🎯 Besa Standard Library
Welcome to the Besa Standard Library. This site is a curated collection of high-impact penetration testing commands and techniques, refactored from raw notes into a standardized WADComs-compliant format.
🚀 The Pentest Lifecycle
The following sections organize our documentation according to the standard phases of a penetration testing engagement.
1. 🔍 Reconnaissance & OSINT
The initial phase of gathering intelligence on the target’s external attack surface.
- Domain Enumeration: Mapping subdomains and infrastructure.
2. 📡 Scanning & Enumeration
Identifying open ports, services, and hidden web content to find potential entry points.
- Network Scanning (Nmap): Port discovery and service fingerprinting.
- Web Fuzzing & Directory Busting: Uncovering hidden web paths and files.
3. ⚔️ Initial Access & Exploitation
Leveraging identified vulnerabilities to gain a foothold in the target network.
- Responder & Poisoning: Initial access via LLMNR/NBT-NS poisoning.
- Web Application Exploitation: XSS, Command Injection, and File Uploads.
- SQL Injection (SQLMap): Automated database exploitation.
- Metasploit Framework: Multi-purpose exploitation and shell handling.
4. 🏰 Active Directory & Lateral Movement
Navigating the internal network, escalating privileges, and compromising the domain.
- BloodHound: Mapping AD relationship attack paths.
- NetExec (nxc): Multi-protocol enumeration and lateral movement.
- Impacket Tools: Core AD attacks (Kerberoasting, Relaying, Dumping).
- Credential Looting: Harvesting secrets from memory and the registry.
5. ⬆️ Privilege Escalation
Escalating from a low-privileged user to administrative or root access.
- Linux Privilege Escalation: Manual checks for root access.
- Windows Privilege Escalation: Manual checks for SYSTEM access.
6. 🛠️ Post-Exploitation & Persistence
Maintaining access and moving files between the attacker and target systems.
- Windows File Transfer: Native tools for file movement.
- Linux File Transfer: Command-line data transfer.
- Pivoting & Tunneling: Routing traffic through compromised hosts.
🛠️ Usage Note
All commands in this library use the {{variable}} syntax (e.g., {{target_ip}}). When using these in the field, ensure you replace the placeholders with your actual target data.