Alfredo Santo
Pwn.college
Initializing search
Home
Walkthroughs
Certifications
CTFs
Cheatsheets
Resources
Blog
Alfredo Santo
Home
Walkthroughs
Walkthroughs
Hackthebox
Hackthebox
Challenges
Challenges
Easy
Easy
Onlyhacks
Onlyhacks
Machines
Machines
Easy
Easy
Code
Code
Dog
Dog
Titanic
Titanic
Twomillion
Twomillion
Underpass
Underpass
Medium
Medium
Strutted
Strutted
Hard
Hard
Tryhackme
Tryhackme
Easy
Easy
Billing
Billing
Blue
Blue
Evil gpt
Evil gpt
Pickle rick
Pickle rick
Medium
Medium
Net sec challenge
Net sec challenge
Windows privesc 10
Windows privesc 10
Windows privesc 20
Windows privesc 20
Pwn college
Pwn college
Certifications
Certifications
CPTS
CPTS
Penetration testing process
Penetration testing process
Pre Engagement
Vulnerability Assessment
Post-Exploitation
Post Engagement
Getting started
Getting started
Getting Started with a Pentest Distro
Basic Tools
Service Scanning
Web Enumeration
Privilege Escalation
Public Exploits
Nibbles - Enumeration
Nibbles - Web Footprinting
Nibbles Initial Foothold
Nibbles Privilege Escalation
Knowledge Check
Network enumeration with nmap
Network enumeration with nmap
[Protected] Host Discovery
[Protected] Host and Port Scanning
[Protected] Saving the Results
[Protected] Service Enumeration
[Protected] Nmap Scripting Engine
[Protected] Firewall and IDS/IPS Evasion Easy Lab
[Protected] Firewall and IDS/IPS Evasion Medium Lab
[Protected] Firewall and IDS IPS Evasion Hard Lab
Footprinting
Footprinting
[Protected] FTP
[Protected] SMB
[Protected] NFS
[Protected] DNS
[Protected] SMTP
[Protected] IMAP POP3
[Protected] SNMP
[Protected] MySQL
[Protected] MSSQL
[Protected] Oracle TNS
[Protected] IPMI
[Protected] Footprinting Lab - Easy
[Protected] Footprinting Lab - Medium
[Protected] Footprinting Lab Hard
Information gathering web edition
Information gathering web edition
[Protected] WHOIS
[Protected] Digging DNS
[Protected] Subdomain Bruteforcing
[Protected] DNS Zone Transfer
[Protected] Virtual Hosts
[Protected] Fingerprinting
[Protected] Creepy Crawlies
[Protected] Web Archives
[Protected] Skills Assessment
Vulnerability assessment
Vulnerability assessment
[Protected] Nessus Skills Assessment
[Protected] OpenVAS Skills Assessment
File transfer
File transfer
Windows File Transfer Methods
Linux File Transfer Methods
Shell payloads
Shell payloads
[Protected] Anatomy of a Shells
[Protected] Bind Shells
[Protected] Reverse Shells
[Protected] Automating Payloads & Delivery with Metasploit
[Protected] Infiltrating Windows
[Protected] Infiltrating Unix/Linux
[Protected] Antak Webshell
[Protected] Laudanum, One Webshell to Rule Them All
[Protected] PHP Web Shells
Using metasploit framework
Using metasploit framework
Password attacks
Password attacks
[Protected] Introduction to Password Cracking
[Protected] Introduction to John The Ripper
[Protected] Network Services
[Protected] Password Mutations
[Protected] Password Reuse Default Passwords
[Protected] Attacking SAM
[Protected] Attacking LSASS
[Protected] Attacking Active Directory & NTDS.dit
[Protected] Credential Hunting in Windows
[Protected] Credential Hunting in Linux
[Protected] Passwd Shadow & Opasswd
[Protected] Pass the Hash (PtH)
[Protected] Pass the Ticket (PtT) from Windows
[Protected] Pass the Ticket (PtT) from Linux
[Protected] Protected Files
[Protected] Protected Archives
