0xSs0rZ
search
Ctrlk
0xSs0rZ
  • Hello World
  • Whoamiarrow-up-right
  • Interesting Books
  • Pentest
    • CheckLists
    • Recon
    • Protocols
      • Port Scan
      • IDS IPS AV Evasion
      • Common Ports
      • MindMap
      • DNS (53)
      • FTP (21)
      • IMAP POP3 (110, 143, 993, 995)
      • IPMI (623 UDP)
      • IPsec / IKE VPN (500 UDP)
      • Kerberos (88)
      • LDAP (389)
      • MSSQL (1433)
      • MySQL (3306)
      • NFS (2049, 111)
      • Oracle TNS (1521, 1522-1529, 1748)
      • RDP (3389)
      • R-Services (512,513,514)
      • RSYNC (873)
      • SMB (445, 139) / RPC
      • SMTP (25, 465)
      • SNMP (10161, UDP 161)
      • SQLite
      • SSH (22)
      • WinRM (5985, 5986)
      • WMI (135)
    • Brute force
    • Shells
    • File Transfer
    • Web attacks
    • API
    • Public Exploit
    • External Pentest
    • Internal Pentest
    • Privilege Escalation
    • Post Exploitation
    • Cracking
    • Thick Client Pentest
    • Wifi Pentest
    • Mobile Pentest
    • Configuration Audit / Hardening
    • Code Analysis
    • Tools
    • Search Engines
    • Cheatsheets
    • Free VPN / Proxy
    • Note Keeping / Reporting / Admin Stuff
  • Cloud
    • Cloud VM
    • Enumeration
    • SSRF / RCE
    • Azure
    • AWS
    • GCP
    • Kubernetes
    • Tools
  • Labs
  • Antivirus Evasion - Defender
    • Mindmap
    • Defender Module for PowerShell
    • Static Analysis
    • Dynamic Analysis
    • AMSI Bypass
    • Process Injection
    • Open-Source Software
    • User Access Control (UAC)
    • AppLocker
    • LOLBAS / LOLDrivers / LOLESXi
    • PowerShell ConstrainedLanguage Mode, CLM
    • VBScript
    • Bypass all Powershell security features (AMSI,CLM)
    • Bypass AV Payload / Shells
    • Find Folder Exclusions
    • Resources
  • EDR BYPASS
    • Approches for Evasion
    • Tools
    • Obfuscation
    • EDR Killer
    • BYOVD
    • Spoof Command Line Arguments
    • Blind Spots
    • Living Off Security Tools / LOTTunels
    • Process Hollowing
    • Process Injection - Reverse Shell
    • Payload Creation
    • Shellcode Loader
    • MalDev
    • Malware Testing Lab
    • Resources
  • Red Team
    • OpSec / Anonymity
    • Initial Access
    • Infrastructure (phishing, C2, redirector)
    • C2
    • EDR / AV Bypass
    • Physical Penetration Testing
    • Bypass Bitlocker
    • Resources
  • CTF
    • OSINT
    • Forensic
    • Cryptography
    • Steganography
    • Write Up
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Pentest

Protocols

Port Scanchevron-rightIDS IPS AV Evasionchevron-rightCommon Portschevron-rightMindMapchevron-rightDNS (53)chevron-rightFTP (21)chevron-rightIMAP POP3 (110, 143, 993, 995)chevron-rightIPMI (623 UDP)chevron-rightIPsec / IKE VPN (500 UDP)chevron-rightKerberos (88)chevron-rightLDAP (389)chevron-rightMSSQL (1433)chevron-rightMySQL (3306)chevron-rightNFS (2049, 111)chevron-rightOracle TNS (1521, 1522-1529, 1748)chevron-rightRDP (3389)chevron-rightR-Services (512,513,514)chevron-rightRSYNC (873)chevron-rightSMB (445, 139) / RPCchevron-rightSMTP (25, 465)chevron-rightSNMP (10161, UDP 161)chevron-rightSQLitechevron-rightSSH (22)chevron-rightWinRM (5985, 5986)chevron-rightWMI (135)chevron-right
PreviousHost Discoverychevron-leftNextPort Scanchevron-right

Last updated 1 year ago