXihrP","title":"Password Reuse / Default Passwords","pathname":"/password-attacks/password-reuse-default-passwords","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"Beh6TZRb6czROnhjKbK2","title":"Windows Local Password Attacks","pathname":"/password-attacks/windows-local-password-attacks","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"TKZBk6WM1SY5GcHAreXq","title":"Linux Local Password Attacks","pathname":"/password-attacks/linux-local-password-attacks","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"4ZT10KuiPpVr7gidGA7M","title":"Windows Lateral Movement","pathname":"/password-attacks/windows-lateral-movement","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"FiwI216TVdc4Ugbrct8i","title":"Cracking Files","pathname":"/password-attacks/cracking-files","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Password Attacks"}]},{"id":"BQda05zxv1ZiSLkrcba8","title":"Attacking Common Services","pathname":"/attacking-common-services","siteSpaceId":"sitesp_hVOr5"},{"id":"3hLKfMGp8L7twfUdcTYO","title":"FTP","pathname":"/attacking-common-services/ftp","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Services"}]},{"id":"QAWZS6foFdjK3w9MnPnF","title":"SMB","pathname":"/attacking-common-services/smb","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Services"}]},{"id":"J6OsNd3XVArI2fawlLiG","title":"SQL","pathname":"/attacking-common-services/sql","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Services"}]},{"id":"saECcFJsFFdQMbW0MxCM","title":"RDP","pathname":"/attacking-common-services/rdp","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Services"}]},{"id":"lz1BojkI0RKlswcofq5C","title":"DNS","pathname":"/attacking-common-services/dns","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Services"}]},{"id":"EAqP1hAzucDON8bX3t0b","title":"Email Services","pathname":"/attacking-common-services/email-services","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Services"}]},{"id":"wKGR09omvVbUcjIfw9t1","title":"Pivoting, Tunneling, and Port Forwarding","pathname":"/pivoting-tunneling-and-port-forwarding","siteSpaceId":"sitesp_hVOr5"},{"id":"mdLsKtij1H443aiYWpS6","title":"Choosing The Dig Site & Starting Our Tunnels","pathname":"/pivoting-tunneling-and-port-forwarding/choosing-the-dig-site-and-starting-our-tunnels","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Pivoting, Tunneling, and Port Forwarding"}]},{"id":"Ocg68g4iZqj8GFAE03K1","title":"Playing Pong with Socat","pathname":"/pivoting-tunneling-and-port-forwarding/playing-pong-with-socat","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Pivoting, Tunneling, and Port Forwarding"}]},{"id":"EHBVxBJLJBp4uMsTDWrx","title":"Pivoting Around Obstacles","pathname":"/pivoting-tunneling-and-port-forwarding/pivoting-around-obstacles","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Pivoting, Tunneling, and Port Forwarding"}]},{"id":"pmLL4fXP3ydC0lTvutmS","title":"Branching Out Our Tunnels","pathname":"/pivoting-tunneling-and-port-forwarding/branching-out-our-tunnels","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Pivoting, Tunneling, and Port Forwarding"}]},{"id":"W37F68LkDoafmYCafOZj","title":"Double Pivots","pathname":"/pivoting-tunneling-and-port-forwarding/double-pivots","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Pivoting, Tunneling, and Port Forwarding"}]},{"id":"ppduu9KCaez7tlqV4xTT","title":"Final considerations","pathname":"/pivoting-tunneling-and-port-forwarding/final-considerations","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Pivoting, Tunneling, and Port Forwarding"}]},{"id":"YPIEBL1CVhiOKEU34ty6","title":"Active Directory Enumeration & Attacks","pathname":"/active-directory-enumeration-and-attacks","siteSpaceId":"sitesp_hVOr5"},{"id":"Gt9dMUbHyu9HXTg5RYLi","title":"Initial Enumeration","pathname":"/active-directory-enumeration-and-attacks/initial-enumeration","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"fRXK2PEJrIx4n84Q9nLH","title":"Sniffing out a Foothold","pathname":"/active-directory-enumeration-and-attacks/sniffing-out-a-foothold","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"Yxgpq8v5bnOpbIquumSn","title":"Sighting In, Hunting For A User","pathname":"/active-directory-enumeration-and-attacks/sighting-in-hunting-for-a-user","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"jqgUiqnM4Ohb4x27FbTh","title":"Spray