brain_fuck
CtrlK
  • 📁What Is It
  • 🐧Linux Hardening
    • 🏔️Privilege Escalation - Linux
      • SUDO
      • Kernel Exploit
      • SUID or SGID
      • Capabilities
      • Cron Jobs
      • PATH Hijacking
      • NFS (Network File Sharing)
  • 🖼️Windows Hardening
    • 🌋Privilege Escalation - Windows
      • Abusing dangerous privileges
      • Abusing Service Misconfigurations
      • Abusing Vulnerable Software
      • Recopilación de contraseñas en sitios habituales
      • Otras escaladas
    • 🧙‍♂️AD - Active Directory
      • Basic AD
      • Samba & NTML Relay
      • Pass The Hash (PTH)
      • Kerberoasting Attack
      • Golden Ticket & Pass The Ticket (PTT)
  • Others
    • 🧰Tools
      • Nmap
      • John the Ripper
        • zip2john
      • Gobuster
      • Smbmap
      • Smbclient
      • WPScan
      • GitHack
      • Chisel
        • Proxychains/Sock
      • Hydra
      • Msfvenom
      • CrackMapExec
      • Psexec
      • BloondHound & Ingestor
      • Rpcclient
      • Ldapdomaindump
      • Evil-wmr
      • Burpsuite
      • KeyHunter
    • 📦Modules HTB
      • Attacking Wi-Fi Protected Setup (WPS)
    • 🧮TCM-Security
      • 🔎OSINT Research Professional (PORP) Certification
        • Image OSINT
        • Discovering Email Addresses
        • Password OSINT
        • Hunting Usernames and Accounts
  • 📡Ports
    • 21 - FTP
    • 22 - SSH
    • 25 - SMTP
    • 53 - DNS
    • 443 - HTTPS
    • 139;445 - SMB
    • 3389 - RDP
    • 5985 - Wsman
  • 🍎Red - Bash Scripting
    • Pivoting
  • 👨‍💻Pentesting Methodology
    • Pivoting
      • Ligolo-ng
  • 🌐OSINT
    • 🔮MIXs
      • Gps-Coordinates
      • GPG
      • Sherlock
      • Wiggle
      • Whatsmyname
      • Image & Geospatial Intelligence
      • FFmpeg - Geolocating Videos
  • 🪪Certifications
    • 🕷️HTB-CBBH
      • 👑CBBH Cheatsheet
      • Using Web Proxies
        • Web Proxy
        • Web Fuzzer
        • Extensions
      • Information Gathering - Web Edition
        • DNS & Subdomains
      • Attacking Web Applications with Ffuf
        • Fuzzing
        • Skills Assessment
      • JavaScript Deobfuscation
        • Deobfuscation & Decode
      • Cross-Site Scripting (XSS)
        • XSS Basics
        • XSS Phishing
        • Blind XSS - Session Hijacking
      • SQL Injection
        • Databases & Queries
        • SQL Injections
        • Exploitation
          • Database Enumeration
          • Reading Files
          • Writing Files
        • Skill Assessment
      • SQLMap Essentials
        • Building Attacks
        • Database Enumeration
        • Advanced SQLMap Usage
        • Skills Assessment
      • Command Injections
        • OS Command Injections
        • Exploitation
        • Filter Evasion
        • Skills Assessment
      • File Upload Attacks
        • Basic Explotaition
        • Bypassing Filters
        • Other Upload Attacks
        • Skills Assessment
      • Server-side Attacks
        • SSRF
        • SSTI
        • SSI
        • XSLT
        • Skills Assessment
      • Login Brute Forcing
        • Brute Force Attacks
        • Hydra
        • Medusa
        • Custom Wordlists
        • Skills Assessment
      • Broken Authentication
        • Brute-Force Attacks
        • Default Credentials
        • Authentication Bypasses
        • Session Attacks
        • Skills Assessment
      • Web Attacks
        • HTTP Verb Tampering
        • Insecure Direct Object References (IDOR)
