Cub3sec's Offensive Handbook
search
⌘Ctrlk
Cub3sec's Offensive Handbook
  • πŸ–₯️Cub3sec's Offensive Handbook
  • πŸ”Enumeration
    • πŸ“΄Passive
      • Tools
      • Websites
    • πŸ“³Active
    • πŸ•ΈοΈWeb Application
  • πŸ“₯Initial Access
    • πŸ•ΈοΈCommon Web Application Attacks
    • πŸ’‰SQL Injection Attacks
    • 🧍Client-Side Attacks
    • πŸ”‘Password Attacks
    • 🐚Shells
  • βš”οΈPrivilege Escalation
    • 🐧Linux
    • πŸͺŸWindows
  • 🏍️Lateral Movement
    • 🐧Linux
    • πŸͺŸWindows
  • πŸ–οΈReporting
    • πŸ–ŠοΈReport writing
  • πŸš”AV Evasion
    • πŸ’ŠAV Detection
    • πŸ’‰Process Memory Injection
    • shield-quarteredDefender Bypass
  • πŸ“‚Active Directory
    • πŸ”Enumeration
    • axe-battleAttacking Authentication
    • key-skeletonShadow Credentials
    • mug-hotTargeted Kerberoasting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ”Enumerationchevron-right
  2. πŸ“΄Passive

Websites

In this section we will show different websites we can use to gather information without interacting with a target.


https://www.shodan.io/www.shodan.iochevron-right
Shodan
LogoDNSDumpster - Find & lookup dns records for recon & researchDNSDumpster.comchevron-right
DNS Dumpster
LogoAnalyse your HTTP response headerssecurityheaderschevron-right
Security Headers
LogoGitHub Β· Change is constant. GitHub keeps you ahead.GitHubchevron-right
GitHub
LogoSSL Server Test (Powered by Qualys SSL Labs)www.ssllabs.comchevron-right
Qualys SSL Labs
LogoOffSec’s Exploit Database Archivewww.exploit-db.comchevron-right
Exploit-DB

PreviousToolschevron-leftNextActivechevron-right

Last updated 1 year ago