Responsibly","pathname":"/active-directory-enumeration-and-attacks/spray-responsibly","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"R82mm24Dxcz1M0UyhxA6","title":"Deeper Down the Rabbit Hole","pathname":"/active-directory-enumeration-and-attacks/deeper-down-the-rabbit-hole","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"z0ozmVPMeQzh4Q9Rrewf","title":"Kerberoasting - Cooking with Fire","pathname":"/active-directory-enumeration-and-attacks/kerberoasting-cooking-with-fire","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"JMxCkG5BAGhRVcgw8SsC","title":"Access Control List (ACL)","pathname":"/active-directory-enumeration-and-attacks/access-control-list-acl","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"UNWZuJcqf9NM1fWQgvHY","title":"Advanced Privilege Escalation in Active Directory: Stacking The Deck","pathname":"/active-directory-enumeration-and-attacks/advanced-privilege-escalation-in-active-directory-stacking-the-deck","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"scxBxLG654sSYZxHVVmk","title":"Domain trusts","pathname":"/active-directory-enumeration-and-attacks/domain-trusts","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"iLvEemBnpSWEXFJ9shA3","title":"Domain Trusts - Cross Forest","pathname":"/active-directory-enumeration-and-attacks/domain-trusts-cross-forest","siteSpaceId":"sitesp_hVOr5","description":"","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"i68lA90IeI7Y9Qa6OW4a","title":"Defensive Considerations","pathname":"/active-directory-enumeration-and-attacks/defensive-considerations","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Active Directory Enumeration & Attacks"}]},{"id":"hjhJEb9dHHYXicVqEMWk","title":"Using Web Proxies","pathname":"/using-web-proxies","siteSpaceId":"sitesp_hVOr5"},{"id":"2hOxffGqXVcXsPPRX6Vn","title":"Login Brute Forcing","pathname":"/login-brute-forcing","siteSpaceId":"sitesp_hVOr5"},{"id":"9F9CFN80b2bUq7OjMUsr","title":"SQL Injection Fundamentals","pathname":"/sql-injection-fundamentals","siteSpaceId":"sitesp_hVOr5"},{"id":"Hk7ZxnnxgQg575uBDmXk","title":"Mitigating SQL Injection","pathname":"/sql-injection-fundamentals/mitigating-sql-injection","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"SQL Injection Fundamentals"}]},{"id":"uWOA0S0Shcfdyh82BYuF","title":"SQLMap Essentials","pathname":"/sqlmap-essentials","siteSpaceId":"sitesp_hVOr5"},{"id":"T6XAiHfrnMFy2cTXIx1k","title":"Building Attacks","pathname":"/sqlmap-essentials/building-attacks","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"SQLMap Essentials"}]},{"id":"cX439gkcOQv9KFHoV3lj","title":"Database Enumeration","pathname":"/sqlmap-essentials/database-enumeration","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"SQLMap Essentials"}]},{"id":"XUSmIDZagYGcgwo9J921","title":"Advanced SQLMap Usage","pathname":"/sqlmap-essentials/advanced-sqlmap-usage","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"SQLMap Essentials"}]},{"id":"M3441wS5ZmFAFPSxgVBS","title":"Cross-Site Scripting (XSS)","pathname":"/cross-site-scripting-xss","siteSpaceId":"sitesp_hVOr5"},{"id":"f6mJI677HobFbRclixcW","title":"Prevention","pathname":"/cross-site-scripting-xss/prevention","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Cross-Site Scripting (XSS)"}]},{"id":"hIF8bNiSxiSJEYg1rn8W","title":"File Inclusion","pathname":"/file-inclusion","siteSpaceId":"sitesp_hVOr5"},{"id":"U4IYlvxSrmuueKTq2DvI","title":"File Upload Attacks","pathname":"/file-upload-attacks","siteSpaceId":"sitesp_hVOr5"},{"id":"6J8oi35cCbM1NQUKN8L5","title":"Basic Exploitation","pathname":"/file-upload-attacks/basic-exploitation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Upload Attacks"}]},{"id":"Rmf4mUfWrgBe8c8FoLif","title":"Bypassing Filters","pathname":"/file-upload-attacks/bypassing-filters","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Upload Attacks"}]},{"id":"u8uyvsjtXKPbrE5e1S7w","title":"Other Upload Attacks","pathname":"/file-upload-attacks/other-upload-attacks","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Upload Attacks"}]},{"id":"auQVqkR1qAQPtk9thgtO","title":"Prevention","pathname":"/file-upload-attacks/prevention","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"File Upload Attacks"}]},{"id":"lInSyx5UdKaFbsPzycPf","title":"Command Injections","pathname":"/command-injections","siteSpaceId":"sitesp_hVOr5"},{"id":"E5uWQNvR8F6v4eCvZ1RJ","title":"Exploitation","pathname":"/command-injections/exploitation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Command