├── 1.System_Security
└── README.md
├── 2.Network_Security
├── Network_Security.pdf
├── Network_Security.xmind
└── README.md
├── 3.Powershell_for_Pentesters
└── README.md
├── 4.Linux_Exploitation
├── Linux Exploitation.pdf
├── Linux Exploitation.xmind
└── README.md
├── 5.Web_Application_Security
└── README.md
├── 6.Wifi_Security
└── README.md
├── 7.Ruby_and_Metasploit
└── README.md
└── README.md
/1.System_Security/README.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/1.System_Security/README.md
--------------------------------------------------------------------------------
/2.Network_Security/Network_Security.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/2.Network_Security/Network_Security.pdf
--------------------------------------------------------------------------------
/2.Network_Security/Network_Security.xmind:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/2.Network_Security/Network_Security.xmind
--------------------------------------------------------------------------------
/2.Network_Security/README.md:
--------------------------------------------------------------------------------
1 | # Note:
2 | Sorry if this is too messy, this is my first time using Xmind to do my notes/cheatsheet
3 |
4 | I recommend using the Xmind app to open the mindmap as the PDF format is harder to read due to the mindmap being too big
5 |
6 | Feel free to let me know on discord if i mistyped anything or wrote anything wrongly
7 |
8 | Discord ID : IamKsNoob#2823
9 |
10 | # Topics Included
11 |
12 | - Information Gathering
13 | - Data Harvesting
14 | - DNS Enumeration
15 | - DNS Lookup
16 | - Reverse DNS Lookup
17 | - Mail Exchange Lookup
18 | - DNS Zone Transfer
19 | - Scanning
20 | - Nmap
21 | - Port Scanning
22 | - TCP
23 | - UDP
24 | - IP
25 | - Service + OS Fingerprinting
26 | - Service Scanning
27 | - OS Fingerprinting
28 | - FTP Bounce Attack
29 | - Firewall + IDS Evasion
30 | - Fragmentation
31 | - Decoys
32 | - Timing
33 | - Source Ports
34 | - Idle Scans
35 | - Nmap Scripting Engine (NSE)
36 | - Enumeration
37 | - NetBIOS
38 | - List/Find open shares
39 | - Enumerate open shares
40 | - Null Session
41 | - SNMP
42 | - snmpwalk
43 | - snmpset
44 | - NSE
45 | - Sniffing and MITM
46 | - LLMNR/NBT-NS Poisoning
47 | - ARP Poisoning
48 | - MAC Flooding
49 | - Intercepting SSL Traffic
50 | - Vulnerability Assessment and Exploitation
51 | - Vulnerability Assessment
52 | - Authentication Brute-forcing
53 | - SMB Relay
54 | - EternalBlue (MS17-010)
55 | - Metasploit
56 | - AutoBlue (non-metasploit way)
57 | - Post-Exploitation
58 | - Windows Privilege Escalation
59 | - Metasploit's "getsystem"
60 | - Token Impersonation
61 | - Unquoted Service Path
62 | - DLL Hijacking
63 | - Maintaining Access
64 | - Password Hashes
65 | - RDP
66 | - Backdoors
67 | - Pillaging
68 | - Data Harvesting
69 | - Data Exfiltration
70 | - Pivoting
71 | - Sock4a proxy + Proxychains
72 | - Portfwd
73 |
--------------------------------------------------------------------------------
/3.Powershell_for_Pentesters/README.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/3.Powershell_for_Pentesters/README.md
--------------------------------------------------------------------------------
/4.Linux_Exploitation/Linux Exploitation.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/4.Linux_Exploitation/Linux Exploitation.pdf
--------------------------------------------------------------------------------
/4.Linux_Exploitation/Linux Exploitation.xmind:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/4.Linux_Exploitation/Linux Exploitation.xmind
--------------------------------------------------------------------------------
/4.Linux_Exploitation/README.md:
--------------------------------------------------------------------------------
1 | # Note:
2 | Sorry if this is too messy, this is my first time using Xmind to do my notes/cheatsheet
3 |
4 | I recommend using the Xmind app to open the mindmap as the PDF format is harder to read due to the mindmap being too big
5 |
6 | Feel free to let me know on discord if i mistyped anything or wrote anything wrongly
7 |
8 | Discord ID : IamKsNoob#2823
9 |
10 | # Topics Included
11 |
12 | - Enumeration
13 | - Remote Enumeration
14 | - NFS Enumeration
15 | - Rpcbind Enumeration
16 | - SMB Enumeration
17 | - SMTP User Enumeration
18 | - Local Enumeration
19 | - Network Information
20 | - System Information
21 | - Remote Exploitation
