├── Attacking Web Applications With FFUF │ ├── Basic Fuzzing │ │ ├── Directory Fuzzing.md │ │ ├── Page Fuzzing.md │ │ └── Recursive Fuzzing.md │ ├── Domain Fuzzing │ │ ├── DNS Records.md │ │ ├── Filtering Results.md │ │ ├── Sub-domain Fuzzing.md │ │ └── Vhost Fuzzing.md │ ├── Ffuf Cheat Sheet.md │ ├── Introduction │ │ └── Web Fuzzing.md │ └── Parameter Fuzzing │ ├── Parameter Fuzzing - GET.md │ ├── Parameter Fuzzing - POST.md │ ├── Skills Assessment - Web Fuzzing.md │ └── Value Fuzzing.md ├── Introduction to Active Directory │ ├── Active Directory Fundamentals │ │ ├── Active Directory Functionality.md │ │ ├── Active Directory Objects.md │ │ ├── Active Directory Structure.md │ │ └── Active Directory Terminology.md │ ├── Active Directory Protocols │ │ ├── Kerberos, DNS, LDAP, MSRPC.md │ │ └── NTLM Authentication.md │ ├── All About Users │ │ ├── Active Directory Groups.md │ │ ├── Active Directory Rights and Privileges.md │ │ └── User and Machine Accounts.md │ ├── Digging in Deeper │ │ ├── Examining Group Policy.md │ │ └── Security in Active Directory.md │ ├── Getting Our Hands Dirty │ │ ├── AD Administration Guided Lab II.md │ │ └── AD Administration Guided Lab.md │ └── Introduction │ ├── Active Directory Research Over the Years.md │ └── Why Active Directory.md ├── Introduction to Networking │ ├── Addressing │ │ ├── IP Addresses.md │ │ ├── IPv6 Addresses.md │ │ ├── MAC Addresses.md │ │ ├── Network Layer.md │ │ └── Subnetting.md │ ├── Connection Establishment │ │ ├── Authentication Protocols.md │ │ ├── Cryptography.md │ │ ├── Key Exchange Mechanisms.md │ │ └── TCP-UDP Connections.md │ ├── Networking structure │ │ ├── Network types.md │ │ ├── Networking Topologies.md │ │ ├── Networking overview.md │ │ └── Proxies.md │ ├── Networking workflow │ │ ├── Networking Models.md │ │ ├── The OSI Model.md │ │ └── The TCP-IP Model.md │ └── Protocols & Terminology │ ├── Common Protocols.md │ ├── Networking Key Terminology.md │ ├── Vendor Specific Information.md │ ├── Virtual Private Networks.md │ └── Wireless Networks.md ├── Introduction to Web Applications │ ├── Back End Components │ │ ├── Back End Servers.md │ │ ├── Databases.md │ │ ├── Development Frameworks & APIs.md │ │ └── Web Servers.md │ ├── Back End Vulnerabilities │ │ ├── Common Web Vulnerabilities.md │ │ └── Public Vulnerabilities.md │ ├── Front End Components │ │ ├── Cascading Style Sheets (CSS).md │ │ ├── HTML.md │ │ └── JavaScript.md │ ├── Front End Vulnerabilities │ │ ├── Cross-Site Request Forgery (CSRF).md │ │ ├── Cross-Site Scripting (XSS).md │ │ ├── HTML Injection.md │ │ └── Sensitive Data Exposure.md │ └── Introduction │ ├── Front End vs. Back End.md │ ├── Introduction.md │ └── Web Application Layout.md ├── Javascript Deobfuscation │ ├── Deobfuscation Cheat Sheet.md │ ├── Deobfuscation Examples │ │ ├── Code Analysis.md │ │ ├── Decoding.md │ │ └── HTTP Requests.md │ ├── Introduction │ │ ├── Introduction.md │ │ └── Source Code.md │ ├── Obfuscation │ │ ├── Advanced Obfuscation.md │ │ ├── Basic Obfuscation.md │ │ ├── Code Obfuscation.md │ │ └── Deobfuscation.md │ └── Skills Assessment │ ├── Skills Assessment.md │ └── Summary.md ├── Knowledge Tree.md ├── Linux Fundamentals │ ├── Introduction │ │ ├── Introduction to Shell.md │ │ ├── Linux Distributions.md │ │ └── Linux structure.md │ ├── Linux Cheat Sheet.md │ ├── System Management │ │ ├── Backup and Restore.md │ │ ├── Containerization.md │ │ ├── File System Management.md │ │ ├── Network Configuration.md │ │ ├── Network Services.md │ │ ├── Package Management.md │ │ ├── Service and Process Management.md │ │ ├── Task Scheduling.md │ │ ├── User Management.md │ │ └── Working with Web Services.md │ ├── The Shell │ │ ├── Getting help.md │ │ ├── Prompt Description.md │ │ └── System information.md │ ├── Tips and tricks │ │ ├── Linux security.md │ │ └── Shortcuts.md │ └── Workflow │ ├── Editing files.md │ ├── File