[Protected] Password Attacks Lab - Easy
[Protected] Password Attacks Lab - Medium
[Protected] Password Attacks Lab - Hard
Attacking common services
Attacking common services
Attacking FTP
Attacking SMB
Attacking SQL Databases
Attacking RDP
Attacking DNS
Attacking Email Services
Attacking Common Services - Easy
Attacking Common Services - Medium
Attacking Common Services - Hard
Pivoting tunneling and port forwarding
Pivoting tunneling and port forwarding
[Protected] The Networking Behind Pivoting
[Protected] Dynamic Port Forwarding with SSH and SOCKS Tunneling
[Protected] Remote/Reverse Port Forwarding with SSH
[Protected] Meterpreter Tunneling & Port Forwarding
[Protected] Socat Redirection with a Reverse Shell
[Protected] Socat Redirection with a Bind Shell
[Protected] Web Server Pivoting with Rpivot
[Protected] Port Forwarding with Windows Netsh
[Protected] DNS Tunneling with Dnscat2
[Protected] SOCKS5 Tunneling with Chisel
[Protected] RDP and SOCKS Tunneling with SocksOverRDP
[Protected] Skills Assessment
Ad enumeration & attacks
Ad enumeration & attacks
[Protected] External Recon and Enumeration Principles
[Protected] Initial Enumeration of the Domain
[Protected] LLMNR/NBT-NS Poisoning - from Linux
[Protected] LLMNR/NBT-NS Poisoning - from Windows
[Protected] Enumerating & Retrieving Password Policies
[Protected] Password Spraying - Making a Target User List
[Protected] Internal Password Spraying - from Linux
eJPT
eJPT
Assessment methodologies
Assessment methodologies
Information gathering
Information gathering
Information Gathering CTF 1
Footprinting scanning
Footprinting scanning
Footprinting and Scanning CTF 1
Auditing Fundamentals
Enumeration
Enumeration
Enumeration CTF 1
Vulnerability assessment
Vulnerability assessment
Vulnerability Assessment CTF 1
Host & network penetration testing
Host & network penetration testing
System host based attacks
System host based attacks
Cron Jobs Gone Wild II
System-Host Based Attacks CTF 1
System-Host Based Attacks CTF 2
Network based attacks
Network based attacks
Network-Based Attacks CTF 1
The metasploit framework
The metasploit framework
The Metasploit Framework CTF 1
The Metasploit Framework CTF 2
Penetration testing exploitation
Penetration testing exploitation
Penetration Testing Exploitation CTF 1
Penetration Testing Exploitation CTF 2
Penetration Testing Exploitation CTF 3
Post exploitation
Post exploitation
Post-Exploitation CTF 1
Post-Exploitation CTF 2
Web application penetration testing
Web application penetration testing
Introduction to the web http protocol
Introduction to the web http protocol
Web Application Penetration Testing CTF 1
PT1
PT1
CTFs
CTFs
CSAW CTF 2011
CSAW CTF 2011
Crypto
Crypto
Crypto1
Crypto1
Crypto2
Crypto2
Crypto3
Crypto3
Crypto4
Crypto4
Crypto5
Crypto5
Crypto6
Crypto6
Crypto7
Crypto7
Crypto8
Crypto8
Crypto9
Crypto9
Crypto10
Crypto10
Web
Web
Web1
Web1
CTF Try Out
CTF Try Out
Forensiscs
Forensiscs
An unusual sighting
An unusual sighting
Web
Web
Flag command
Flag command
Jailbreak
Jailbreak
Timekorp
Timekorp
Guild
Guild
Cheatsheets
Cheatsheets
Password Attacks Cheatsheet
Pivoting, Tunneling & Port Forwarding
General
Nmap Enumeration
Web Discovery
FTP
SMB
NFS
DNS
FTP
SNMP Enumeration
Common Wordlists
Resources
Resources
Active Directory Tools
Hacking Resources
Blog
Blog
Archive
Archive
2025
Pwn.college
Back to top