{"version":1,"pages":[{"id":"jJcPTVH0GueGmYUYEB50","title":"Tactics, Techniques, and Procedures","pathname":"/","siteSpaceId":"sitesp_gkEbx","description":"Tactics, Techniques, and Procedures (TTPs)"},{"id":"pEIyWSmlBDXVokOByjmg","title":"Fortress","pathname":"/pentesting/fortress","siteSpaceId":"sitesp_gkEbx","description":"Notes on attacking the fortress (external perimiter)","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"VTbqLtePCYJziHpWL62X","title":"Automation","pathname":"/pentesting/fortress/automation","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"YkqGfq6YnF3BlPEyVxzZ","title":"Cisco","pathname":"/pentesting/fortress/cisco","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"dKKhkqaGrsKylXqIbnIf","title":"Cisco Adaptive Security Appliance","pathname":"/pentesting/fortress/cisco/cisco-adaptive-security-appliance","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"},{"label":"Cisco"}]},{"id":"ur6gWfivzhY4iLQk1GGr","title":"Cisco Smart Install","pathname":"/pentesting/fortress/cisco/cisco-smart-install","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"},{"label":"Cisco"}]},{"id":"T4gkGUbNsKuEy0wATp9W","title":"CMS","pathname":"/pentesting/fortress/cms","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"NL327ZW7zvy8zD3DPIn9","title":"Drupal","pathname":"/pentesting/fortress/cms/drupal","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"},{"label":"CMS"}]},{"id":"VWxlBvo6PeVCbmTSkdL3","title":"Wordpress","pathname":"/pentesting/fortress/cms/wordpress","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"},{"label":"CMS"}]},{"id":"jjZWrPUxn1V3dgvrScDa","title":"Exchange","pathname":"/pentesting/fortress/exchange","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"y1stepuzSTG2Lkyip2ui","title":"Office365","pathname":"/pentesting/fortress/spray_microsoft","siteSpaceId":"sitesp_gkEbx","description":"A list of tools and resources that I use for password spraying Microsoft products.","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"HxtKQivv69WFFP0hWfcf","title":"Okta","pathname":"/pentesting/fortress/okta","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"ZKXL3m3z5jTGXaQxa0ld","title":"Outlook Web Access (OWA)","pathname":"/pentesting/fortress/outlook-web-access-owa","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"AWKEOFUiprpgB9w0k6ui","title":"SSH","pathname":"/pentesting/fortress/ssh","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"pXTda8Yob4TVwlkBieKO","title":"Subdomain Takeover","pathname":"/pentesting/fortress/subdomain-takeovers","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Resource Development, Sub-technique T1584.001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Fortress"}]},{"id":"H8twemzJnpYhmBPP6V0h","title":"Infrastructure","pathname":"/pentesting/infrastructure","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"jIJjTcxZDV640xUbCMdL","title":"Active Directory","pathname":"/pentesting/infrastructure/active-directory","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"6SL1i8YvarZQ2ZDXJgh7","title":"AD CS","pathname":"/pentesting/infrastructure/active-directory/ad-cs","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"b3X8KsGNULjvtbw8xtZi","title":"Coercing Authentication","pathname":"/pentesting/infrastructure/active-directory/coercing-authentication","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"Up0JuKgnmqZTdRM0rlYy","title":"Credential Dumping","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, ID TA0006","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"Z28UbCkdPINjqVyvKXFZ","title":"Cached Domain Credentials","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/cached-domain-credentials","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Sub-technique T1003.005","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"E6bJtAo1hqoza4qnxpAm","title":"Data Protection API (DPAPI)","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/data-protection-api-dpapi","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"mF5OUd94Sl3J1tuBmJPl","title":"Group Policy Preferences","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/group-policy-preferences","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Sub-technique T1552.006","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"lqpGICxpxdBVsiiUVLCQ","title":"LSA Secrets","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/lsa-secrets","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Sub-technique T1003.004","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"xkfmDnnIkhW5zQIeuMmH","title":"LSASS Memory","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/lsass-memory","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Sub-technique T1003.001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"IpvYEsO2VjSs8xqpBdCR","title":"NTDS","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/ntds","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"LNrwJd6Vdo1p4R2sLque","title":"Security