book.hacktricks.xyz
Open in
urlscan Pro
2606:4700:4400::6812:282f
Public Scan
Submitted URL: http://book.hacktricks.xyz/
Effective URL: https://book.hacktricks.xyz/welcome/readme
Submission: On January 01 via api from US — Scanned from DE
Effective URL: https://book.hacktricks.xyz/welcome/readme
Submission: On January 01 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
HackTricks HackTricks TwitterLinkedinSponsorTwitchYoutube Ask or search… ⌃K Links 👾 Welcome! HackTricks HackTricks Values & faq About the author Getting Started in Hacking 🤩 Generic Methodologies & Resources Pentesting Methodology External Recon Methodology Pentesting Network Pentesting Wifi Phishing Methodology Basic Forensic Methodology Brute Force - CheatSheet Python Sandbox Escape & Pyscript Exfiltration Tunneling and Port Forwarding Threat Modeling Search Exploits Shells (Linux, Windows, MSFVenom) 🐧 Linux Hardening Checklist - Linux Privilege Escalation Linux Privilege Escalation Useful Linux Commands Bypass Linux Restrictions Linux Environment Variables Linux Post-Exploitation FreeIPA Pentesting 🍏 MacOS Hardening macOS Security & Privilege Escalation macOS Red Teaming macOS Useful Commands macOS Auto Start 🪟 Windows Hardening Checklist - Local Windows Privilege Escalation Windows Local Privilege Escalation Active Directory Methodology Windows Security Controls NTLM Lateral Movement Pivoting to the Cloud Stealing Windows Credentials Basic Win CMD for Pentesters Basic PowerShell for Pentesters Antivirus (AV) Bypass 📱 Mobile Pentesting Android APK Checklist Android Applications Pentesting iOS Pentesting Checklist iOS Pentesting Cordova Apps Xamarin Apps 👽 Network Services Pentesting Pentesting JDWP - Java Debug Wire Protocol Pentesting Printers Pentesting SAP Pentesting VoIP Pentesting Remote GdbServer 7/tcp/udp - Pentesting Echo 21 - Pentesting FTP 22 - Pentesting SSH/SFTP 23 - Pentesting Telnet 25,465,587 - Pentesting SMTP/s 43 - Pentesting WHOIS 49 - Pentesting TACACS+ 53 - Pentesting DNS 69/UDP TFTP/Bittorrent-tracker 79 - Pentesting Finger 80,443 - Pentesting Web Methodology 88tcp/udp - Pentesting Kerberos 110,995 - Pentesting POP 111/TCP/UDP - Pentesting Portmapper 113 - Pentesting Ident 123/udp - Pentesting NTP 135, 593 - Pentesting MSRPC 137,138,139 - Pentesting NetBios 139,445 - Pentesting SMB 143,993 - Pentesting IMAP 161,162,10161,10162/udp - Pentesting SNMP 194,6667,6660-7000 - Pentesting IRC 264 - Pentesting Check Point FireWall-1 389, 636, 3268, 3269 - Pentesting LDAP 500/udp - Pentesting IPsec/IKE VPN 502 - Pentesting Modbus 512 - Pentesting Rexec 513 - Pentesting Rlogin 514 - Pentesting Rsh 515 - Pentesting Line Printer Daemon (LPD) 548 - Pentesting Apple Filing Protocol (AFP) 554,8554 - Pentesting RTSP 623/UDP/TCP - IPMI 631 - Internet Printing Protocol(IPP) 873 - Pentesting Rsync 1026 - Pentesting Rusersd 1080 - Pentesting Socks 1098/1099/1050 - Pentesting Java RMI - RMI-IIOP 1414 - Pentesting IBM MQ 1433 - Pentesting MSSQL - Microsoft SQL Server 1521,1522-1529 - Pentesting Oracle TNS Listener 1723 - Pentesting PPTP 1883 - Pentesting MQTT (Mosquitto) 2049 - Pentesting NFS Service 2301,2381 - Pentesting Compaq/HP Insight Manager 2375, 2376 Pentesting Docker 3128 - Pentesting Squid 3260 - Pentesting ISCSI 3299 - Pentesting SAPRouter 3306 - Pentesting Mysql 3389 - Pentesting RDP 3632 - Pentesting distcc 3690 - Pentesting Subversion (svn server) 3702/UDP - Pentesting WS-Discovery 4369 - Pentesting Erlang Port Mapper Daemon (epmd) 4786 - Cisco Smart Install 5000 - Pentesting Docker Registry 5353/UDP Multicast DNS (mDNS) and DNS-SD 5432,5433 - Pentesting Postgresql 5439 - Pentesting Redshift 5555 - Android Debug Bridge 5601 - Pentesting Kibana 5671,5672 - Pentesting AMQP 