Hacknotes

Hacknotes - Comprehensive penetration testing documentation covering network scanning, service enumeration, web application security, and vulnerability exploitation techniques for ethical hackers and security professionals.

In this section

  • Scanning
    Network scanning penetration testing guide covering host discovery, port scanning, service enumeration, web enumeration, and vulnerability scanning techniques using tools like Nmap, Gobuster, and Nuclei for ethical hacking and security assessments.
    • Host Discovery
      Host discovery techniques for penetration testing, including ping sweeps, ARP scans, and Nmap host discovery methods to identify active systems and live hosts on target networks during security assessments.
    • Port Scanning
      Port scanning techniques for penetration testing using Nmap, including TCP SYN scans, UDP scans, firewall evasion, and comprehensive port enumeration methods to identify open services and potential attack vectors.
    • Service Enumeration
      Service enumeration techniques for penetration testing to gather detailed information about running services, including version detection, banner grabbing, and configuration analysis using Nmap, Netcat, and specialized tools to identify vulnerabilities and attack paths.
    • Web Enumeration
      Web enumeration techniques for penetration testing using Gobuster, Ffuf, Dirb, and Nuclei to discover directories, files, virtual hosts, API endpoints, and security weaknesses in web applications during security assessments.
    • Vulnerability Scanning
      Vulnerability scanning guide for penetration testing using Nmap NSE scripts, SearchSploit, OpenVAS, and specialized scanners to identify security weaknesses, misconfigurations, CVEs, and known vulnerabilities in systems and services.
  • Exploitation & Enumeration
    Exploitation and enumeration techniques for penetration testing, covering web application vulnerabilities (SQL injection, XSS, CSRF), network service exploitation (DNS, FTP, SMB), and advanced enumeration methods for security professionals and ethical hackers.
    • Network Services
      Network services penetration testing guide covering DNS, FTP, SMB, and other common network protocols. Learn enumeration techniques, vulnerability assessment, and exploitation methods for security testing and ethical hacking.
      • 21: FTP
        FTP penetration testing guide covering anonymous login testing, brute force attacks, banner grabbing, and file transfer exploitation using tools like Nmap, Hydra, and Netcat for security assessments and ethical hacking.
      • 22: SSH
        SSH penetration testing guide covering banner and version enumeration, authentication method detection, credential brute-forcing, key-based auth testing, vulnerability assessment, and SSH tunneling for pivoting using tools like Nmap, Hydra, and ssh-audit for security assessments and ethical hacking.
      • 53: DNS
        DNS penetration testing guide covering zone transfer testing, subdomain enumeration, DNS cache snooping, and DNS amplification attacks using tools like Dig, DNSRecon, Fierce, and Sublist3r for security assessments and ethical hacking.
      • 139,445: SMB
        SMB penetration testing guide covering share enumeration, authentication testing, Null session exploitation, and SMB vulnerability assessment using tools like Enum4linux, Smbclient, and Impacket for Windows network security testing.
    • Web
      Web application penetration testing documentation covering SQL injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and other web vulnerabilities. Practical exploitation techniques and tools for security testing and ethical hacking.
      • Command Injection
        Command injection detection guide covering OS command injection vulnerabilities in web applications. Learn how to identify injection points, detect command execution, test filter bypasses, and confirm vulnerabilities using manual testing and tools like Commix and Burpsuite.
      • Cross-Site Request Forgery (CSRF/XSRF)
        Cross-Site Request Forgery (CSRF) penetration testing guide covering token analysis, request forgery testing, and CSRF exploitation techniques. Learn how to identify vulnerable endpoints, create PoC attacks, and test CSRF protection mechanisms for web security assessments.
      • Cross-Site Scripting (XSS)
        Cross-Site Scripting (XSS) penetration testing guide covering reflected, stored, and DOM-based XSS vulnerabilities. Learn detection techniques, filter bypass methods, and exploitation using tools like XSSer, Dalfox, and manual testing for web application security assessments.
      • SQL Injection
        SQL injection penetration testing guide covering union-based, boolean-based, time-based, and error-based SQL injection techniques using SQLMap and manual methods to exploit database vulnerabilities and extract sensitive data during security assessments.
  • Post Exploitation
    Post-exploitation techniques for penetration testing and ethical hacking. Comprehensive guides on privilege escalation, persistence, lateral movement, data exfiltration, and maintaining access on compromised systems for security professionals and red team operators.
    • Privilege Escalation
      Privilege escalation techniques for penetration testing covering Linux and Windows privilege escalation methods. Learn to exploit misconfigurations, vulnerabilities, and weak permissions to gain root or administrator access on compromised systems.
      • Linux
        Complete Linux privilege escalation guide for penetration testing and ethical hacking. Learn sudo abuse, SUID/SGID exploitation, kernel exploits, capabilities, cron jobs, systemd timers, and automated enumeration with LinPEAS to gain root access on compromised Linux systems.
    • Tunneling
      Post-exploitation tunneling and pivoting: use SSH, SOCKS, HTTP(S), and other tunnels to route traffic through compromised hosts for lateral movement and egress when direct access is restricted.
      • SSH Tunneling and Pivoting
        SSH tunneling and pivoting: local, remote, and dynamic port forwarding and SSH agent forwarding and hijacking for post-exploitation.
Saturday, January 24, 2026 Monday, January 1, 1