Account Manager (SAM)","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/security-account-manager-sam","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Sub-technique T1003.002","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"Ncv6sZhgJou1kdrUeQkV","title":"Kerberos Tickets","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/kerberos-tickets","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Technique T1558","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"MKlzJNxXEoH19ygU4S0m","title":"Unsecured Credentials","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/unsecured_credentials-1","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Technique T1552","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"sGzKLBw3jnWQ37urNCh3","title":"WDigest","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/wdigest","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"EtqMWtiBZtXB6PuxY5tz","title":"WiFi Profiles","pathname":"/pentesting/infrastructure/active-directory/os-credential-dumping/wifi-profiles","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Credential Dumping"}]},{"id":"0QAWIrVKi7B75LoCQi7C","title":"Delegation Abuse","pathname":"/pentesting/infrastructure/active-directory/delegation-abuse","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"JpQHfzxvCoP03wBe3S19","title":"Constrained Delegation","pathname":"/pentesting/infrastructure/active-directory/delegation-abuse/constrained-delegation","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Delegation Abuse"}]},{"id":"tTsjqebKP5kldDIuKW0t","title":"Unconstrained Delegation","pathname":"/pentesting/infrastructure/active-directory/delegation-abuse/unconstrained-delegation","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Delegation Abuse"}]},{"id":"RTzL0253PeOliCQfCkfF","title":"Domain Enumeration","pathname":"/pentesting/infrastructure/active-directory/domain_enumeration","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"Fsa9vtkWwToLqcNneikv","title":"Domain Dominance","pathname":"/pentesting/infrastructure/active-directory/domain-dominance","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"IbWShARC8DDdEoSJoJHH","title":"Forge Golden Ticket","pathname":"/pentesting/infrastructure/active-directory/domain-dominance/create_golden_ticket","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Technique T1558.001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Domain Dominance"}]},{"id":"Bkp0k2idHpgb19b30Bue","title":"Forge Silver Ticket","pathname":"/pentesting/infrastructure/active-directory/domain-dominance/create-silver-ticket","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Technique T1558.002","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Domain Dominance"}]},{"id":"LhsW9CgCN5gdBSI8BPo4","title":"Forge Trust Ticket","pathname":"/pentesting/infrastructure/active-directory/domain-dominance/forge-trust-ticket","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Domain Dominance"}]},{"id":"YUKfxyUQ3eBmgu7xYqSL","title":"Skeleton Key","pathname":"/pentesting/infrastructure/active-directory/domain-dominance/skeleton_key","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Domain Dominance"}]},{"id":"GryG2zxe8XVVeIMUDGX3","title":"Group Policy Preferences","pathname":"/pentesting/infrastructure/active-directory/group-policy-preferences","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"GjXwFPT1e39NuqSiSVSO","title":"Kerberos","pathname":"/pentesting/infrastructure/active-directory/kerberos","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"MOxk7OBjbxYg6kPtukOa","title":"AS-REP Roasting","pathname":"/pentesting/infrastructure/active-directory/kerberos/as-rep-roasting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Kerberos"}]},{"id":"9N6jEyFnPE1UGRwPU3k3","title":"Kerberoasting","pathname":"/pentesting/infrastructure/active-directory/kerberos/kerberoasting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Kerberos"}]},{"id":"T0UEIDO75CLgPqjC7rJr","title":"Kerberos Relaying","pathname":"/pentesting/infrastructure/active-directory/kerberos/kerberos-relaying","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Kerberos"}]},{"id":"2OylXgU0n8eGtkb1xEWH","title":"Lateral Movement","pathname":"/pentesting/infrastructure/active-directory/lateral_movement","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Lateral Movement, ID TA0008","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"Xl6T8d3iEtvQYMUMIL4d","title":"PowerShell","pathname":"/pentesting/infrastructure/active-directory/lateral_movement/exploitation_with_powershell","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Execution, Technique T1059.001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Lateral Movement"}]},{"id":"TXggIsEYgHwwSAov9kwl","title":"Windows Remote Management (WinRM)","pathname":"/pentesting/infrastructure/active-directory/lateral_movement/winrm","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Lateral Movement, Sub-technique T1021.006","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Lateral Movement"}]},{"id":"ir28AvKoSQK4XA5XHK5y","title":"Local Administrator Password Solution (LAPS)","pathname":"/pentesting/infrastructure/active-directory/local-administrator-password-solution-laps","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"ghgqGb3ZEB38d0o3zkL9","title":"NoPac","pathname":"/pentesting/infrastructure/active-directory/nopac","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"C2CZMyfEG9xB1acaU1ai","title":"NTLMv1","pathname":"/pentesting/infrastructure/active-directory/ntlmv1","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"1Q2zkCDUfb5n8cbyl40z","title":"Password Cracking","pathname":"/pentesting/infrastructure/active-directory/password_cracking","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Credential Access, Sub-technique T1110.002","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"Ok5N4m5QGyAd3zy08zHa","title":"Password Policy","pathname":"/pentesting/infrastructure/active-directory/password-policy","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"eBvA2xGLWDADAxC9GmWg","title":"Password Spraying","pathname":"/pentesting/infrastructure/active-directory/password-spraying","siteSpaceId":"sitesp_gkEbx","description":"Methodology for performing password spraying attacks against active directory","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"KheoonWBJxajvgi0hjeh","title":"Reconnaissance","pathname":"/pentesting/infrastructure/active-directory/reconnaissance","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"KRaLnKyhhxrM0CmeKGIo","title":"Relaying","pathname":"/pentesting/infrastructure/active-directory/relaying","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"fAlIllBzV0HwmXwMN0y6","title":"LDAP Relaying","pathname":"/pentesting/infrastructure/active-directory/relaying/ldap-relaying","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Relaying"}]},{"id":"Pb6YG83JlU8kG4sShwY3","title":"SMB Relaying","pathname":"/pentesting/infrastructure/active-directory/relaying/smb-relaying","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"},{"label":"Relaying"}]},{"id":"mThBjbXmYTknNgHHZsdp","title":"Shadow Credentials","pathname":"/pentesting/infrastructure/active-directory/shadow-credentials","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"YG6Oul59vChZb20m2Dbf","title":"Zerologon","pathname":"/pentesting/infrastructure/active-directory/zerologon","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Active Directory"}]},{"id":"mDiNUHEY4LrTRyU9V2EL","title":"Database Management System (DBMS)","pathname":"/pentesting/infrastructure/database-management-system-dbms","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"QpiWIW2PN8TjJxFZH3xb","title":"Microsoft SQL Server","pathname":"/pentesting/infrastructure/database-management-system-dbms/sql-stored-procedures","siteSpaceId":"sitesp_gkEbx","description":"Obtaining a shell after obtaining credentials to a Microsoft SQL Server.","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Database Management System (DBMS)"}]},{"id":"qBex70sBysEIgWhfFNLh","title":"Defense Evasion","pathname":"/pentesting/infrastructure/defense_evasion","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Defense Evasion, ID TA0005","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"ygJu5FmeaFpmbcQUxrMT","title":"Disable or Modify Tools","pathname":"/pentesting/infrastructure/defense_evasion/disable_antivirus","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Defense Evasion, Sub-technique T1562.001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Defense Evasion"}]},{"id":"66Y7Roh4bC2qMPQOAdLK","title":"Disable Windows Event Logging","pathname":"/pentesting/infrastructure/defense_evasion/disable-windows-event-logging","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Defense Evasion, Sub-technique T1562.002","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Defense Evasion"}]},{"id":"u81TBNWIs54mx4CxSP66","title":"Impair Command History Logging","pathname":"/pentesting/infrastructure/defense_evasion/impair-command-history-logging","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Defense Evasion, Sub-technique T1562.003","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Defense Evasion"}]},{"id":"RMkT8nqyfICEy8uMr7fD","title":"Timestomping","pathname":"/pentesting/infrastructure/defense_evasion/timestomping","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Defense Evasion"}]},{"id":"eiiJdR4B6SFfYSOPFAkB","title":"Low-Hanging Fruit","pathname":"/pentesting/infrastructure/easy_hacks","siteSpaceId":"sitesp_gkEbx","description":"Easy ways to get a