Injections"}]},{"id":"DFSGXOt2o4H8HTJ5JTYc","title":"Filter Evasion","pathname":"/command-injections/filter-evasion","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Command Injections"}]},{"id":"rF2pD5Lkt534ZWU7HZCs","title":"Web Attacks","pathname":"/web-attacks","siteSpaceId":"sitesp_hVOr5"},{"id":"Dfa8DJ9a7hhhDRjtCVBe","title":"HTTP Verb Tampering","pathname":"/web-attacks/http-verb-tampering","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"hHGF2waV1FYHIC0iN6Cj","title":"Insecure Direct Object References (IDOR)","pathname":"/web-attacks/insecure-direct-object-references-idor","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"HTZavz3unyjgJZrsDnO0","title":"XML External Entity (XXE) Injection","pathname":"/web-attacks/xml-external-entity-xxe-injection","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"AMIQ47oV60ZK5W10qOWY","title":"GraphQL","pathname":"/web-attacks/graphql","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"IjYolStxArfE4NgSu3gc","title":"Attacking Common Applications","pathname":"/attacking-common-applications","siteSpaceId":"sitesp_hVOr5"},{"id":"Na3yJBJPFAVTAbCYEkQk","title":"Application Discovery & Enumeration","pathname":"/attacking-common-applications/application-discovery-and-enumeration","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"qmqfZ1I0HTweBicCMNJq","title":"Content Management Systems (CMS)","pathname":"/attacking-common-applications/content-management-systems-cms","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"WALweSmUvgVuPWOcRXPo","title":"Servlet Containers/Software Development","pathname":"/attacking-common-applications/servlet-containers-software-development","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"Ag5s1hx6w9K6pxKLjLpg","title":"Infrastructure/Network Monitoring Tools","pathname":"/attacking-common-applications/infrastructure-network-monitoring-tools","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"nuxBOcyuMxMftjOQ6dY5","title":"Customer Service Mgmt & Configuration Management","pathname":"/attacking-common-applications/customer-service-mgmt-and-configuration-management","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"YJe1TQhBSgWe2BOUqPRH","title":"Common Gateway Interfaces","pathname":"/attacking-common-applications/common-gateway-interfaces","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"WhDy5vBafHeNN6CFCo3S","title":"Thick Client Applications","pathname":"/attacking-common-applications/thick-client-applications","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"8L5BnmBdDmMMtBcRqqvW","title":"Miscellaneous Applications","pathname":"/attacking-common-applications/miscellaneous-applications","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Common Applications"}]},{"id":"vpEJKLhxq5RDA6eTKGWm","title":"Privilege Escalation","pathname":"/privilege-escalation","siteSpaceId":"sitesp_hVOr5"},{"id":"rZHE67etN9fyExQCF4f2","title":"Linux Privilege Escalation","pathname":"/privilege-escalation/linux-privilege-escalation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"}]},{"id":"8bQNEYZ5xNSAKqdbOBCR","title":"Information Gathering","pathname":"/privilege-escalation/linux-privilege-escalation/information-gathering","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"4g2j1Hy8smjzefPpnatk","title":"Environment-based Privilege Escalation","pathname":"/privilege-escalation/linux-privilege-escalation/environment-based-privilege-escalation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"yMxiAh0jjnxXei2hP4vZ","title":"Service-based Privilege Escalation","pathname":"/privilege-escalation/linux-privilege-escalation/service-based-privilege-escalation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"DEKsdE0Zwi3vWdRCpyPJ","title":"Linux Internals-based Privilege Escalation","pathname":"/privilege-escalation/linux-privilege-escalation/linux-internals-based-privilege-escalation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"jhU8iRchc1D4rssgBysX","title":"Recent 0-Days","pathname":"/privilege-escalation/linux-privilege-escalation/recent-0-days","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"kO3Yo3WUOaPr2vRyw4oJ","title":"Linux Hardening","pathname":"/privilege-escalation/linux-privilege-escalation/linux-hardening","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"rgJyvzcvguJqAaomt36J","title":"Windows Privilege Escalation","pathname":"/privilege-escalation/windows-privilege-escalation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"}]},{"id":"eAXBOUOkbzs4zHnj04yp","title":"Getting