5800,5801,5900,5901 - Pentesting VNC 5984,6984 - Pentesting CouchDB 5985,5986 - Pentesting WinRM 5985,5986 - Pentesting OMI 6000 - Pentesting X11 6379 - Pentesting Redis 8009 - Pentesting Apache JServ Protocol (AJP) 8086 - Pentesting InfluxDB 8089 - Pentesting Splunkd 8333,18333,38333,18444 - Pentesting Bitcoin 9000 - Pentesting FastCGI 9001 - Pentesting HSQLDB 9042/9160 - Pentesting Cassandra 9100 - Pentesting Raw Printing (JetDirect, AppSocket, PDL-datastream) 9200 - Pentesting Elasticsearch 10000 - Pentesting Network Data Management Protocol (ndmp) 11211 - Pentesting Memcache 15672 - Pentesting RabbitMQ Management 24007,24008,24009,49152 - Pentesting GlusterFS 27017,27018 - Pentesting MongoDB 44134 - Pentesting Tiller (Helm) 44818/UDP/TCP - Pentesting EthernetIP 47808/udp - Pentesting BACNet 50030,50060,50070,50075,50090 - Pentesting Hadoop 🕸 Pentesting Web Web Vulnerabilities Methodology Reflecting Techniques - PoCs and Polygloths CheatSheet 2FA/OTP Bypass Account Takeover Browser Extension Pentesting Methodology Bypass Payment Process Captcha Bypass Cache Poisoning and Cache Deception Clickjacking Client Side Template Injection (CSTI) Client Side Path Traversal Command Injection Content Security Policy (CSP) Bypass Cookies Hacking CORS - Misconfigurations & Bypass CRLF (%0D%0A) Injection CSRF (Cross Site Request Forgery) Dangling Markup - HTML scriptless injection Dependency Confusion Deserialization Domain/Subdomain takeover Email Injections File Inclusion/Path traversal File Upload Formula/CSV/Doc/LaTeX/GhostScript Injection gRPC Pentest HTTP Connection Contamination HTTP Connection Request Smuggling HTTP Request Smuggling / HTTP Desync Attack HTTP Response Smuggling / Desync Upgrade Header Smuggling hop-by-hop headers IDOR Integer Overflow JWT Vulnerabilities (Json Web Tokens) LDAP Injection Login Bypass NoSQL injection OAuth to Account takeover Open Redirect Parameter Pollution Phone Number Injections PostMessage Vulnerabilities Proxy / WAF Protections Bypass Race Condition Rate Limit Bypass Registration & Takeover Vulnerabilities Regular expression Denial of Service - ReDoS Reset/Forgotten Password Bypass SAML Attacks Server Side Inclusion/Edge Side Inclusion Injection SQL Injection SSRF (Server Side Request Forgery) SSTI (Server Side Template Injection) Reverse Tab Nabbing Unicode Injection WebSocket Attacks Web Tool - WFuzz XPATH injection XSLT Server Side Injection (Extensible Stylesheet Language Transformations) XXE - XEE - XML External Entity XSS (Cross Site Scripting) XSSI (Cross-Site Script Inclusion) XS-Search/XS-Leaks ⛈ Cloud Security Pentesting Kubernetes Pentesting Cloud (AWS, GCP, Az...) Pentesting CI/CD (Github, Jenkins, Terraform...) 😎 Hardware/Physical Access Physical Attacks Escaping from KIOSKs Firmware Analysis 🦅 Reversing & Exploiting Reversing Tools & Basic Methods Common API used in Malware Word Macros Linux Exploiting (Basic) (SPA) Exploiting Tools Windows Exploiting (Basic Guide - OSCP lvl) 🔮 Crypto & Stego Cryptographic/Compression Algorithms Certificates Cipher Block Chaining CBC-MAC Crypto CTFs Tricks Electronic Code Book (ECB) Hash Length Extension Attack Padding Oracle RC4 - Encrypt&Decrypt Stego Tricks Esoteric languages Blockchain & Crypto Currencies 🧐 External Platforms Reviews/Writeups BRA.I.NSMASHER Presentation 🦂 C2 Merlin Empire Salseo ICMPsh Cobalt Strike ✍ TODO Other Big References Rust Basics More Tools MISC Pentesting DNS Hardware Hacking Radio Hacking Burp Suite Other Web Tricks Interesting HTTP Emails Vulnerabilities Android Forensics TR-069 6881/udp - Pentesting BitTorrent CTF Write-ups 1911 - Pentesting fox Online Platforms with API Stealing Sensitive Information Disclosure from a Web Post Exploitation Cookies Policy