shell","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"VOHQIGhRmxjaDZqpE6wW","title":"Networks","pathname":"/pentesting/infrastructure/networks","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"HpEsss6n4C4lOjI8Ix4g","title":"IPv6","pathname":"/pentesting/infrastructure/networks/ipv6","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"sCNIwQ04UTRCihOEXNgB","title":"LLMNR/NBT-NS Poisoning","pathname":"/pentesting/infrastructure/networks/poisoning-with-responder","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"w4cu7s8bCFOOaKQwn7fc","title":"Network Scanning","pathname":"/pentesting/infrastructure/networks/network-scanning","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Discovery, Technique T1046","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"93jxOLgGbddF9NERDUvT","title":"Network Sniffing","pathname":"/pentesting/infrastructure/networks/network-sniffing","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Discovery, Technique T1040","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"elUvs2yokSTrN86vRhxw","title":"Segmentation Testing","pathname":"/pentesting/infrastructure/networks/segmentation_testing_notes","siteSpaceId":"sitesp_gkEbx","description":"When performing segmentation tests for PCI compliance, there aside from my Nmap scans there are a few things I've wanted to keep jotted down. This section contains my notes.","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"BbuxzNysUC5Dp3GGYZly","title":"Simple Network Management Protocol (SNMP)","pathname":"/pentesting/infrastructure/networks/simple-network-management-protocol-snmp","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"7XbGHbNqBmaY2g49yzke","title":"Subnet Enumeration","pathname":"/pentesting/infrastructure/networks/subnet-enumeration","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"QuLv83Ablr8mun40WkTy","title":"Identifying Domain Information","pathname":"/pentesting/infrastructure/networks/identifying-domain-information","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Networks"}]},{"id":"TEDSXrJZyhXr8UoW2gbE","title":"Persistence","pathname":"/pentesting/infrastructure/persistence","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Persistence, ID TA0003","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"C16jqpEMaCsphc7gKDNz","title":"Create Account","pathname":"/pentesting/infrastructure/persistence/create-account","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Persistence, Technique T1136","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"}]},{"id":"WKL15CE8eNQmkeQg91nh","title":"Remote Desktop","pathname":"/pentesting/infrastructure/persistence/remote-desktop","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"}]},{"id":"B5SiMXGvg2cwXpRnIeRH","title":"Services","pathname":"/pentesting/infrastructure/persistence/services","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"}]},{"id":"RpzL0yr4ISVsCGUepOG5","title":"Service Privilege Escalation / Persistence","pathname":"/pentesting/infrastructure/persistence/services/service-privilege-escalation-persistence","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"},{"label":"Services"}]},{"id":"0X3WjcgDcy1afLS8voHc","title":"Systemd Service Persistence","pathname":"/pentesting/infrastructure/persistence/services/systemd-service-persistence","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Persistence, Sub-technique T1543.002","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"},{"label":"Services"}]},{"id":"JH9f2vvwNmoONBm2LTjF","title":"Web Shell","pathname":"/pentesting/infrastructure/persistence/web-shell","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Persistence, Sub-technique T1505.003","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"}]},{"id":"rIwLesiXDJ2USBwk7DU5","title":"DLL Hijacking","pathname":"/pentesting/infrastructure/persistence/dll-hijacking","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Persistence"}]},{"id":"kCyvmaumgz38weewBRpG","title":"Pivoting","pathname":"/pentesting/infrastructure/protocol-tunneling","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Command and Control, Technique T1572","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"cgPH9GcG9haWvSTT1fPK","title":"Privilege Escalation","pathname":"/pentesting/infrastructure/privilege_escalation","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Privilege Escalation, ID TA0004","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"}]},{"id":"StUE43ABOFfI505n951n","title":"Linux","pathname":"/pentesting/infrastructure/privilege_escalation/linux","siteSpaceId":"sitesp_gkEbx","description":"List of commonly used escalation tools for Linux systems","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"}]},{"id":"hPIvL9p8xBFiTFqK44EC","title":"Setuid and Setgid","pathname":"/pentesting/infrastructure/privilege_escalation/linux/setuid-and-setgid","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Privilege Escalation, Sub-technique