22 | - Password Spraying Attack
23 | - Exploiting Samba
24 | - Exploiting Shellshock
25 | - Exploiting Heartbleed
26 | - Exploiting Java RMI Registry
27 | - Exploiting Java Deserialization
28 | - Exploiting Tomcat
29 | - PHP CGI Argument Injection RCE
30 | - dRuby RMI Exploit
31 | - Post-Exploitation
32 | - Privilege Escalation [Incomplete, currently going through https://tryhackme.com/room/linuxprivesc]
33 | - Lateral Movement
34 | - Data Exfiltration
35 | - Maintaining Access
36 |
--------------------------------------------------------------------------------
/5.Web_Application_Security/README.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/5.Web_Application_Security/README.md
--------------------------------------------------------------------------------
/6.Wifi_Security/README.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/6.Wifi_Security/README.md
--------------------------------------------------------------------------------
/7.Ruby_and_Metasploit/README.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/7.Ruby_and_Metasploit/README.md
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # PTPv5 - eLearnSecurity
2 | Mindmap/CheatSheet for eLearnSecurity-PTPv5
3 | # Table of Contents
4 | - [System Security](#System-Security)
5 | - [Network Security](#Network-Security)
6 | - [Powershell for Pentester](#Powershell-for-Pentester)
7 | - [Linux Exploitation](#Linux-Exploitation)
8 | - [Web Application Security](#Web-Application-Security)
9 | - [Wifi Security](#Wifi-Security)
10 | - [Ruby and Metasploit](#Ruby-and-Metasploit)
11 |
12 | ## System Security
13 | This sections covers the basics of system architecture fundamentals needed to tackle/exploit system vulnerabilities like Buffer Overflows.
14 |
15 | - [ ] Architecture Fundamentals
16 | - [ ] Assembler, Debugger and Tools
17 | - [ ] Buffer Overflows
18 | - [ ] Shellcoding
19 | - [ ] Cryptography and Password-Cracking
20 | - [ ] Malware
21 |
22 | ## Network Security
23 | This section has the largest amount of content in the whole course. It covers network penetration testing methodology, Anonymity and Social Engineering.
24 |
25 | - [x] Information Gathering
26 | - [x] Scanning
27 | - [x] Enumeration
28 | - [x] Sniffing and MITM Attacks
29 | - [x] Exploitation
30 | - [x] Post-Exploitation
31 | - Not Included : Anonymity
32 | - Not Included : Social Engineering
33 |
34 | ## Powershell for Pentester
35 | This section covers the basics of **Windows Powershell** and the **Offensive usage of Windows Powershell**.
36 |
37 | - [ ] Introduction to Powershell
38 | - [ ] Powershell Fundamtentals
39 | - [ ] Offensive Powershell
40 |
41 | ## Linux Exploitation
42 | This section covers the methodology and techniques to exploiting a Linux-based system, ranging from Information Gathering to Post-Exploitation.
43 |
44 | - [x] Introduction to Linux
45 | - [x] Information Gathering
46 | - [x] Remote Exploitation ( Exploitation over the Network )
47 | - [ ] Post-Exploitation
48 | - Currently, working on https://tryhackme.com/room/linuxprivesc , will update the Privilege Escalation portion soon
49 |
50 | ## Web Application Security
51 | This section covers the common vulnerabilities found in modern Web Application and how to exploit them.
52 |
53 | - [ ] Introduction to Web Application
54 | - [ ] Information Gathering
55 | - [ ] Cross-Site Scripting (XSS)
56 | - [ ] SQL Injection (SQLi)
57 | - [ ] Other common Web Attacks
58 |
59 | ## Wifi Security
60 | This section covers the basics of **Wifi Security**. Not tested in the exam.
61 |
62 | - [ ] Pre-requisites
63 | - [ ] Environment Setup
64 | - [ ] Wireless Standards
65 | - [ ] Wifi Network Discovery
66 | - [ ] Traffic Anaylsis
67 | - [ ] Attacking Wifi Networks
68 | - [ ] Using Wifi as attack vector
69 |
70 | ## Ruby and Metasploit
71 | This section covers the **Ruby** programming language that would be helpful in tackling **Buffer Overflows**. Lastly, it also covers a small portion related to **Metasploit**.
72 |
73 | - [ ] Installation and Fundamentals
74 | - [ ] Control Structures
75 | - [ ] Methods, Variables, Scope
76 | - [ ] Classes, Modules, Exceptions
77 | - [ ] Pentester pre-requisites
78 | - [ ] I/O Input/Output
79 | - [ ] Network and OS Interaction
80 | - [ ] The Web
81 | - [ ] Exploitation with Ruby
82 | - [ ] Metasploit
83 |
84 |
85 |
86 |
87 |
88 |
--------------------------------------------------------------------------------