/My-Obsidian-Vault

personal obsidian vault used to save all notes i take from different study fields

├── Attacking Web Applications With FFUF
│   ├── Basic Fuzzing
│   │   ├── Directory Fuzzing.md
│   │   ├── Page Fuzzing.md
│   │   └── Recursive Fuzzing.md
│   ├── Domain Fuzzing
│   │   ├── DNS Records.md
│   │   ├── Filtering Results.md
│   │   ├── Sub-domain Fuzzing.md
│   │   └── Vhost Fuzzing.md
│   ├── Ffuf Cheat Sheet.md
│   ├── Introduction
│   │   └── Web Fuzzing.md
│   └── Parameter Fuzzing
│       ├── Parameter Fuzzing - GET.md
│       ├── Parameter Fuzzing - POST.md
│       ├── Skills Assessment - Web Fuzzing.md
│       └── Value Fuzzing.md
├── Introduction to Active Directory
│   ├── Active Directory Fundamentals
│   │   ├── Active Directory Functionality.md
│   │   ├── Active Directory Objects.md
│   │   ├── Active Directory Structure.md
│   │   └── Active Directory Terminology.md
│   ├── Active Directory Protocols
│   │   ├── Kerberos, DNS, LDAP, MSRPC.md
│   │   └── NTLM Authentication.md
│   ├── All About Users
│   │   ├── Active Directory Groups.md
│   │   ├── Active Directory Rights and Privileges.md
│   │   └── User and Machine Accounts.md
│   ├── Digging in Deeper
│   │   ├── Examining Group Policy.md
│   │   └── Security in Active Directory.md
│   ├── Getting Our Hands Dirty
│   │   ├── AD Administration Guided Lab II.md
│   │   └── AD Administration Guided Lab.md
│   └── Introduction
│       ├── Active Directory Research Over the Years.md
│       └── Why Active Directory.md
├── Introduction to Networking
│   ├── Addressing
│   │   ├── IP Addresses.md
│   │   ├── IPv6 Addresses.md
│   │   ├── MAC Addresses.md
│   │   ├── Network Layer.md
│   │   └── Subnetting.md
│   ├── Connection Establishment
│   │   ├── Authentication Protocols.md
│   │   ├── Cryptography.md
│   │   ├── Key Exchange Mechanisms.md
│   │   └── TCP-UDP Connections.md
│   ├── Networking structure
│   │   ├── Network types.md
│   │   ├── Networking Topologies.md
│   │   ├── Networking overview.md
│   │   └── Proxies.md
│   ├── Networking workflow
│   │   ├── Networking Models.md
│   │   ├── The OSI Model.md
│   │   └── The TCP-IP Model.md
│   └── Protocols & Terminology
│       ├── Common Protocols.md
│       ├── Networking Key Terminology.md
│       ├── Vendor Specific Information.md
│       ├── Virtual Private Networks.md
│       └── Wireless Networks.md
├── Introduction to Web Applications
│   ├── Back End Components
│   │   ├── Back End Servers.md
│   │   ├── Databases.md
│   │   ├── Development Frameworks & APIs.md
│   │   └── Web Servers.md
│   ├── Back End Vulnerabilities
│   │   ├── Common Web Vulnerabilities.md
│   │   └── Public Vulnerabilities.md
│   ├── Front End Components
│   │   ├── Cascading Style Sheets (CSS).md
│   │   ├── HTML.md
│   │   └── JavaScript.md
│   ├── Front End Vulnerabilities
│   │   ├── Cross-Site Request Forgery (CSRF).md
│   │   ├── Cross-Site Scripting (XSS).md
│   │   ├── HTML Injection.md
│   │   └── Sensitive Data Exposure.md
│   └── Introduction
│       ├── Front End vs. Back End.md
│       ├── Introduction.md
│       └── Web Application Layout.md
├── Javascript Deobfuscation
│   ├── Deobfuscation Cheat Sheet.md
│   ├── Deobfuscation Examples
│   │   ├── Code Analysis.md
│   │   ├── Decoding.md
│   │   └── HTTP Requests.md
│   ├── Introduction
│   │   ├── Introduction.md
│   │   └── Source Code.md
│   ├── Obfuscation
│   │   ├── Advanced Obfuscation.md
│   │   ├── Basic Obfuscation.md
│   │   ├── Code Obfuscation.md
│   │   └── Deobfuscation.md
│   └── Skills Assessment
│       ├── Skills Assessment.md
│       └── Summary.md
├── Knowledge Tree.md
├── Linux Fundamentals
│   ├── Introduction
│   │   ├── Introduction to Shell.md
│   │   ├── Linux Distributions.md
│   │   └── Linux structure.md
│   ├── Linux Cheat Sheet.md
│   ├── System Management
│   │   ├── Backup and Restore.md
│   │   ├── Containerization.md
│   │   ├── File System Management.md
│   │   ├── Network Configuration.md
│   │   ├── Network Services.md
│   │   ├── Package Management.md
│   │   ├── Service and Process Management.md
│   │   ├── Task Scheduling.md
│   │   ├── User Management.md
│   │   └── Working with Web Services.md
│   ├── The Shell
│   │   ├── Getting help.md
│   │   ├── Prompt Description.md
│   │   └── System information.md
│   ├── Tips and tricks
│   │   ├── Linux security.md