descriptors and redirections.md │ ├── Filter Contents.md │ ├── Find files and directories.md │ ├── Navigation.md │ ├── Permission Management.md │ ├── Regular Expressions.md │ └── Working with Files and Directories.md ├── Penetration Testing Fundamentals │ ├── Attacking Your First Box │ │ ├── Nibbles - Alternate User Method - Metasploit.md │ │ ├── Nibbles - Enumeration.md │ │ ├── Nibbles - Initial Foothold.md │ │ ├── Nibbles - Privilege Escalation.md │ │ └── Nibbles - Web Footprinting.md │ ├── Getting Started with HTB │ │ ├── Navigating HTB.md │ │ └── Starting Out.md │ ├── Next Steps │ │ ├── Knowledge Check.md │ │ └── Next Steps.md │ ├── Pentesting Basics │ │ ├── Basic Tools.md │ │ ├── Common Terms.md │ │ ├── Privilege Escalation.md │ │ ├── Public Exploits.md │ │ ├── Service Scanning.md │ │ ├── Transferring Files.md │ │ ├── Types of Shells.md │ │ └── Web Enumeration.md │ ├── Pentesting Cheat Sheet.md │ ├── Problem Solving │ │ ├── Common Pitfalls.md │ │ └── Getting Help.md │ └── Setup │ ├── Connecting Using VPN.md │ ├── Getting Started with a Pentest Distro.md │ ├── Infosec Overview.md │ └── Staying Organized.md ├── Setting up │ ├── Introduction │ │ ├── Containers.md │ │ ├── Introduction.md │ │ └── Virtualization.md │ ├── Operating Systems │ │ ├── Linux.md │ │ └── Windows.md │ └── Virtual Private Server │ ├── VPS Hardening.md │ ├── VPS Providers.md │ └── VPS Setup.md ├── Useful Links.md ├── Using The Metasploit Framework │ ├── Additional Features │ │ ├── Firewall and IDS-IPS Evasion.md │ │ ├── Introduction to MSFVenom.md │ │ ├── Metasploit-Framework Updates - August 2020.md │ │ └── Writing and Importing Modules.md │ ├── Introduction │ │ ├── Introduction to MSFconsole.md │ │ ├── Introduction to Metasploit.md │ │ └── Preface.md │ ├── MSF Components │ │ ├── Databases.md │ │ ├── Encoders.md │ │ ├── Modules.md │ │ ├── Payloads.md │ │ ├── Plugins.md │ │ └── Targets.md │ ├── MSF Sessions │ │ ├── Meterpreter.md │ │ └── Sessions.md │ └── MSFconsole Cheat Sheet.md ├── Vulnerability Assessment │ ├── Nessus │ │ ├── Advanced Settings.md │ │ ├── Getting Started with Nessus.md │ │ ├── Nessus Scan.md │ │ ├── Nessus Skills Assessment.md │ │ ├── Scanning Issues.md │ │ ├── Vulnerability Scanning Overview.md │ │ └── Working with Nessus Scan Output.md │ ├── OpenVAS │ │ ├── Exporting The Results.md │ │ ├── Getting Started with OpenVAS.md │ │ ├── OpenVAS Skills Assessment.md │ │ └── OpenVas Scan.md │ ├── Reporting │ │ └── Reporting.md │ ├── Security Assessments │ │ ├── Assessment Standards.md │ │ ├── Security Assessments.md │ │ └── Vulnerability Assessment.md │ └── Vulnerability Scoring and Reporting │ ├── Common Vulnerabilities and Exposures (CVE).md │ └── Common Vulnerability Scoring System (CVSS).md ├── Web Requests │ ├── HTTP Fundamentals │ │ ├── HTTP Headers.md │ │ ├── HTTP Requests and Responses.md │ │ ├── HyperText Transfer Protocol (HTTP).md │ │ └── Hypertext Transfer Protocol Secure (HTTPS).md │ └── HTTP Methods │ ├── CRUD API.md │ ├── GET.md │ ├── HTTP Methods and Codes.md │ └── POST.md └── Windows Fundamentals ├── Core of the operating system │ ├── File System.md │ ├── Introduction to Windows.md │ ├── NTFS vs. Share Permissions.md │ └── Operating System Structure.md ├── Diving Deeper & Close Out │ ├── Desktop Experience vs. Server Core.md │ ├── Skills Assessment - Windows Fundamentals.md │ └── Windows Security.md ├── Further Windows Usage │ ├── Microsoft Management Console (MMC).md │ └── Windows Subsystem for Linux (WSL).md ├── Interacting with Windows │ ├── Interacting with the Windows Operating System.md │ ├── Windows Management Instrumentation (WMI).md │ └── Windows Sessions.md └── Working with services and processes ├── Service Permissions.md └── Windows Services & Processes.md 66 directories, 193 files
ljaime-hernandez/My-Obsidian-Vault
personal obsidian vault used to save all notes i take from different study fields