Table of contents π The Red Book 𦳠Stages of Ethical Hacking 1οΈβ£ Information Gathering Active Information Gathering DNS Zone Transfers NMAP netdiscover sqlMap Nikto Shodan RustScan Amass fping Passive Information Gathering Website Recon & Footprinting Whois Enumeration Netcraft β DNS Identify if site is protected by firewall or proxy - wafw00f Subdomain Enumeration - Sublist3r β theHarvester (borked) Email gathering Leaked Password Databases Certificates 2οΈβ£ Enumeration SMB Windows discover & Mount NMAP Scripts SMBMap Samba with Linux Dictionary Attack FTP SSH HTTP Subdomain IIS Apache SQL 3οΈβ£ Vulnerability Assessment Nessus πΎ System/Host Based Attacks πͺ Windows Frequently exploited Windows Services π§ Linux π₯½ Dorks Google Cheatsheet Examples Extra π£ Phishing Gophish evilgophish King Phisher EvilURL π OSINT Temporary links πΎ Data exfiltration Temporary links π OWASP Top10 π Cheat Sheet Curl