        • XML External Entity (XXE) Injection
        • Skills Assessment
      • File Inclusion
        • File Disclosure
        • Remote Code Execution
        • Automated Scanning
        • Skills Assessment
      • Session Security
        • Session Hijacking
        • Session Fixation
        • Obtaining Session Identifiers without User Interaction
        • Cross-Site Scripting (XSS)
        • Cross-Site Request Forgery (CSRF or XSRF)
        • Cross-Site Request Forgery (GET-based)
        • Cross-Site Request Forgery (POST-based)
        • XSS & CSRF Chaining
        • Exploiting Weak CSRF Tokens
          • Additional CSRF Protection Bypasses
        • Open Redirect
        • Session Security - Skills Assessment
      • Web Service & API Attacks
        • Web Service Attacks
        • API Attacks
        • Skills Assessment
      • Hacking WordPress
        • Info
        • Enumeration
        • Exploitin
    • 📶CWP-Certified WiFiChallenge Professional
      • 👑CWP Cheatsheet
      • Capitulo 1: Teoría de redes Wi-Fi
      • Capitulo 2: WiFiChallenge Lab - Primeros Pasos
      • Capitulo 3: Fundamentos de Linux
      • Capitulo 4: Redes Wi-Fi en Linux
        • Creación de Redes Wi-Fi (Access Points)
        • Listado de herramientas Hacking Wi‑Fi
      • Capítulo 5.0: Recon Wi-Fi Ofensivo
        • Resume - 5.0
        • Challenges RECON
      • Capítulo 5.1: Ataques Wi-Fi - OPN (Redes Públicas Abiertas)
        • Challenges OPN
      • Capítulo 5.2: Ataques Wi-Fi - OWE (Opportunistic Wireless Encryption)-(WPA-3)
      • Capítulo 5.3: Ataques Wi-Fi - WEP (Wired Equivalent Privacy)
        • Challenges WEP
      • Capítulo 5.4: Ataques Wi-Fi - PSK (Pre Shared Key)
        • Optimización cracking de contraseñas
        • Challenges PSK
      • Capítulo 5.5: Ataques Wi-Fi - SAE (Simultaneous Authentication of Equals)
        • Challenges SAE
      • Capítulo 5.6: Ataques Wi-Fi - Recon MGT
        • Challenges RECON MGT
      • Capítulo 5.7: Ataques Wi-Fi - MGT
        • Ataques Wi-Fi - MGT
        • Otras funcionalidades MGT
        • Challenges MGT
      • Capítulo 5.8: Ataques Wi-Fi - Detección
        • Challenges WIDS
      • Capítulo 6: Ataques Avanzados Wi-Fi Enterprise aka Ataques MGT indirectos
      • Capítulo 7: Experiencia en el mundo real
        • Checklist
          • Extracción de Credenciales Wi-Fi
        • Estructura del Informe
      • Capítulo 8: Securización de redes Wi-Fi
      • Examen FAQ y funcionamiento
    • 📵INE-eMAPT
      • Introduction to Mobile Application Security
        • LAB - Understanding the iOS Platform
      • Mobile Application Penetration Static Analysis
        • LAB - iOS: Hardcoded Secrets
      • OWASP Mobile Top 10 Vulnerabilities
        • LAB - XSS in Android
        • LAB - Insecure Network Transmission
        • LAB - Insecure Biometric Failover
        • LAB - Testing Debuggability
        • LAB - Insecure Data Storage
        • LAB - Insecure Auth 1
      • Android Dynamic Testing
        • LAB - Insecure LogIn
        • LAB - API SQLi in Android
        • LAB - Mobile Vulnerabilities: SQLi in Android
        • LAB - Sensitive Information Leakage
      • Notes Android
        • How to import Burp Cetf
      • Notes iOS
Powered by GitBook
On this page
  1. 🌐OSINT

🔮MIXs

Gps-CoordinatesGPGSherlockWiggleWhatsmynameImage & Geospatial IntelligenceFFmpeg - Geolocating Videos
PreviousOSINTNextGps-Coordinates