Welcome to the Git-Repo of bitvijays.github.io
Currently, there are two series published:
This series cover all the phases of Infrastructure Pentest as described in Pentest-Standard.org
- Intelligence Gathering : This post would list the technical steps which might be important while doing the information gathering of an organization and we only know the company name or it’s domain name such as example.com
- Vulnerability Analysis : This post would cover different options available to explore and exploit different services running on different ports by utilizing metasploit-fu and nmap or other tools.
- Exploitation : This post would provide a overview of different methods of enumeration once we have access to credentials of a domain user of windows domain and multiple ways to execute remote commands on the remote machine once we have administrative credentials.
- Post Exploitation : In this post, we will explore multiple methods of gathering credentials after getting a administrative remote shell. We would also have explore multiple ways to have a High-Impact post exploitation which leaves an impact to the higher mangagement of the organization.
- Reporting : This post would provide different open-source ways to automate report writing after the Pentest.
This series covers the essentials required to be in the field of Cyber-Security.
- Overview of CyberSecurity in an Enterprise : This blog is about the cybersecurity in an Enterprise? We would start with a simple concept of two people ( Alice and Bob ) starting a new company and building it to Micro ( < 10 employees ), Small ( < 50 employees ), Medium-sized ( < 250 employees ), larger with security breachs, vulnerablitiy assessments happening. We would mention a story, what all devices are required with what security etc.
- Linux Basics : This post lists essential commands and concepts which would be helpful to a Linux user. We would cover tools required for programming ( Vi, git ), system administration ( Bash configuration files, Updating Debian Linux System, Adding/Deleting/Modifying Users/Groups, Changing Group/Owner/Permission, Mounting/Unmounting, Linux Directories, Runlevels and Kernel Configurations ).
Interested in contribution? Please submit Pull request!