PNPT
Ctrlk
Linkedin
  • 🩻README
  • OSINT Fundamentals
    • OSINT Explained
    • Sock puppets
    • Search Engine Operators
    • Images
    • Emails
    • Passwords
    • Usernames and Accounts
    • People
    • Social Media
    • Websites
    • Businesses
    • Wireless
    • Terminal Based Tools
    • Website Terminal Based Tools
    • OSINT Report
  • External Pentest Playbook
    • Before Starting
    • Methodology
    • Attacking Login Portals
    • Escalating Access
    • Common Pentest Findings
      • Insufficient Authentication Controls
      • Weak Password Policy
      • Insufficient Patching
      • Default Credentials
      • Insufficient Encryption
      • Information Disclosure
      • Username Enumeration
      • Default Web Pages
      • Open Mail Relays
      • IKE Agressive mode
      • Unexpected Perimeter Services
      • Insufficient Traffic Blocking
      • Undetected Malicious Activity
      • Historical Account Compromises
    • Concluding the External Pentest
    • Wreath - Try Hack Me
  • Post Exploitation
    • C2
    • AV Evasion
    • Exfiltration
    • Pivoting
    • File Transfers
    • Persistence
    • Cleanup
  • Active Directory
    • Initial Attack Strategy
    • Post-Compromise Enumeration
    • Post-Compromise Attacks
    • Post-Domain Compromise
    • Critical Active Directory CVE's
  • Windows Privilege Escalation
    • Initial Enumeration Manual
    • Initial Enumeration Automated
    • Kernel Exploits
    • Stored Passwords and Port Forwarding
    • Windows Subsystem for Linux
    • Impersonation and Potato Attacks
    • RunAs
    • Registy
    • Executable Files
    • Startup Applications
    • DLL Hijacking
    • Service Permissions
    • getsystem
    • CVE-2019-1388
  • Report Writing
    • Findings Report
    • Common Legal Documents
  • Linux Privilege Escalation
    • Initial Enumeration
    • Automated tools
    • Kernel Exploits
    • Passwords & File Permissions
    • Sudo
    • SUID
    • Capabilities
    • Cron Jobs
    • NFS Root Sqaushing
    • Docker
    • LXD/LXC Group
Powered by GitBook
On this page
  1. External Pentest Playbook

Common Pentest Findings

Overview

These findings are ranked from most Critical to Least. The list is not all inclusive and is more just a list of findings commonly seen on external pentests.

  1. Insufficient Authentication Controls

  2. Weak Password Policy

  3. Insufficient Patching

  4. Default Credentials

  5. Insufficient Encryption

  6. Information Disclosure

  7. Username Enumeration

  8. Default Web Pages

  9. Open Mail Relays

  10. IKE Aggressive Mode

  11. Unexpected Perimeter Services

  12. Insufficient Traffic Blocking

  13. Undetected Malicious Activity

  14. Historical Account Compromises

PreviousEscalating AccessNextInsufficient Authentication Controls

Last updated 1 year ago

Was this helpful?

Was this helpful?