Dont use any exploit which is related to xss/xsrf and so on focus on vulnerability which i mentioned up
Try finding github exploits as those are better sometimes
Don't trust versions everytime
Exploiting
validate first
use right port to get LAN shell
follow earlier topic checks and validation
Wordpress
WPscan
read manual
Other
Custom exploits takes place here you might have to find vulnerability on your own from the list above
X-Forwarded-For to accesing 403 page
Exploitation
Modifications
Automated Exploits
Path Sometimes Changed
using Alternative command (SHELLCODE)
Making Dev-Exploits to final
Solving errors
Sometime Exploits Contains proxies configurations
Instruction Based Exploits
Find Automated one
read and understand complete
use logics as most of the time instruction based exploits requires to fully understand concepts
Needs less modifications but it requires like. changing path or maybe finding path
Finding Alternatives
Search on google with CVE number and find blogs, exploits from github, papers etc.
searchsploit will help for quick list all thoses
Exploiting With right way
try all exploits if no version information disclosed as sometimes its obfuscated
Focus on critical vulnerabilities more
BufferOverflow
Practice more on Vanilla B0f AKA stack based b0f
Privilege Escalation
Windows
Manual Approaches
1) Check low privilege Shell permission (whoami /priv) and try exploiting vuln X
2) Check Software Installation Directory And find suspecious programs that are installed
3) Check for Weak permissions in services and its binpath
4) Check for Unquoted Service Path Vulnerability
5) Check For Service Registry permissions
6) Check Scheduled Tasks
Read Names carefully
Automated (best for beginners)
PowerUp
WinPEAS
Windows exploit suggester.
Fails to Check Vulnerable Softwares
its like using sword for sewing ......
sometimes creator forgot to use latest OS and this can be a luck time for you and you might find something.
Unix
Manual Approaches
Check For Sudoers Misconfigurations
Check For SUID permissions
Check Services Running on root
Check Internal Ports
Check ports blocked by firewall
Check Kernal Version and exploits
keep eyes on 127.0.0.1
compare with nmap result you have
Automated (best for beginners)
LSE (best)
linPEAS
lin Enum
Its allowed for enumeration but not for exploitation and in recent changes of linpeas it has implemented exploitation too which is not allowed. so simple find vuln and exploit that manually (not just by execution linpeas).
linkedin.com/in/rikunj/
Telegram: https://t.me/R0B077
Changelogs.
1) added ref links on each topics
2) minor changes
3) added couple more vuln and enum