├── 1.System_Security └── README.md ├── 2.Network_Security ├── Network_Security.pdf ├── Network_Security.xmind └── README.md ├── 3.Powershell_for_Pentesters └── README.md ├── 4.Linux_Exploitation ├── Linux Exploitation.pdf ├── Linux Exploitation.xmind └── README.md ├── 5.Web_Application_Security └── README.md ├── 6.Wifi_Security └── README.md ├── 7.Ruby_and_Metasploit └── README.md └── README.md /1.System_Security/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/1.System_Security/README.md -------------------------------------------------------------------------------- /2.Network_Security/Network_Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/2.Network_Security/Network_Security.pdf -------------------------------------------------------------------------------- /2.Network_Security/Network_Security.xmind: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/2.Network_Security/Network_Security.xmind -------------------------------------------------------------------------------- /2.Network_Security/README.md: -------------------------------------------------------------------------------- 1 | # Note: 2 | Sorry if this is too messy, this is my first time using Xmind to do my notes/cheatsheet 3 | 4 | I recommend using the Xmind app to open the mindmap as the PDF format is harder to read due to the mindmap being too big 5 | 6 | Feel free to let me know on discord if i mistyped anything or wrote anything wrongly 7 | 8 | Discord ID : IamKsNoob#2823 9 | 10 | # Topics Included 11 | 12 | - Information Gathering 13 | - Data Harvesting 14 | - DNS Enumeration 15 | - DNS Lookup 16 | - Reverse DNS Lookup 17 | - Mail Exchange Lookup 18 | - DNS Zone Transfer 19 | - Scanning 20 | - Nmap 21 | - Port Scanning 22 | - TCP 23 | - UDP 24 | - IP 25 | - Service + OS Fingerprinting 26 | - Service Scanning 27 | - OS Fingerprinting 28 | - FTP Bounce Attack 29 | - Firewall + IDS Evasion 30 | - Fragmentation 31 | - Decoys 32 | - Timing 33 | - Source Ports 34 | - Idle Scans 35 | - Nmap Scripting Engine (NSE) 36 | - Enumeration 37 | - NetBIOS 38 | - List/Find open shares 39 | - Enumerate open shares 40 | - Null Session 41 | - SNMP 42 | - snmpwalk 43 | - snmpset 44 | - NSE 45 | - Sniffing and MITM 46 | - LLMNR/NBT-NS Poisoning 47 | - ARP Poisoning 48 | - MAC Flooding 49 | - Intercepting SSL Traffic 50 | - Vulnerability Assessment and Exploitation 51 | - Vulnerability Assessment 52 | - Authentication Brute-forcing 53 | - SMB Relay 54 | - EternalBlue (MS17-010) 55 | - Metasploit 56 | - AutoBlue (non-metasploit way) 57 | - Post-Exploitation 58 | - Windows Privilege Escalation 59 | - Metasploit's "getsystem" 60 | - Token Impersonation 61 | - Unquoted Service Path 62 | - DLL Hijacking 63 | - Maintaining Access 64 | - Password Hashes 65 | - RDP 66 | - Backdoors 67 | - Pillaging 68 | - Data Harvesting 69 | - Data Exfiltration 70 | - Pivoting 71 | - Sock4a proxy + Proxychains 72 | - Portfwd 73 | -------------------------------------------------------------------------------- /3.Powershell_for_Pentesters/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/3.Powershell_for_Pentesters/README.md -------------------------------------------------------------------------------- /4.Linux_Exploitation/Linux Exploitation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/4.Linux_Exploitation/Linux Exploitation.pdf -------------------------------------------------------------------------------- /4.Linux_Exploitation/Linux Exploitation.xmind: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/4.Linux_Exploitation/Linux Exploitation.xmind -------------------------------------------------------------------------------- /4.Linux_Exploitation/README.md: -------------------------------------------------------------------------------- 1 | # Note: 2 | Sorry if this is too messy, this is my first time using Xmind to do my notes/cheatsheet 3 | 4 | I recommend using the Xmind app to open the mindmap as the PDF format is harder to read due to the mindmap being too big 5 | 6 | Feel free to let me know on discord if i mistyped anything or wrote anything wrongly 7 | 8 | Discord ID : IamKsNoob#2823 9 | 10 | # Topics Included 11 | 12 | - Enumeration 13 | - Remote Enumeration 14 | - NFS Enumeration 15 | - Rpcbind Enumeration 16 | - SMB Enumeration 17 | - SMTP User Enumeration 18 | - Local Enumeration 19 | - Network Information 20 | - System Information 21 | - Remote Exploitation 22 | - Password Spraying