mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-05 20:40:30 -08:00
Red Teaming
Welcome to path red teaming or pentesting for OSINT, on this path there are script and about tips about for enumeration, OSINT and other tips
Tips Reverse Shell
- Check the operating system target
- Check the network or internet access on the target (internet access opened)
- Cehck the vuln, you can check it by run the command like sleep, delay or trying to wget on your local machine
- Check is it a sandbox like in a container? Or directly to the operating system. If it's a container then you have to bypass
- Check the installed software on the target
- Check the compiler on the target
- If AV is detected then you can encode into base64, url encode or try to enumerate what caused the payload to be detected such as checking functions, commands and others.
- Change the port listener to bigger
- If there is a restrictions you should to bypass
- If you have successfully connected with target, swtich to powershell if the Windows, if Linux switch to fully tty shell