My notes notes about Cybersecurity.
Websites to learn, practice, find news, look for news, along with CVE lookup, credentials leak lookup, or stuff like that.
Notes/links to find a VM (Windows, Kali, CTF...) and install it.
Stuff that couldn't be put somewhere else.
1. Investigation 🔎
Step 1: Dig information from afar.
Find metadata from a PDF, an image... Learn about steganography, tricks...
2. Discovery 🗺️
Step 2: approach your targets to learn more about them.
The Network Mapper. Find open ports, running services, and common vulnerabilities.
Automated though noisy tool to find open ports, running services, many vulnerabilities...
Discovery & Exploitation
Notes about discovery/misconfigurations of services (SSH, FTP, SMTP...).
Brute force servicesread
Use hydra to brute force SSH, FTP...
How to exploit printers.
3. Exploitation 💥
Step 3: exploit a vulnerability to get something from your target.
Learn about reverse, bind, and web shells. Learn about tools/techniques to stabilize them.
The Metasploit framework, a well-known penetration testing tool.
Utility to generate a bind/reverse shells, along with notes about meterpreter reverse shells and multi handler.
Exploitation: Web - part 1 🕸️
Notes on webservers.
Steps and tools to exploit webservers.
Learn how HTTP headers could be exploited.
Fuzzing / Fuzzread
Something that can be used for many things (forced browsing, brute force...).
Find routes, hidden folders/files, configuration-related files...
Expand your attack scope by discovering new domains.
Find and exploit frameworks such as WordPress.
XML External Entityread
XML External Entity (XEE)
Exploitation: Web - part 2 🕸️
Knowledge related to forms.
Brute force Formsread
Examples with ffuf, wfuzz, hydra...
File inclusion and Path Traversal
Server-Side Request Forgery
A flaw may lead to Remote Command Execution (RCE).
A flaw may lead to Remote Code Execution (RCE).
Suite of tools for web pentesting.
Exploitation: Network 🌐
Exploitation: Databases 🖥️
Notes about databases.
Learn about SQLi (SQL injections).
Tool to automate SQLi exploitation.
4. Privilege escalation 🔓
Methodology used from a regular user to get an administrative account.
Linux Priv. Esc.read
Key escalation vectors on Linux.
Windows Priv. Esc.read
Key escalation vectors on Windows.
5. Post-exploitation 🧹
🛡️️ Defense ⚔️️
Tools for IP/malware lookup...
Notes about forensics, i.e. investigating cyber crimes.