Attack 23 | - Exploiting Samba 24 | - Exploiting Shellshock 25 | - Exploiting Heartbleed 26 | - Exploiting Java RMI Registry 27 | - Exploiting Java Deserialization 28 | - Exploiting Tomcat 29 | - PHP CGI Argument Injection RCE 30 | - dRuby RMI Exploit 31 | - Post-Exploitation 32 | - Privilege Escalation [Incomplete, currently going through https://tryhackme.com/room/linuxprivesc] 33 | - Lateral Movement 34 | - Data Exfiltration 35 | - Maintaining Access 36 | -------------------------------------------------------------------------------- /5.Web_Application_Security/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/5.Web_Application_Security/README.md -------------------------------------------------------------------------------- /6.Wifi_Security/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/6.Wifi_Security/README.md -------------------------------------------------------------------------------- /7.Ruby_and_Metasploit/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/IamKsNoob/PTPv5/f7b39bd0f9bd0e7f0ad5de8ba5d13bd1ca0aafbc/7.Ruby_and_Metasploit/README.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # PTPv5 - eLearnSecurity 2 | Mindmap/CheatSheet for eLearnSecurity-PTPv5 3 | # Table of Contents 4 | - [System Security](#System-Security) 5 | - [Network Security](#Network-Security) 6 | - [Powershell for Pentester](#Powershell-for-Pentester) 7 | - [Linux Exploitation](#Linux-Exploitation) 8 | - [Web Application Security](#Web-Application-Security) 9 | - [Wifi Security](#Wifi-Security) 10 | - [Ruby and Metasploit](#Ruby-and-Metasploit) 11 | 12 | ## System Security 13 | This sections covers the basics of system architecture fundamentals needed to tackle/exploit system vulnerabilities like Buffer Overflows. 14 | 15 | - [ ] Architecture Fundamentals 16 | - [ ] Assembler, Debugger and Tools 17 | - [ ] Buffer Overflows 18 | - [ ] Shellcoding 19 | - [ ] Cryptography and Password-Cracking 20 | - [ ] Malware 21 | 22 | ## Network Security 23 | This section has the largest amount of content in the whole course. It covers network penetration testing methodology, Anonymity and Social Engineering. 24 | 25 | - [x] Information Gathering 26 | - [x] Scanning 27 | - [x] Enumeration 28 | - [x] Sniffing and MITM Attacks 29 | - [x] Exploitation 30 | - [x] Post-Exploitation 31 | - Not Included : Anonymity 32 | - Not Included : Social Engineering 33 | 34 | ## Powershell for Pentester 35 | This section covers the basics of **Windows Powershell** and the **Offensive usage of Windows Powershell**. 36 | 37 | - [ ] Introduction to Powershell 38 | - [ ] Powershell Fundamtentals 39 | - [ ] Offensive Powershell 40 | 41 | ## Linux Exploitation 42 | This section covers the methodology and techniques to exploiting a Linux-based system, ranging from Information Gathering to Post-Exploitation. 43 | 44 | - [x] Introduction to Linux 45 | - [x] Information Gathering 46 | - [x] Remote Exploitation ( Exploitation over the Network ) 47 | - [ ] Post-Exploitation 48 | - Currently, working on https://tryhackme.com/room/linuxprivesc , will update the Privilege Escalation portion soon 49 | 50 | ## Web Application Security 51 | This section covers the common vulnerabilities found in modern Web Application and how to exploit them. 52 | 53 | - [ ] Introduction to Web Application 54 | - [ ] Information Gathering 55 | - [ ] Cross-Site Scripting (XSS) 56 | - [ ] SQL Injection (SQLi) 57 | - [ ] Other common Web Attacks 58 | 59 | ## Wifi Security 60 | This section covers the basics of **Wifi Security**. Not tested in the exam. 61 | 62 | - [ ] Pre-requisites 63 | - [ ] Environment Setup 64 | - [ ] Wireless Standards 65 | - [ ] Wifi Network Discovery 66 | - [ ] Traffic Anaylsis 67 | - [ ] Attacking Wifi Networks 68 | - [ ] Using Wifi as attack vector 69 | 70 | ## Ruby and Metasploit 71 | This section covers the **Ruby** programming language that would be helpful in tackling **Buffer Overflows**. Lastly, it also covers a small portion related to **Metasploit**. 72 | 73 | - [ ] Installation and Fundamentals 74 | - [ ] Control Structures 75 | - [ ] Methods, Variables, Scope 76 | - [ ] Classes, Modules, Exceptions 77 | - [ ] Pentester pre-requisites 78 | - [ ] I/O Input/Output 79 | - [ ] Network and OS Interaction 80 | - [ ] The Web 81 | - [ ] Exploitation with Ruby 82 | - [ ] Metasploit 83 | 84 | 85 | 86 | 87 | 88 | --------------------------------------------------------------------------------