Useful cheat sheets for pentesters, attack and defense methods in Active Directory, Linux, Windows and cloud environments

10 February 2025 3 minutes Author: Cyber Witcher

In the world of cybersecurity, every pentester should have reliable tools and proven attack and defense techniques at hand. We have prepared a detailed selection of useful penetration testing cheat sheets that cover the main areas of pentesting: Active Directory, Linux, Windows, AWS and Azure cloud platforms, network hacking, privilege escalation, and persistence.

Useful cheat sheets

Cloud – AWS Pentest.md

AWS Cloud Infrastructure Penetration Testing Guide. Describes specific techniques, settings, and vulnerability detection in cloud service configurations.

CLICK HERE

Network Discovery.md

Network Resource Discovery Guide. Describes tools and techniques for scanning a network to identify active hosts and services.

CLICK HERE

Linux – Persistence.md

Describes methods for ensuring persistence on Linux systems after compromise. Includes recommendations for configuring autoruns and using cron jobs.

CLICK HERE

Metasploit – Cheatsheet.md

Metasploit Framework Reference Guide. Contains commands, examples of module usage, and recommendations for effective penetration testing.

CLICK HERE

Reverse Shell Cheatsheet.md

A guide to setting up and using reverse shells, which allow remote access to compromised systems using various techniques and protocols.

CLICK HERE

Windows – Mimikatz.md

A guide to using Mimikatz, a powerful tool for extracting credentials from Windows memory. Describes basic commands and usage scenarios.

CLICK HERE

Cobalt Strike – Cheatsheet.md

Cobalt Strike Reference Guide. Contains a list of commands, scripts, and tips for using this tool for attack modeling and threat simulation.

CLICK HERE

Methodology and enumeration.md

A general pentesting methodology that includes the stages of enumerating, scanning, and analyzing the network infrastructure to identify potential attack vectors.

CLICK HERE

Linux – Privilege Escalation.md

The document contains privilege escalation techniques on Linux systems. It describes how to identify vulnerabilities and exploit them to gain root access.

CLICK HERE

Cloud – Azure Pentest.md

Dedicated to security testing of Microsoft Azure services. It covers methods for detecting vulnerabilities, analyzing security settings, and exploiting vulnerabilities in the cloud environment.

CLICK HERE

Active Directory Attack.md

The document contains techniques for attacking Active Directory, including exploiting vulnerabilities, elevation of privilege techniques, and bypassing defense mechanisms in the AD environment.

CLICK HERE

Subdomains Enumeration.md

A document describing techniques for searching and enumerating subdomains. Helps expand the attack surface by identifying additional targets within the domain zone.

CLICK HERE

Windows – Post Exploitation Koadic.md

Describes how to use the Koadic tool to conduct post-exploitation attacks. Includes recommendations for gaining additional privileges and gathering information after the initial compromise.

CLICK HERE

Network Pivoting Techniques.md

The document describes methods for switching (pivoting) between network segments after one of its parts is compromised. Helps expand access to internal infrastructure.

CLICK HERE

Windows – Using credentials.md

Instructions for using stolen credentials to expand network access. Describes methods for further movement in the system using recovered passwords and tokens.

CLICK HERE

Windows – Download and Execute.md

Describes techniques for downloading and executing files on Windows systems. Discusses ways to bypass system restrictions and use scripts to gain control over the system.

CLICK HERE

Windows – Privilege Escalation.md

This document describes privilege escalation techniques in Windows. It discusses ways to bypass security mechanisms to gain administrative access.

CLICK HERE

Windows – Persistence.md

This document provides methods for ensuring persistence in Windows systems. It discusses various techniques, including the use of registry keys, task schedulers, and other mechanisms to preserve access.

CLICK HERE

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.