T1548.001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"},{"label":"Linux"}]},{"id":"usN6czKJ7JS4wetPCJZl","title":"Windows","pathname":"/pentesting/infrastructure/privilege_escalation/windows","siteSpaceId":"sitesp_gkEbx","description":"List of commonly used escalation tools for Windows systems","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"}]},{"id":"z79x0kaR1in30O38eWOM","title":"Privilege Abuse","pathname":"/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"N9CxWNLA9C9Fa5a6GwO2","title":"SeImpersonatePrivilege","pathname":"/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges/seimpersonateprivilege","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Privilege Abuse"}]},{"id":"RrCcWQiVmuc2hBqfcyCF","title":"SeLoadDriverPrivilege","pathname":"/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges/seloaddriverprivilege","siteSpaceId":"sitesp_gkEbx","description":"Privilege escalation using the load and unload device drivers policy (SeLoadDriverPrivilege).","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"},{"label":"Windows"},{"label":"Privilege Abuse"}]},{"id":"7bX0OKx8fG4CHKqA05LI","title":"Service Exploitation","pathname":"/pentesting/infrastructure/privilege_escalation/windows/service-exploitation","siteSpaceId":"sitesp_gkEbx","description":"Basic commands when abusing services to elevate privileges after being identified with a tool such as WinPEAS.","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Infrastructure"},{"label":"Privilege Escalation"},{"label":"Windows"}]},{"id":"xnfWjy1SnGejiHcZXbjB","title":"Initial Access","pathname":"/pentesting/initial_access","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Initial Access, ID TA0001","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"8pvvvyCEhQWRt7tz7FSG","title":"Phishing","pathname":"/pentesting/initial_access/phishing","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Initial Access, Technique T1566","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Initial Access"}]},{"id":"EszUPZtmkZJED1xakLSB","title":"Creating Templates","pathname":"/pentesting/initial_access/phishing/creating_templates","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Initial Access"},{"label":"Phishing"}]},{"id":"SqV36ehuDdxSZ2BxQ2tj","title":"Leveraging AI During Template Creation","pathname":"/pentesting/initial_access/phishing/creating_templates/leveraging-ai-during-template-creation","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Creating Templates"}]},{"id":"4rk4CBznRj9ubzrKlF0F","title":"Payloads","pathname":"/pentesting/initial_access/phishing/payloads","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Initial Access"},{"label":"Phishing"}]},{"id":"YI1xZDrADIVzEOSeFSP5","title":"Non-malicious Callback","pathname":"/pentesting/initial_access/phishing/payloads/non-malicious-callback","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Payloads"}]},{"id":"CECsSiuTxpNe1pXCzuPj","title":"Macros","pathname":"/pentesting/initial_access/phishing/payloads/macros","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Initial Access"},{"label":"Phishing"},{"label":"Payloads"}]},{"id":"dE1P4qWAIHt6NV3RgZuo","title":"OSINT","pathname":"/pentesting/osint","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"7CoSXEbf9dX6I588IkSd","title":"Identifying Users","pathname":"/pentesting/osint/gather-victim-identity-information","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Reconnaissance, Technique T1589","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"OSINT"}]},{"id":"oUTmNIAAwopjnLvWHfwP","title":"Network Information","pathname":"/pentesting/osint/gather-victim-network-information","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK, Reconnaissance, Technique T1590","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"OSINT"}]},{"id":"oJnW9zsY4pcdwZeg1E8U","title":"Search Engines","pathname":"/pentesting/osint/search-engines","siteSpaceId":"sitesp_gkEbx","description":"MITRE ATT&CK Reconnaissance, Technique T1596","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"OSINT"}]},{"id":"1crqNi2NwJYbQbZKnzUq","title":"Web Applications","pathname":"/pentesting/web-applications","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"z3l1hnWGcMHAm0Ov4Y3e","title":"Access Control","pathname":"/pentesting/web-applications/access-control","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"N8VhE4Cv6x0lsvIeUwSA","title":"APIs","pathname":"/pentesting/web-applications/apis","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"4UKpLPDvDfd6HBCI1KET","title":"Swagger API","pathname":"/pentesting/web-applications/apis/swagger-api","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"APIs"}]},{"id":"K0sMEwA8yri5aG1WeZAA","title":"Authentication","pathname":"/pentesting/web-applications/authentication","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"bOFBtFXdxozPgjI5gdtm","title":"Account