Powered By GitBook Comment on page HACKTRICKS Hacktricks logos & motion design by @ppiernacho. Welcome to the wiki where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news. To get started follow this page where you will find the typical flow that you should follow when pentesting one or more machines: Pentesting Methodology PLATINUM SPONSORS Your company could be here. CORPORATE SPONSORS STM CYBER STM Cyber is a great cybersecurity company whose slogan is HACK THE UNHACKABLE. They perform their own research and develop their own hacking tools to offer several valuable cybersecurity services like pentesting, Red teams and training. You can check their blog in https://blog.stmcyber.com STM Cyber also support cybersecurity open source projects like HackTricks :) ROOTEDCON RootedCON is the most relevant cybersecurity event in Spain and one of the most important in Europe. With the mission of promoting technical knowledge, this congress is a boiling meeting point for technology and cybersecurity professionals in every discipline. RootedCON RootedCON INTIGRITI Intigriti is the Europe's #1 ethical hacking and bug bounty platform. Bug bounty tip: sign up for Intigriti, a premium bug bounty platform created by hackers, for hackers! Join us at https://go.intigriti.com/hacktricks today, and start earning bounties up to $100,000! Register - Intigriti Register - Intigriti TRICKEST Use Trickest to easily build and automate workflows powered by the world's most advanced community tools. Get Access Today: Workflow-powered solution for Bug Bounty, Pentesting, SecOps | Trickest Trickest INTRUDER Stay a step ahead in the cybersecurity game. Intruder makes vulnerability management easy. Keep track of your attack surface, see where your company is vulnerable, and prioritize issues that leave your systems most exposed so you can focus on what matters most. Run thousands of checks with a single platform that covers your entire tech stack from internal infrastructure to web apps, APIs and cloud systems. Integrate seamlessly with AWS, GCP, Azure and streamline DevOps so your team can implement fixes faster. Intruder never rests. Round-the-clock protection monitors your systems 24/7. Want to learn more? Visit their site and take it for a spin with a free trial. Intruder | An Effortless Vulnerability Scanner HACKENPROOF Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters! Hacking Insights Engage with content that delves into the thrill and challenges of hacking Real-Time Hack News Keep up-to-date with fast-paced hacking world through real-time news and insights Latest Announcements Stay informed with the newest bug bounties launching and crucial platform updates Join us on Discord and start collaborating with top hackers today! -------------------------------------------------------------------------------- WEBSEC WebSec is a professional cybersecurity company based in Amsterdam which helps protecting businesses all over the world against the latest cybersecurity threats by providing offensive-security services with a modern approach. WebSec is an all-in-one security company which means they do it all; Pentesting, Security Audits, Awareness Trainings, Phishing Campagnes, Code Review, Exploit Development, Security Experts Outsourcing and much more. Another cool thing about WebSec is that unlike the industry average WebSec is very confident in their skills, to such an extent that they guarantee the best quality results, it states on their website "If we can't hack it, You don't pay it!". For more info take a look at their website and blog! In addition to the above WebSec is also a committed supporter of HackTricks. DRAGONJAR DragonJAR is a leading offensive cybersecurity company