Offensive Po3nyo
CtrlK
GitHubBlog
  • Introduction
  • 📌Pinned
    • Cheat Sheet
      • MSFVenom-Cheatsheet
      • Hydra-Cheatsheet
      • Hashcat-Cheatsheet
  • 📖background knowledge
    • Active Directory & Windows
      • PowerShell
        • SC (Service Control)
      • AD-Port
    • Linux
    • Web
    • Network
    • CS
  • 🟥Offensive Security
    • Red Team Infrastructure
    • Blue Team Infrastructure
    • Reconnaissance
    • Initial Access
    • Execution
    • Persistence
    • Privilege Escalation
      • Linux
        • Kernel Exploits
        • Sudo
        • SUID / SGID
        • Capability
        • Cron Jobs
        • PATH
        • NFS
      • Active Directory
        • BadSuccessor
        • Golden dMSA
      • Windows
    • Defense Evasion
    • Credential Access
    • Discovery
    • Lateral Movement
    • Collection
    • Exfiltration
    • Command and Control
  • 🟦Web Pentesting
    • Server-Side
      • SQL injection
      • Authentication
      • Directory traversal
      • Command injection
      • Business logic vulnerabilities
      • Information disclosure
      • Access control
      • File upload vulnerabilities
      • Race conditions
      • Server-side request forgery (SSRF)
      • XXE injection
      • NoSQL injection
      • API testing
      • Web cache deception
      • Insecure deserialization
      • GraphQL API vulnerabilities
      • Server-side template injection (SSTI)
      • Web cache poisoning
      • HTTP Host header attacks
      • HTTP request smuggling
      • OAuth authentication
      • JWT attacks
    • Client-Side
      • Cross-site scripting (XSS)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • Dom-based vulnerabilities
      • WebSockets
      • Web LLM attacks
      • Prototype pollution
  • 🟩Mobile Pentesting
    • Android
    • IOS
  • 🟨reverse engineering
    • Reverse Engineering
  • 🟧forensic
    • Windows
    • Linux
  • 🟫ETC
    • Tools
      • Reconnaissance / OSINT
        • Nmap
        • Rustscan
        • Amass
        • Subfinder
        • Katana
        • Nuclei
      • Web Application Testing
        • BurpSuite
        • Caido
        • Feroxbuster
        • gobuster
        • Nikto
        • Wpscan
        • ffuf
        • wfuzz
        • Sqlmap
        • Ghauri
      • Vulnerability Scanning / Exploitation
        • Nessus
        • Invicti
        • HCL Appscan
        • OpenVas
        • Metasploit Framework
      • Credential Dumping / Password Cracking
        • Hydra
        • Hashcat
        • John The Ripper
        • Page
      • Privilege Escalation
      • Active Directory / 내부망 공격
        • Blood-hound
        • Impacket
        • Rubeus
        • CrackMapExec / Netexec
        • Powerview
        • Kerberute
        • Certify
        • Responder
      • Tunneling / Proxy / C2
        • Ngrok
        • Serveo
        • Chisel
        • Ligolo-ng
        • CoboltStrike
        • Havoc
        • Mythic
        • Sliver
        • AdaptixC2
      • Wireless / Nework Attack
      • Mobile
      • Reverse Enginnering
      • Forensic
    • CVE Research
Powered by GitBook
On this page
  1. 🟫ETC
  2. Tools
  3. Credential Dumping / Password Cracking

Page

PreviousJohn The RipperNextPrivilege Escalation