Takeover","pathname":"/pentesting/web-applications/authentication/account-takeover","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Authentication"}]},{"id":"XMtinVZtUWLBqEiY1gto","title":"Clickjacking","pathname":"/pentesting/web-applications/clickjacking","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"WEP6WDidzOHlP4K8xrV6","title":"Cross Origin Resource Sharing (CORS)","pathname":"/pentesting/web-applications/cross-origin-resource-sharing-cors","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"9Y4Q9RYE4PWt8IlMDmOY","title":"Cross Site Request Forgery (CSRF)","pathname":"/pentesting/web-applications/cross-site-request-forgery-csrf","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"WNetzq3U99h79AgAPSWa","title":"Document Object Model (DOM)","pathname":"/pentesting/web-applications/document-object-model-dom","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"DqzA0Jxs0nBqbx8mo5e2","title":"File Upload","pathname":"/pentesting/web-applications/file-upload","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"vFVGKk4RFEzBgPQbDi4K","title":"Google Dorking","pathname":"/pentesting/web-applications/google-dorking","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"wZtTkFlOIETbkw4M2zOJ","title":"GraphQL","pathname":"/pentesting/web-applications/graphql","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"1OeoLXPxhEB0Ek3YJSYn","title":"HTTP Request Smuggling","pathname":"/pentesting/web-applications/http-request-smuggling","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"bYZA2oCGG8kSdlqvvffM","title":"Information Disclosure","pathname":"/pentesting/web-applications/information-disclosure","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"1ty5hFeeTvxCmnEIeDTa","title":"Insecure Direct Object Reference (IDOR)","pathname":"/pentesting/web-applications/insecure-direct-object-reference-idor","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"NDWQdZSCbiH1LNNwh6Q2","title":"Injection Vulnerabilities","pathname":"/pentesting/web-applications/injection-vulnerabilities","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"0ke13763BEymy81YMpi6","title":"Cross-Site Scripting (XSS)","pathname":"/pentesting/web-applications/injection-vulnerabilities/cross-site-scripting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"W2H9C4KQp9zFWRZCcKT5","title":"Blind Cross-Site Scripting","pathname":"/pentesting/web-applications/injection-vulnerabilities/cross-site-scripting/blind-cross-site-scripting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"},{"label":"Cross-Site Scripting (XSS)"}]},{"id":"5U7FyFrumqWi4H1DI0wQ","title":"Finding Cross-Site Scripting","pathname":"/pentesting/web-applications/injection-vulnerabilities/cross-site-scripting/finding-cross-site-scripting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"},{"label":"Cross-Site Scripting (XSS)"}]},{"id":"uIDoojRzIAMjsSR3RQgn","title":"Stealing Cookies","pathname":"/pentesting/web-applications/injection-vulnerabilities/cross-site-scripting/stealing-cookies","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"},{"label":"Cross-Site Scripting (XSS)"}]},{"id":"NSu8UGaVEnSnZ9MGD14a","title":"XSS Payloads","pathname":"/pentesting/web-applications/injection-vulnerabilities/cross-site-scripting/xss-payloads","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"},{"label":"Cross-Site Scripting (XSS)"}]},{"id":"biPFas8oNXPLMt46we9x","title":"CSV Injection","pathname":"/pentesting/web-applications/injection-vulnerabilities/csv-injection","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"q3Ff933ZXHxwPAktLzMu","title":"XML External Entity Injection (XXE)","pathname":"/pentesting/web-applications/injection-vulnerabilities/external-entity-injection-xxe","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"Kq1RFzW6fUf23ZYd5iZk","title":"LDAP Injection","pathname":"/pentesting/web-applications/injection-vulnerabilities/ldap-injection","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"eioVXU9cH2OayeQFTZWS","title":"NoSQL Injection","pathname":"/pentesting/web-applications/injection-vulnerabilities/nosql-injection","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"IRyvgwiFOCRB2PEjwjHm","title":"Server-Side Template Injection","pathname":"/pentesting/web-applications/injection-vulnerabilities/server-side-template-injection","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"74L7f6nQjX8Bc5fcZQT4","title":"SQL Injection","pathname":"/pentesting/web-applications/injection-vulnerabilities/sql-injection","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Injection Vulnerabilities"}]},{"id":"Us6jPSkDojbz0yNOoaEw","title":"JSON Web Tokens (JWT)","pathname":"/pentesting/web-applications/json-web-tokens-jwt","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"dzw6eAo3vbtbpPJMWk8z","title":"Local File Inclusion (LFI)","pathname":"/pentesting/web-applications/local-file-inclusion-lfi","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"bn77Fbo1jKyXjlemsT3E","title":"OAuth","pathname":"/pentesting/web-applications/oauth","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"psn6B1V3uL84ImThvrwT","title":"Open