# Network Pentest

- [Courses](https://wiki.zacheller.dev/pentest/courses.md)
- [TCM - Zero to Hero](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting.md): Beginner Network Pentesting
- [Week 1: Setup](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-1.md): Introduction, Notekeeping, and Introductory Linux
- [ipsweep.sh](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-1/ipsweep.sh.md)
- [Week 2: Python 101](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-2.md): Introductory Python
- [python101.py](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-2/untitled-1.md)
- [bof.py](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-2/bof.py.md)
- [Week 3: Python 102](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-3-python-102.md): Building a Terrible Port Scanner
- [python102.py](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-3-python-102/python102.py.md)
- [scanner.py](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-3-python-102/scanner.py.md)
- [Week 4: Passive OSINT](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-4-passive-osint.md)
- [Week 5: Scanning Tools & Tactics](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-1.md)
- [nmap](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-1/nmap.md)
- [Nessus](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-1/nessus.md)
- [msfconsole](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-1/msfconsole.md)
- [Week 6: Enumeration](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-6-enumeration.md)
- [Week 7: Exploitation, Shells, and Some Credential Stuffing](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-2.md)
- [Week 8: LLMNR/NBT-NS Poisoning](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-3.md): Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
- [Week 9: NTLM](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-9.md): NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
- [Week 10: MS17-010, GPP/cPasswords, and Kerberoasting](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/untitled-4.md): AD Exploitation Part 3
- [Week 11: File Transfers, Pivoting, Reporting](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/week-11-file-transfers-pivoting-reporting.md): File Transfers, Pivoting, Report Writing, and Career Advice
- [Commands](https://wiki.zacheller.dev/pentest/courses/beginner-network-pentesting/commands.md)
- [Penetration Testing Student (PTS)](https://wiki.zacheller.dev/pentest/courses/penetration-testing-student-pts.md)
- [OSCP Study](https://wiki.zacheller.dev/pentest/courses/oscp-study.md): Here are the resources my friend Chris found most useful for the OSCP exam
- [Recon](https://wiki.zacheller.dev/pentest/recon-osint.md)
- [OSINT](https://wiki.zacheller.dev/pentest/recon-osint/osint.md)
- [Enumeration](https://wiki.zacheller.dev/pentest/enumeration.md)
- [Samba Shares](https://wiki.zacheller.dev/pentest/enumeration/samba-shares.md)
- [ProFtpd](https://wiki.zacheller.dev/pentest/enumeration/proftpd.md): ProFtpd is a free and open-source FTP server, compatible with Unix and Windows systems. Its also been vulnerable in the past software versions.
- [Gaining Access](https://wiki.zacheller.dev/pentest/gaining-access.md)
- [Reverse Shells](https://wiki.zacheller.dev/pentest/gaining-access/reverse-shells.md)
- [Privilege Escalation](https://wiki.zacheller.dev/pentest/privilege-escalation.md)
- [Meterpreter](https://wiki.zacheller.dev/pentest/privilege-escalation/meterpreter.md)
- [Spawning a TTY Shell](https://wiki.zacheller.dev/pentest/privilege-escalation/spawning-a-tty-shell.md)
- [Reverse Shell Cheat Sheet](https://wiki.zacheller.dev/pentest/privilege-escalation/untitled-2.md)
- [Cracking Hashes](https://wiki.zacheller.dev/pentest/privilege-escalation/untitled-1.md)
- [Restricted Linux Shell Escape](https://wiki.zacheller.dev/pentest/privilege-escalation/restricted-linux-shell-escape.md)
- [Linux Privilege Escalation](https://wiki.zacheller.dev/pentest/privilege-escalation/linux-privilege-escalation.md)
- [lxd](https://wiki.zacheller.dev/pentest/privilege-escalation/linux-privilege-escalation/lxd.md)
- [sytemctl](https://wiki.zacheller.dev/pentest/privilege-escalation/linux-privilege-escalation/sytemctl.md)
- [Windows Privilege Escalation](https://wiki.zacheller.dev/pentest/privilege-escalation/windows-privilege-escalation.md)
- [Active Directory](https://wiki.zacheller.dev/pentest/privilege-escalation/windows-privilege-escalation/active-directory.md)
- [What is AD?](https://wiki.zacheller.dev/pentest/privilege-escalation/windows-privilege-escalation/active-directory/what-is-ad-links.md)
- [User Enumeration](https://wiki.zacheller.dev/pentest/privilege-escalation/windows-privilege-escalation/user-enumeration.md)
- [Post Exploitation](https://wiki.zacheller.dev/pentest/post-exploitation.md)
- [Cleanup](https://wiki.zacheller.dev/pentest/post-exploitation/cleanup.md)
- [Maintaining Access](https://wiki.zacheller.dev/pentest/post-exploitation/maintaining-access.md)
- [Pivoting](https://wiki.zacheller.dev/pentest/post-exploitation/pivoting.md)
- [File Transfers](https://wiki.zacheller.dev/pentest/post-exploitation/file-transfers.md)
- [Covering Tracks](https://wiki.zacheller.dev/pentest/post-exploitation/5.-covering-tracks.md)
- [Vulnerabilities Checklist](https://wiki.zacheller.dev/pentest/untitled.md)
- [Report Writing](https://wiki.zacheller.dev/pentest/report-writing.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://wiki.zacheller.dev/pentest.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
