# General methodology

## General OSCP/CTF Tips

{% hint style="success" %}
Restart the box - wait 2+ minutes until it comes back and all services have started
{% endhint %}

![](/files/-LvQ7wVeHoxcG_wUjfG5)

\
<https://coggle.it/diagram/XepDvoXedGCjPc1Y/t/enumeration-mindmap>

![ ​https://www.xmind.net/m/5dypm8/#](/files/-MjYOmiabAOoPJ9XtNAI)

<https://www.xmind.net/m/5dypm8/#>

### For every open port TCP/UDP

```
http://packetlife.net/media/library/23/common_ports.pdf
```

* Find service and version
* Find known service bugs
* Find configuration issues
* Run nmap port scan / banner grabbing

### Google

* Every error message
* Every URL path
* Every parameter to find versions/apps/bugs
* Every version exploit db
* Every version vulnerability

### If app has auth

* User enumeration
* Password bruteforce
* Default credentials google search

#### If everything fails try:

```
nmap --script exploit -Pn $ip
```

## Individual Host Scanning

### Service Scanning

### WebApp

```
https://owasp.org/www-project-web-security-testing-guide/v42/
```

* Nikto
* dirb
* dirbuster
* wpscan
* dotdotpwn/LFI suite
* view source
* davtest/cadeavar
* droopscan
* joomscan
* LFI\RFI test
* Wapalyzer

### Linux\Windows

* snmpwalk -c public -v1 $ip 1
* smbclient -L //$ip
* smbmap -H $ip
* rpcinfo
* Enum4linux

#### Anything Else

* nmap scripts
* hydra
* MSF Aux Modules
* Download software....uh'oh you're at this stage

## Exploitation

* Gather version numbers
* Searchsploit
* Default Creds
* Creds previously gathered
* Download the software

## Stuck?

#### Things to consider

1. Have you confirmed the service on the port manually and googled all the things (the SSH string, the banner text, the source)?
2. Is there a service that will allow you to enumerate something useful (i.e. usernames) but maybe doesn't make that obvious (e.g. RID brute-force through SMB with crackmapexec or lookupsid.py)?
3. Have you used the best wordlist possible for your tasks (is there a better/bigger directory list? Is there a SecLists cred list for this service?)
4. Have you fuzzed the directories you have found for a) more directories, or b) common filetypes -x php,pl,sh,etc
5. Have you tried some manual testing (MySQL, wireshark inspections)
6. Have you collected all the hashes and cracked them?
7. Have you tried ALL COMBINATIONS of the username/passwords and not just the pairs given? Have you tried them across all services/apps?
8. Do the version numbers tell you anything about the host?
9. Have you tried bruteforce (cewl, patator)?
10. Can you think of a way to find more information: More credentials, more URLs, more files, more ports, more access?
11. Do you need to relax some of the terms used for searching? Instead of v2.8 maybe we check for anything under 3.
12. Do you need a break?

## Capture info

* Screenshot of IPConfig/WhoamI
* Copy proof.txt
* Dump hashes
* Dump SSH Keys
* Delete files
* Reset Machine

## Donate

{% embed url="<https://www.buymeacoffee.com/offsecnewbie>" %}

### Thank you!


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://guide.offsecnewbie.com/general-methodology.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