the Lay of the Land","pathname":"/privilege-escalation/windows-privilege-escalation/getting-the-lay-of-the-land","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"RcaPjSxXR1z3TFJjInNL","title":"Windows User Privileges","pathname":"/privilege-escalation/windows-privilege-escalation/windows-user-privileges","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"KaT3Xco1cKTo8NwTyatT","title":"Windows Group Privileges","pathname":"/privilege-escalation/windows-privilege-escalation/windows-group-privileges","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"TCWyLe9CnFLxAcYAddtU","title":"Attacking the OS","pathname":"/privilege-escalation/windows-privilege-escalation/attacking-the-os","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"Q7TjqHtgkwRCtA3c8NmZ","title":"Credential Theft","pathname":"/privilege-escalation/windows-privilege-escalation/credential-theft","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"06Cfqo6VOLGkXHbeCbjg","title":"Restricted Environments","pathname":"/privilege-escalation/windows-privilege-escalation/restricted-environments","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"GI9yflHE8NJJz0Z6nE4w","title":"Additional Techniques","pathname":"/privilege-escalation/windows-privilege-escalation/additional-techniques","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"PF61aPPBaWJF1szCBa4F","title":"Dealing with End of Life Systems","pathname":"/privilege-escalation/windows-privilege-escalation/dealing-with-end-of-life-systems","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"CHTzeoNZM9LXbGXjylB4","title":"Windows Hardening","pathname":"/privilege-escalation/windows-privilege-escalation/windows-hardening","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"4OhhXivUN2JrRrvRqCso","title":"Windows (old page)","pathname":"/privilege-escalation/windows-old-page","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Privilege Escalation"}]},{"id":"352VcdcnpBjD2bZeIHYo","title":"Documentation & Reporting","pathname":"/documentation-and-reporting","siteSpaceId":"sitesp_hVOr5"},{"id":"OeYcu8h40s4xBHCc3BhE","title":"Preparation","pathname":"/documentation-and-reporting/preparation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Documentation & Reporting"}]},{"id":"npalULMbrUC3s36gpJqh","title":"Reporting","pathname":"/documentation-and-reporting/reporting","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Documentation & Reporting"}]},{"id":"IoqRziKGQTdQTglOHUEe","title":"Attacking Enterprise Networks","pathname":"/attacking-enterprise-networks","siteSpaceId":"sitesp_hVOr5"},{"id":"55KC9k44uOsXNhd1NToO","title":"Pre-Engagement","pathname":"/attacking-enterprise-networks/pre-engagement","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Enterprise Networks"}]},{"id":"mG15tJR2oTGfpuvxO4IH","title":"External Testing","pathname":"/attacking-enterprise-networks/external-testing","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Enterprise Networks"}]},{"id":"w9QlhZoLcfImFfQ4uL9M","title":"Internal Testing","pathname":"/attacking-enterprise-networks/internal-testing","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Enterprise Networks"}]},{"id":"Qvcw489XkHwOrtwSGA7M","title":"Lateral Movement & Privilege Escalation","pathname":"/attacking-enterprise-networks/lateral-movement-and-privilege-escalation","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Enterprise Networks"}]},{"id":"KrVueTEpregU0kuFE5CL","title":"Wrapping Up","pathname":"/attacking-enterprise-networks/wrapping-up","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Attacking Enterprise Networks"}]},{"id":"HtovwlpRKNbU2Bj39icp","title":"Deobfuscation","pathname":"/deobfuscation","siteSpaceId":"sitesp_hVOr5","description":"Deobfuscation tools"},{"id":"fIBuLiN58Qc9qPPFomP6","title":"Metasploit","pathname":"/metasploit","siteSpaceId":"sitesp_hVOr5","description":"yup, this who page is just for it :3"},{"id":"yeCSf1cAkPh9LWvLQbVH","title":"msfvenom","pathname":"/metasploit/msfvenom","siteSpaceId":"sitesp_hVOr5","breadcrumbs":[{"label":"Metasploit"}]},{"id":"uimIhLANQiduRmmJz2DC","title":"Custom compiled files","pathname":"/custom-compiled-files","siteSpaceId":"sitesp_hVOr5"},{"id":"m6sWmdhqHUuG33nDaQsT","title":"XSS","pathname":"/xss","siteSpaceId":"sitesp_hVOr5"},{"id":"lBfigR2vDdbIml87v6Y0","title":"Azure AD (Entra ID)","pathname":"/azure-ad-entra-id","siteSpaceId":"sitesp_hVOr5"}]}