located in Colombia. DragonJAR offers comprehensive offensive cybersecurity services, such as pentesting in various areas and practically any technology, Red Team attack simulations, physical security testing, stress testing, social engineering, source code security review, and cybersecurity training. Additionally, they organize the DragonJAR Security Conference, an international cybersecurity congress that has been held for over a decade, becoming a showcase for the latest security research in Spanish and of great relevance in the region. DragonJAR es una empresa líder en ciberseguridad ofensiva ubicada en Colombia, DragonJAR ofrece servicios integrales de seguridad informática ofensiva, como pentesting en diversas áreas y prácticamente cualquier tecnología, simulaciones de ataque Red Team, pruebas de seguridad física, pruebas de estrés, ingeniería social, revisión de seguridad en código fuente y capacitación en seguridad informática. Asimismo, organiza la DragonJAR Security Conference, un congreso internacional de seguridad informática que se ha realizado durante más de una década, convirtiéndose en el escaparate para las últimas investigaciones de seguridad en español y de gran relevancia en la región. LICENSE Copyright © Carlos Polop 2023. Except where otherwise specified (the external information copied into the book belongs to the original authors), the text on HACK TRICKS by Carlos Polop is licensed under the Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). If you want to use it with commercial purposes, contact me. DISCLAIMER This book, 'HackTricks,' is intended for educational and informational purposes only. The content within this book is provided on an 'as is' basis, and the authors and publishers make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability of the information, products, services, or related graphics contained within this book. Any reliance you place on such information is therefore strictly at your own risk. The authors and publishers shall in no event be liable for any loss or damage, including without limitation, indirect or consequential loss or damage, or any loss or damage whatsoever arising from loss of data or profits arising out of, or in connection with, the use of this book. Furthermore, the techniques and tips described in this book are provided for educational and informational purposes only, and should not be used for any illegal or malicious activities. The authors and publishers do not condone or support any illegal or unethical activities, and any use of the information contained within this book is at the user's own risk and discretion. The user is solely responsible for any actions taken based on the information contained within this book, and should always seek professional advice and assistance when attempting to implement any of the techniques or tips described herein. By using this book, the user agrees to release the authors and publishers from any and all liability and responsibility for any damages, losses, or harm that may result from the use of this book or any of the information contained within it. Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)! Other ways to support HackTricks: If you want to see your company advertised in HackTricks or download HackTricks in PDF Check the SUBSCRIPTION PLANS! Get the official PEASS & HackTricks swag Discover The PEASS Family, our collection of exclusive NFTs Join the 💬 Discord group or the telegram group or follow me on Twitter 🐦 @carlospolopm. Share your hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos. Next - Welcome! HackTricks Values & faq Last modified 2d ago Was this page helpful? On this page Platinum Sponsors Corporate Sponsors STM Cyber