mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-05 20:40:30 -08:00
1.0 KiB
1.0 KiB
Red Teaming
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
Tips Reverse Shell
- Check the operating system target
- Check the network or internet access on the target (internet access opened)
- Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
- Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
- Check the installed software on the target
- Check the compiler on the target
- If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
- Change the port listener to bigger
- If there is a restrictions you should to bypass
- If you have successfully connected with target, swtich to powershell if the Windows, if Linux switch to fully tty shell