Redirection","pathname":"/pentesting/web-applications/open-redirection","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"GaiELGLS6yI0VPP2P1Jv","title":"Password Reset Poisoning","pathname":"/pentesting/web-applications/password-reset-poisoning","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"fWznlpiVSuXNIxdIIQtc","title":"Prototype Pollution","pathname":"/pentesting/web-applications/prototype-pollution","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"9uUOEA5ZxdF8zIHdK19A","title":"Race Condition","pathname":"/pentesting/web-applications/race-condition","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"UGvCgS37cm59YVLU8r8P","title":"Rate Limit Bypass","pathname":"/pentesting/web-applications/rate-limit-bypass","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"FoZJYDbwmMAwlVM887j6","title":"Remote Code Execution (RCE)","pathname":"/pentesting/web-applications/remote-code-execution-rce","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"RLkoYjYCmbXTjjAWJEs0","title":"Remote File Inclusion (RFI)","pathname":"/pentesting/web-applications/remote-file-inclusion-rfi","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"ZaIQfFiLVYwXVTvr5gHP","title":"Suspicious Parameters","pathname":"/pentesting/web-applications/suspicious-parameters","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"Pi5j0OJ5w2TuNiMYjCxm","title":"Tooling","pathname":"/pentesting/web-applications/tooling","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"FTVPgfP5sVbezcH4tUI4","title":"Burp Suite","pathname":"/pentesting/web-applications/tooling/burp-suite","siteSpaceId":"sitesp_gkEbx","description":"Notes around using and performing testing with Burp Suite","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Tooling"}]},{"id":"j8GRBF2tamVOEHFNyy5K","title":"Authentication / Proxy Issues","pathname":"/pentesting/web-applications/tooling/burp-suite/authentication-proxy-issues","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Tooling"},{"label":"Burp Suite"}]},{"id":"Plrh9lS7ObJJMxLg55QU","title":"Intruder Attack Types","pathname":"/pentesting/web-applications/tooling/burp-suite/intruder_attack_types","siteSpaceId":"sitesp_gkEbx","description":"Brief descriptions of each attack type in Burp Suite Intruder.","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Tooling"},{"label":"Burp Suite"}]},{"id":"dnrO3wfH2Nt60XnS5IIX","title":"Match and Replace","pathname":"/pentesting/web-applications/tooling/burp-suite/match-and-replace","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Tooling"},{"label":"Burp Suite"}]},{"id":"XSbwsi2izZcw2P3RUcwi","title":"Quality of Life","pathname":"/pentesting/web-applications/tooling/burp-suite/quality-of-life","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Tooling"},{"label":"Burp Suite"}]},{"id":"TyxjRuwZDBN8MCy6mCGx","title":"Misc Tooling","pathname":"/pentesting/web-applications/tooling/misc-tooling","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"},{"label":"Tooling"}]},{"id":"2wMnfEtR20BFTqzws0a7","title":"WAF Bypasses","pathname":"/pentesting/web-applications/waf-bypasses","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"UO2BV91peCPgJT8MbRqr","title":"WebSockets","pathname":"/pentesting/web-applications/websockets","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"JYKT1cXUG0eX8yJXxUI8","title":"Web Cache Deception","pathname":"/pentesting/web-applications/web-cache-deception","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"jCTqDodJd4UhAr8CdlzM","title":"Web Cache Poisoning","pathname":"/pentesting/web-applications/web-cache-poisoning","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Web Applications"}]},{"id":"LpitDai5AxTttJFyBBE6","title":"Wireless","pathname":"/pentesting/wireless","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"rB2rSNVS7T2AVvViXS7y","title":"WPA / WPA2","pathname":"/pentesting/wireless/wpa-wpa2","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Wireless"}]},{"id":"TCbucVz8rom4oRe2Skut","title":"Alfa Troubleshooting","pathname":"/pentesting/wireless/wpa-wpa2/alfa-troubleshooting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Wireless"},{"label":"WPA / WPA2"}]},{"id":"OpTdNteHXCUmHbHrpoaq","title":"Enterprise","pathname":"/pentesting/wireless/wpa-wpa2/enterprise","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Wireless"},{"label":"WPA / WPA2"}]},{"id":"bZflR9QoFqKJnH3NrvCR","title":"Personal","pathname":"/pentesting/wireless/wpa-wpa2/personal","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Wireless"},{"label":"WPA / WPA2"}]},{"id":"5yiHOb5hKGliK2HMJdAg","title":"Cloud","pathname":"/pentesting/cloud","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"}]},{"id":"BzATRPI0VX9SwazAU64Z","title":"Amazon Web Services (AWS)","pathname":"/pentesting/cloud/amazon-web-services-aws","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Cloud"}]},{"id":"8cxcWiA3KX7HnOmVHKzB","title":"Microsoft Azure","pathname":"/pentesting/cloud/microsoft-azure","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Pentesting","emoji":"2620"},{"label":"Cloud"}]},{"id":"csillopGxYYPY43rEcpn","title":"C2","pathname":"/red-teaming/c2","siteSpaceId":"sitesp_gkEbx","description":"https://www.thec2matrix.com","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"}]},{"id":"lvEcsyDp61E7WEPJzLq2","title":"Cobalt Strike","pathname":"/red-teaming/c2/cobalt-strike","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"C2"}]},{"id":"531fGi8kXoZzoZdVKU9J","title":"Empire","pathname":"/red-teaming/c2/empire","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"C2"}]},{"id":"DRUPKts3yeRdYZY2b1OQ","title":"Metasploit","pathname":"/red-teaming/c2/metasploit","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"C2"}]},{"id":"WB0B2S16eePgx1gV7bJR","title":"Metasploit Datatabase","pathname":"/red-teaming/c2/metasploit/metasploit_database","siteSpaceId":"sitesp_gkEbx","description":"Some tips and tricks around using the Metasploit Framework Dataabse (msfdb)","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"C2"},{"label":"Metasploit"}]},{"id":"fRfKcTLyGgK8DPuheemc","title":"Mythic","pathname":"/red-teaming/c2/mythic","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"C2"}]},{"id":"xfgKcVfMUleaJtRuRQSY","title":"Sliver","pathname":"/red-teaming/c2/sliver","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"C2"}]},{"id":"DBVDoGZOkdTaw5QoqLg8","title":"Malware Dev","pathname":"/red-teaming/malware-dev","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"}]},{"id":"WgwK7Wwl5bOyiL3oXuQd","title":"Offensive Infrastructure","pathname":"/red-teaming/offensive-infrastructure","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"}]},{"id":"CgyTNmwUUmnrjCrNynUb","title":"Cloud Fronting","pathname":"/red-teaming/offensive-infrastructure/cloud-fronting","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"Offensive Infrastructure"}]},{"id":"wQlAoRsCr2NTzOlaemuv","title":"Redirectors","pathname":"/red-teaming/offensive-infrastructure/redirectors","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"Offensive Infrastructure"}]},{"id":"g7L6B7YfdhGb5NkSHNhT","title":"OpSec","pathname":"/red-teaming/offensive-infrastructure/opsec","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"Offensive Infrastructure"}]},{"id":"YMlRWVCAsUSUdrpBoGIB","title":"Phishing Infrastructure","pathname":"/red-teaming/offensive-infrastructure/phishing-infrastructure","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"Offensive Infrastructure"}]},{"id":"lYoQVEMT5ol9z9ZPtv08","title":"Creating a Dropbox","pathname":"/red-teaming/offensive-infrastructure/creating-a-dropbox","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"},{"label":"Offensive Infrastructure"}]},{"id":"fw2c0CIFsRjjUdxHzqq8","title":"Offensive Tactics","pathname":"/red-teaming/offensive-tactics","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"}]},{"id":"HSEzoveac8d0cKCxHEJE","title":"Philosophy","pathname":"/red-teaming/philosophy","siteSpaceId":"sitesp_gkEbx","description":"Random Twitter threads condensed that I find interesting around Red Teaming conversations.","breadcrumbs":[{"label":"Red Teaming","emoji":"1f9e8"}]},{"id":"XtTOqvPsTMJ7F0F9ITGo","title":"Bug Bounty Tips & Tricks","pathname":"/bug-bounty/bug-bounty-tips-and-tricks","siteSpaceId":"sitesp_gkEbx","description":"Collection of Bug Bounty tips & tricks I have discovered and/or read on Twitter. Little bit of an overlap with web application testing but less vulnerability focused.","breadcrumbs":[{"label":"Bug Bounty","emoji":"1f98b"}]},{"id":"Ls0D5kC1SrYLNV1yuOfG","title":"Blog Posts and Goodies","pathname":"/resources/blog-posts-and-goodies","siteSpaceId":"sitesp_gkEbx","description":"A collection of blog posts & goodies that I have found useful and continue to reference.","breadcrumbs":[{"label":"Resources","emoji":"1f4d6"}]},{"id":"VRkzXQQjixjUxIm59BVe","title":"Checklists","pathname":"/resources/checklists","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Resources","emoji":"1f4d6"}]},{"id":"24v6weM8yBmkJh8FlUdS","title":"Offensive Security Notes","pathname":"/resources/red_notes","siteSpaceId":"sitesp_gkEbx","description":"Unorganized collections of my notes from CTFs and penetration tests","breadcrumbs":[{"label":"Resources","emoji":"1f4d6"}]},{"id":"S290RzMzfreeAZlK8kAt","title":"Tooling Repository","pathname":"/resources/tooling-repository","siteSpaceId":"sitesp_gkEbx","description":"","breadcrumbs":[{"label":"Resources","emoji":"1f4d6"}]},{"id":"CfO4Mhx5oKvK1WwkZURH","title":"Active Directory Toolkit","pathname":"/resources/active-directory-toolkit","siteSpaceId":"sitesp_gkEbx","breadcrumbs":[{"label":"Resources","emoji":"1f4d6"}]}]}