CND
Ctrlk
  • CND
    • WHOAMI
    • PROJECTS
    • SELF DEVELOPMENT
  • PLAYBOOK
    • DCO
    • OCO
      • 01.PRE-ENGAGEMENT
      • 02.ENGAGEMENT
        • 01.IN
          • 01.PRE-ACCESS
          • 02.INITIAL ACCESS
            • INFORMATION GATHERING
            • WEAPONIZATION
            • DELIVERY
            • EXPLOITATION
              • TYPE
                • INJECTIONS
                • FILE UPLOADS
                • BRUTE FORCE
                • AUTHENTICATION BYPASS
                • WI-FI
                • IDOR
                • FILE INCLUSION
                • OPEN REDIRECT
                • RCE MS SQL
              • CVE
            • DEFENSE EVASION
          • 03.FOOTHOLD
        • 02.THROUGH
        • 03.OUT
      • 03.POST-ENGAGEMENT
    • DEV
    • SRE
  • ENGINEERING
    • INSTALLATION PROCEDURES
    • CONFIGURATION PROCEDURES
  • SYSTEM ADMINISTRATION
    • LINUX
    • WINDOWS
  • TOOLING
    • OCO
    • DCO
    • DEV
    • SRE
    • ENG
Powered by GitBook
On this page
  1. PLAYBOOK
  2. OCO
  3. 02.ENGAGEMENT
  4. 01.IN
  5. 02.INITIAL ACCESS
  6. EXPLOITATION

TYPE

LogoNVD - CVSS v3 Calculatornvd.nist.gov
LogoNVD - Vulnerability Metricsnvd.nist.gov

ATTACK PRIORITIZATION

COLUMN SCORING WEIGHTS (EXAMPLE)

PreviousEXPLOITATIONNextINJECTIONS

Last updated 7 months ago

  • ATTACK PRIORITIZATION
  • COLUMN SCORING WEIGHTS (EXAMPLE)