<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Methodology</id>
	<title>Methodology - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Methodology"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Methodology&amp;action=history"/>
	<updated>2026-04-21T14:46:20Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Methodology&amp;diff=1115&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 08:03, 8 June 2022</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Methodology&amp;diff=1115&amp;oldid=prev"/>
		<updated>2022-06-08T08:03:10Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Step 1 - Enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scanning ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Run NMAP default script on all ports. (&amp;lt;code&amp;gt;nmap -sC -sV --min-rate 100 IP -oN output.txt&amp;lt;/code&amp;gt;* /opt/nmapautomator FULL, UDP, VULN&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Port Enumeration ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Find service and versions* Find known service bugs* Find config issues* Find vulnerabilities using &amp;#039;&amp;#039;&amp;#039;Searchsploit&amp;#039;&amp;#039;&amp;#039; every service/app available* Enumerate each service closely. Look at the header using nc/telnet.* Default credentials (admin:admin, admin:secret, admin:pass etc...)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Scanning ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Nitko scan* Feroxbuster/gobuster (Remember -f switch! &amp;#039;&amp;#039;&amp;#039;Remember to try different wordlist)&amp;#039;&amp;#039;&amp;#039;* BurpSuite and look at the response.(Headers, URLs, Response, BurpPro to bruteforce)* Manually look at each sites request and response.* Find software versions* &amp;#039;&amp;#039;&amp;#039;FUZZ&amp;#039;&amp;#039;&amp;#039; every parameter&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Step 2 - Initial Access ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Step 3 - Privilege Escalation ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
gtfobins&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Inspo:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://guif.re/networkpentest#General%20methodology https://guif.re/networkpentest#General%20methodology]&lt;br /&gt;
&lt;br /&gt;
[[Category:Offensive Security]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>