Even though, a penetration test is a creative process most people maintain private checklists to ensure that they will not forget to test networks, systems and applications against various scenarios and maintain the overall quality of the assessment.
The aim of the project is to create detailed checklists that can be used by penetration testers and red teamers during their assessments. Every checklist will be linked with a detailed blog post on https://pentestlab.blog which will describe the technique and how to perform the required task. Information will also be included in the Wiki page on Github.
Code | Techniques | Number |
---|---|---|
IA | Initial Access | 1 |
WPE | Windows Privilege Escalation | 16 |
PE | Persistence | 40 |
CA | Credential Access | 9 |
LM | Lateral Movement | 8 |
DE | Domain Escalation | 8 |
DP | Domain Persistence | 7 |
If you noticed than a checklist is not complete please perform a pull request or contact me on Twitter @netbiosX
This is a live repository which means that checklists will be updated as soon as articles are published.