Skip to content

Latest commit

 

History

History
25 lines (19 loc) · 1.82 KB

README.md

File metadata and controls

25 lines (19 loc) · 1.82 KB

Checklist

Introduction

Even though, a penetration test is a creative process most people maintain private checklists to ensure that they will not forget to test networks, systems and applications against various scenarios and maintain the overall quality of the assessment.

Purpose

The aim of the project is to create detailed checklists that can be used by penetration testers and red teamers during their assessments. Every checklist will be linked with a detailed blog post on https://pentestlab.blog which will describe the technique and how to perform the required task. Information will also be included in the Wiki page on Github.

Techniques

Code Techniques Number
IA Initial Access 1
WPE Windows Privilege Escalation 16
PE Persistence 40
CA Credential Access 9
LM Lateral Movement 8
DE Domain Escalation 8
DP Domain Persistence 7

Contributions

If you noticed than a checklist is not complete please perform a pull request or contact me on Twitter @netbiosX

Notice

This is a live repository which means that checklists will be updated as soon as articles are published.