EJPTV2 Cheat Sheet by - Yash Mehta
Ctrlk
  • Information Gathering & Enumeration
  • Vulnerabilities in services
  • Exploitation
  • Post Exploitation
    • Privilege Escalation
    • Hash Dumping
    • Pivoting
    • Transferring Files
    • Meterpreter
    • Persistence
    • Clearing Tracks
    • Local Enumeration
      • Windows Local Enumeration
      • Linux Local Enumeration
  • Web App Pentesting
Powered by GitBook
On this page
  1. Post Exploitation

Local Enumeration

Windows Local EnumerationLinux Local Enumeration
PreviousLinux clearing tracksNextWindows Local Enumeration

Last updated 1 year ago