RootedCON Intigriti Trickest Intruder HACKENPROOF WebSec DragonJAR License Disclaimer To pick up a draggable item, press the space bar. While dragging, use the arrow keys to move the item. Press space again to drop the item in its new position, or press escape to cancel. CookiesThis site uses cookies to deliver its service and to analyse traffic. By browsing this site, you accept the cookie policy. Reject all HackTricks Change appearance 👾 Welcome! HackTricks HackTricks Values & faq About the author Getting Started in Hacking 🤩 Generic Methodologies & Resources Pentesting Methodology External Recon Methodology Pentesting Network Pentesting Wifi Phishing Methodology Basic Forensic Methodology Brute Force - CheatSheet Python Sandbox Escape & Pyscript Exfiltration Tunneling and Port Forwarding Threat Modeling Search Exploits Shells (Linux, Windows, MSFVenom) 🐧 Linux Hardening Checklist - Linux Privilege Escalation Linux Privilege Escalation Useful Linux Commands Bypass Linux Restrictions Linux Environment Variables Linux Post-Exploitation FreeIPA Pentesting 🍏 MacOS Hardening macOS Security & Privilege Escalation macOS Red Teaming macOS Useful Commands macOS Auto Start 🪟 Windows Hardening Checklist - Local Windows Privilege Escalation Windows Local Privilege Escalation Active Directory Methodology Windows Security Controls NTLM Lateral Movement Pivoting to the Cloud Stealing Windows Credentials Basic Win CMD for Pentesters Basic PowerShell for Pentesters Antivirus (AV) Bypass 📱 Mobile Pentesting Android APK Checklist Android Applications Pentesting iOS Pentesting Checklist iOS Pentesting Cordova Apps Xamarin Apps 👽 Network Services Pentesting Pentesting JDWP - Java Debug Wire Protocol Pentesting Printers Pentesting SAP Pentesting VoIP Pentesting Remote GdbServer 7/tcp/udp - Pentesting Echo 21 - Pentesting FTP 22 - Pentesting SSH/SFTP 23 - Pentesting Telnet 25,465,587 - Pentesting SMTP/s 43 - Pentesting WHOIS 49 - Pentesting TACACS+ 53 - Pentesting DNS 69/UDP TFTP/Bittorrent-tracker 79 - Pentesting Finger 80,443 - Pentesting Web Methodology 88tcp/udp - Pentesting Kerberos 110,995 - Pentesting POP 111/TCP/UDP - Pentesting Portmapper 113 - Pentesting Ident 123/udp - Pentesting NTP 135, 593 - Pentesting MSRPC 137,138,139 - Pentesting NetBios 139,445 - Pentesting SMB 143,993 - Pentesting IMAP 161,162,10161,10162/udp - Pentesting SNMP 194,6667,6660-7000 - Pentesting IRC 264 - Pentesting Check Point FireWall-1 389, 636, 3268, 3269 - Pentesting LDAP 500/udp - Pentesting IPsec/IKE VPN 502 - Pentesting Modbus 512 - Pentesting Rexec 513 - Pentesting Rlogin 514 - Pentesting Rsh 515 - Pentesting Line Printer Daemon (LPD) 548 - Pentesting Apple Filing Protocol (AFP) 554,8554 - Pentesting RTSP 623/UDP/TCP - IPMI 631 - Internet Printing Protocol(IPP) 873 - Pentesting Rsync 1026 - Pentesting Rusersd 1080 - Pentesting Socks 1098/1099/1050 - Pentesting Java RMI - RMI-IIOP 1414 - Pentesting IBM MQ 1433 - Pentesting MSSQL - Microsoft SQL Server 1521,1522-1529 - Pentesting Oracle TNS Listener 1723 - Pentesting PPTP 1883 - Pentesting MQTT (Mosquitto) 2049 - Pentesting NFS Service 2301,2381 - Pentesting Compaq/HP Insight Manager 2375, 2376 Pentesting Docker 3128 - Pentesting Squid 3260 - Pentesting ISCSI 3299 - Pentesting SAPRouter 3306 - Pentesting Mysql 3389 - Pentesting RDP 3632 - Pentesting distcc 3690 - Pentesting Subversion (svn server) 3702/UDP - Pentesting WS-Discovery 4369 - Pentesting Erlang Port Mapper Daemon (epmd) 4786 - Cisco Smart Install 5000 - Pentesting Docker Registry 5353/UDP Multicast DNS (mDNS) and DNS-SD 5432,5433 - Pentesting Postgresql 5439 - Pentesting Redshift 5555 - Android Debug Bridge 5601 - Pentesting Kibana 5671,5672 - Pentesting AMQP 5800,5801,5900,5901 - Pentesting VNC 5984,6984 - Pentesting CouchDB 5985,5986 - Pentesting WinRM 5985,5986 - Pentesting OMI 6000 - Pentesting X11 6379 - Pentesting Redis 8009 - Pentesting Apache JServ Protocol (AJP) 8086 - Pentesting InfluxDB 8089 - Pentesting Splunkd 8333,18333,38333,18444 - Pentesting Bitcoin 9000 - Pentesting FastCGI 9001 - Pentesting HSQLDB 9042/9160 - Pentesting Cassandra 9100 - Pentesting Raw Printing (JetDirect, AppSocket, PDL-datastream) 9200 - Pentesting Elasticsearch 10000 - Pentesting Network Data Management Protocol (ndmp) 11211 - Pentesting Memcache 15672 - Pentesting RabbitMQ Management 24007,24008,24009,49152 - Pentesting GlusterFS 27017,27018 - Pentesting MongoDB 44134 - Pentesting Tiller (Helm) 44818/UDP/TCP - Pentesting EthernetIP 47808/udp - Pentesting BACNet 50030,50060,50070,50075,50090 - Pentesting Hadoop 🕸 Pentesting Web Web Vulnerabilities Methodology Reflecting Techniques - PoCs and Polygloths CheatSheet 2FA/OTP Bypass Account Takeover Browser Extension Pentesting Methodology Bypass Payment Process Captcha Bypass Cache Poisoning and Cache Deception Clickjacking Client Side Template Injection (CSTI) Client Side Path Traversal Command Injection Content Security Policy (CSP) Bypass Cookies Hacking CORS - Misconfigurations & Bypass CRLF (%0D%0A) Injection CSRF (Cross Site Request Forgery) Dangling Markup - HTML scriptless injection Dependency Confusion Deserialization Domain/Subdomain takeover Email Injections File Inclusion/Path traversal File Upload Formula/CSV/Doc/LaTeX/GhostScript Injection gRPC Pentest HTTP Connection Contamination HTTP Connection Request Smuggling HTTP Request Smuggling / HTTP Desync Attack HTTP Response Smuggling / Desync Upgrade Header Smuggling hop-by-hop headers IDOR Integer Overflow JWT Vulnerabilities (Json Web Tokens) LDAP Injection Login Bypass NoSQL injection OAuth to Account takeover Open Redirect Parameter Pollution Phone Number Injections PostMessage Vulnerabilities Proxy / WAF Protections Bypass Race Condition Rate Limit Bypass Registration & Takeover Vulnerabilities Regular expression Denial of Service - ReDoS Reset/Forgotten Password Bypass SAML Attacks Server Side Inclusion/Edge Side Inclusion Injection SQL Injection SSRF (Server Side Request Forgery) SSTI (Server Side Template Injection) Reverse Tab Nabbing Unicode Injection WebSocket Attacks Web Tool - WFuzz XPATH injection XSLT Server Side Injection (Extensible Stylesheet Language Transformations) XXE - XEE - XML External Entity XSS (Cross Site Scripting) XSSI (Cross-Site Script Inclusion) XS-Search/XS-Leaks ⛈ Cloud Security Pentesting Kubernetes Pentesting Cloud (AWS, GCP, Az...) Pentesting CI/CD (Github, Jenkins, Terraform...) 😎 Hardware/Physical Access Physical Attacks Escaping from KIOSKs Firmware Analysis 🦅 Reversing & Exploiting Reversing Tools & Basic Methods Common API used in Malware Word Macros Linux Exploiting (Basic) (SPA) Exploiting Tools Windows Exploiting (Basic Guide - OSCP lvl) 🔮 Crypto & Stego Cryptographic/Compression Algorithms Certificates Cipher Block Chaining CBC-MAC Crypto CTFs Tricks Electronic Code Book (ECB) Hash Length Extension Attack Padding Oracle RC4 - Encrypt&Decrypt Stego Tricks Esoteric languages Blockchain & Crypto Currencies 🧐 External Platforms Reviews/Writeups BRA.I.NSMASHER Presentation 🦂 C2 Merlin Empire Salseo ICMPsh Cobalt Strike ✍ TODO Other Big References Rust Basics More Tools MISC Pentesting DNS Hardware Hacking Radio Hacking Burp Suite Other Web Tricks Interesting HTTP Emails Vulnerabilities Android Forensics TR-069 6881/udp - Pentesting BitTorrent CTF Write-ups 1911 - Pentesting fox Online Platforms with API Stealing Sensitive Information Disclosure from a Web Post Exploitation Cookies Policy Powered By GitBook