N4shX's Wiki
search
⌘Ctrlk
N4shX's Wiki
  • hand-waveWELCOME!
    • Introduction - PentestPal
    • Values & FAQ
    • About the Author
  • arrow-progressMETHODOLOGIES & RESOURCES
    • clipboard-listPentesting Methodology
    • up-right-from-squareExternal Recon Methodology
    • signal-streamPentesting Wifi
    • binary-lockPassword Hash Cracking / Bruteforce
    • magnifying-glassSearch Exploits
  • arrow-progressPentest phases
    • 1. Reconnaissance
    • 2. Scanning and Enumeration
    • 3. Exploitation
    • 4. Post-Exploitation
    • 5. Reporting
  • linuxLinux Hardening
    • Wichtige Linux-Befehle und Dateien für Pentesting
    • Privilege escalation
  • windowsWindows Hardening
    • Wichtige Windows-Befehle und Dateien für Pentesting
    • Privilege escalation
  • gearNETWORK SERVICES PENTESTING
    • 25 - SMTP
    • 21 - FTP
    • 22 - SSH/SFTP
    • 21 - Telnet
    • 53 - DNS
    • 80,443 - Web Methodology
    • 139, 445 - SMB
    • 143, 993, 110, 995 - IMAP, POP3
    • 1433 - MSSQL
    • 1521 - Oracle TNS
    • 5432 - PostgreSQL
    • 873 - rsync
    • 2049 - NFS Service
    • 27017 - MongoDB
    • 3306 - MySQL
    • 3389 - RDP
    • 6379 - Redis
  • globe-pointerWEB PENTESTING
    • Fundamentals of Web Pentesting
    • Reconnaissance and Discovery
    • Vulnerability Analysis and Attack Vectors
      • Local File Inclusion (LFI) und Remote File Inclusion (RFI)
      • Authentication Bypass
      • Broken Access Control (Insecure Direct Object Reference ("IDOR")
      • Bypassing Content Security Policies (CSP)
      • SQL Injection
      • Cryptographic Failures
      • Cross-Site Scripting (XSS)
      • Cloud Security
        • AWS S3 Bucket
      • XXE Attack
    • References and Cheatsheets
    • Tools for Web Application Pentesting
  • people-arrowsSocial Engineering
    • list-olMethods and Techniques
    • Tools for Social Engineering
    • Psychologische Prinzipien
  • binary-lockCRYPTO & STEGO
    • Cryptography Analysis Methods
  • microchipHARDWARE/PHYSICAL ACCESS
    • list-olMethods and Techniques
    • Physical Attacks
    • RFID/NFC Attacks
  • axePentesting tools
    • Tool-List
    • telescopeReconnaissance
    • magnifying-glassNetzwerk-Scanning & Enumeration
    • lock-keyholePassword attacks
    • virusVulnerability analysis & exploitation
    • person-from-portalPost-Exploitation Tools
    • globe-pointerWeb Application Pentesting Tools
    • wifiWireless Pentesting Tools
    • people-arrowsSocial Engineering Tools
    • microchipHardware/Physical Hacking Tools
    • book-skullForensics
  • blockFundamentals
    • input-numericNumber Systems
    • ethernetNetwork Fundamentals
    • booksGlossar
    • laptop-codeSetting Up a Pentesting Environment
  • Cheatsheet (exkl. Win)
  • Others
    • Archive
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. globe-pointerWEB PENTESTINGchevron-right
  2. Vulnerability Analysis and Attack Vectors

Cloud Security

AWS S3 Bucketchevron-right
PreviousXSS Fundamentalschevron-leftNextAWS S3 Bucketchevron-right