Vulnerable Machine Checklist
Initial Reconnaissance
Perform a full port scan using Nmap:
Perform a no-ping scan (useful if ICMP is blocked):
Enumeration
Vulnerability Scanning
Use vulnerability scanners like Nikto, OpenVAS, or Nessus to identify potential vulnerabilities
Manually check for known exploits of identified services
Exploitation
Attempt to exploit known vulnerabilities:
Use Metasploit Framework or manual exploitation methods
Look for misconfigurations or weak points (like weak passwords)
Post-Exploitation
Check for privilege escalation opportunities
Windows
Document any loot (passwords, keys, confidential data)
CrackMapExec
Impacket
When successful, enumerate the system for the flag
Last updated