HackTheBox CheckList
1. Enumeration
TCP
UDP
Web Services
2. Exploitation
Service Exploited:
Vulnerability Type:
Exploit POC:
Description:
Discovery of Vulnerability
Exploit Code Used
Proof\Local.txt File
3. Post-Exploitation
Script Results
Host Information
File System
Running Processes
Installed Applications
Users & Groups
Network
Scheduled Jobs
Privilege Escalation
Goodies
Hashes
Passwords
Proof/Flags/Other
Software Version
Software Versions
Potential Exploits
Methodology
Network Scanning
Individual Host Scanning
Service Scanning
Exploitation
Post Exploitation
Log Book
Last updated