│   │   └── Shortcuts.md
│   └── Workflow
│       ├── Editing files.md
│       ├── File descriptors and redirections.md
│       ├── Filter Contents.md
│       ├── Find files and directories.md
│       ├── Navigation.md
│       ├── Permission Management.md
│       ├── Regular Expressions.md
│       └── Working with Files and Directories.md
├── Penetration Testing Fundamentals
│   ├── Attacking Your First Box
│   │   ├── Nibbles - Alternate User Method - Metasploit.md
│   │   ├── Nibbles - Enumeration.md
│   │   ├── Nibbles - Initial Foothold.md
│   │   ├── Nibbles - Privilege Escalation.md
│   │   └── Nibbles - Web Footprinting.md
│   ├── Getting Started with HTB
│   │   ├── Navigating HTB.md
│   │   └── Starting Out.md
│   ├── Next Steps
│   │   ├── Knowledge Check.md
│   │   └── Next Steps.md
│   ├── Pentesting Basics
│   │   ├── Basic Tools.md
│   │   ├── Common Terms.md
│   │   ├── Privilege Escalation.md
│   │   ├── Public Exploits.md
│   │   ├── Service Scanning.md
│   │   ├── Transferring Files.md
│   │   ├── Types of Shells.md
│   │   └── Web Enumeration.md
│   ├── Pentesting Cheat Sheet.md
│   ├── Problem Solving
│   │   ├── Common Pitfalls.md
│   │   └── Getting Help.md
│   └── Setup
│       ├── Connecting Using VPN.md
│       ├── Getting Started with a Pentest Distro.md
│       ├── Infosec Overview.md
│       └── Staying Organized.md
├── Setting up
│   ├── Introduction
│   │   ├── Containers.md
│   │   ├── Introduction.md
│   │   └── Virtualization.md
│   ├── Operating Systems
│   │   ├── Linux.md
│   │   └── Windows.md
│   └── Virtual Private Server
│       ├── VPS Hardening.md
│       ├── VPS Providers.md
│       └── VPS Setup.md
├── Useful Links.md
├── Using The Metasploit Framework
│   ├── Additional Features
│   │   ├── Firewall and IDS-IPS Evasion.md
│   │   ├── Introduction to MSFVenom.md
│   │   ├── Metasploit-Framework Updates - August 2020.md
│   │   └── Writing and Importing Modules.md
│   ├── Introduction
│   │   ├── Introduction to MSFconsole.md
│   │   ├── Introduction to Metasploit.md
│   │   └── Preface.md
│   ├── MSF Components
│   │   ├── Databases.md
│   │   ├── Encoders.md
│   │   ├── Modules.md
│   │   ├── Payloads.md
│   │   ├── Plugins.md
│   │   └── Targets.md
│   ├── MSF Sessions
│   │   ├── Meterpreter.md
│   │   └── Sessions.md
│   └── MSFconsole Cheat Sheet.md
├── Vulnerability Assessment
│   ├── Nessus
│   │   ├── Advanced Settings.md
│   │   ├── Getting Started with Nessus.md
│   │   ├── Nessus Scan.md
│   │   ├── Nessus Skills Assessment.md
│   │   ├── Scanning Issues.md
│   │   ├── Vulnerability Scanning Overview.md
│   │   └── Working with Nessus Scan Output.md
│   ├── OpenVAS
│   │   ├── Exporting The Results.md
│   │   ├── Getting Started with OpenVAS.md
│   │   ├── OpenVAS Skills Assessment.md
│   │   └── OpenVas Scan.md
│   ├── Reporting
│   │   └── Reporting.md
│   ├── Security Assessments
│   │   ├── Assessment Standards.md
│   │   ├── Security Assessments.md
│   │   └── Vulnerability Assessment.md
│   └── Vulnerability Scoring and Reporting
│       ├── Common Vulnerabilities and Exposures (CVE).md
│       └── Common Vulnerability Scoring System (CVSS).md
├── Web Requests
│   ├── HTTP Fundamentals
│   │   ├── HTTP Headers.md
│   │   ├── HTTP Requests and Responses.md
│   │   ├── HyperText Transfer Protocol (HTTP).md
│   │   └── Hypertext Transfer Protocol Secure (HTTPS).md
│   └── HTTP Methods
│       ├── CRUD API.md
│       ├── GET.md
│       ├── HTTP Methods and Codes.md
│       └── POST.md
└── Windows Fundamentals
    ├── Core of the operating system
    │   ├── File System.md
    │   ├── Introduction to Windows.md
    │   ├── NTFS vs. Share Permissions.md
    │   └── Operating System Structure.md
    ├── Diving Deeper & Close Out
    │   ├── Desktop Experience vs. Server Core.md
    │   ├── Skills Assessment - Windows Fundamentals.md
    │   └── Windows Security.md
    ├── Further Windows Usage
    │   ├── Microsoft Management Console (MMC).md
    │   └── Windows Subsystem for Linux (WSL).md
    ├── Interacting with Windows
    │   ├── Interacting with the Windows Operating System.md
    │   ├── Windows Management Instrumentation (WMI).md
    │   └── Windows Sessions.md
    └── Working with services and processes
        ├── Service Permissions.md
        └── Windows Services & Processes.md


66 directories, 193 files