OSCP Checklist
This is just a cheat sheet of sorts for myself.
Last updated
This is just a cheat sheet of sorts for myself.
Last updated
sudo nmap $target
sudo nmap -sV -sV -p- $target
sudo nmap --script vuln -p $target to check vulnerabilities on open services
check HTML comments, especially on login or registration pages
windows machine: powershell -ep bypass
sudo nmap -Pn --script vuln vault.offsec
whoami /priv
if SeRestorePrivilege listed then
Run to enable this privilege to our PowerShell session. We now have write access to C:\Windows\System32.
if access to RDP and C:\Windows\System32 then you an do the utilman exploit.
Check the page.
whoami /priv
if SeImpersonatePrivilege you may try juicy potato, or rogue potato (newer, but requires smb to be listening)