SavitarX
LinkedinTryHackme
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Telecom
      • CCNA
        • Intro to the CLI
        • IPv4 Addressing
        • Switch Interfaces
        • Routing Fundamentals
        • VLAN
          • Trunk Ports
          • Router on a Stick (ROAS)
          • Native VLAN on a Router
        • VTP
        • Spanning-Tree
        • Etherchannel
        • Protocolos CDP e LLDP
        • SSH (Secure Shell)
      • HCIA - Datacom
        • VRP
        • Endereçamento IP
        • Roteamento
          • Roteamento Estático
          • Roteamento Dinâmico
        • VLAN
          • Caso 1 - VLAN baseada em interface
          • Caso 2 -VLAN baseada em interface Híbridas
    • Network Pentesting
      • CPTS
        • Getting Started
          • General
          • Tmux
          • Vim
          • Service Scanning
            • Questões
          • Web Enumeration
            • Questões
          • Public Exploits
            • Questões
          • Using Shells
          • Privilege Escalation
          • Transferring Files
        • Network Enumeration with Nmap
          • Host Discovery
          • Host and Port Scanning
          • Saving the Results
            • Question
          • Service Enumeration
          • Nmap Scripting Engine
            • Question
          • Performance
          • Bypass Security Measures
            • Firewall and IDS/IPS Evasion
            • Firewall and IDS/IPS Evasion - Easy Lab
            • Firewall and IDS/IPS Evasion - Hard Lab
          • Cheat Sheet - Nmap
            • Scanning Options
            • Output Options
            • Performance Options
        • Web Fuzzing
          • Directory and File Fuzzing
          • Recursive Fuzzing
        • Footprinting
          • Infrastructure-based Enumeration
          • FTP
          • SMB
            • Question
          • NFS
          • DNS
            • Question
          • SMTP
            • Question
          • IMAP / POP3
            • Question
          • SNMP
            • Question
          • MySQL
            • Question
          • MSSQL
            • Question
          • Oracle TNS - 1521
          • IPMI
        • Attacking Common Services
          • FTP
          • SMB
            • Questions
          • SQL Databases
          • RDP
          • DNS
            • Question
          • SMTP
            • Questions
          • Attacking Common Services - Easy
          • Attacking Common Services - Medium
        • File Transfers
          • Windows File Transfer Methods
            • Question
          • Linux File Transfer Methods
            • Question
          • Transferring Files with Code
          • Miscellaneous File Transfer Methods
          • Living off The Land
        • Shells & Payloads
          • Bind Shells
          • Reverse Shells
          • Automating Payloads & Delivery with Metasploit
          • Crafting Payloads with MSFvenom
          • Infiltrating Windows
          • Spawning Interactive Shells
          • Web Shells
            • Laudanum
            • Antak Webshell
        • Using Metasploit Framework
          • MSF Engagement Structure
          • MSFconsole Commands
          • Meterpreter Commands
            • Mimikatz
            • Kiwi
          • Encoders
          • Databases
          • Introduction to MSFVenom
          • Firewall and IDS/IPS Evasion
        • Password Attacks
          • Connecting to Target
        • Pivoting, Tunneling, and Port Forwarding
          • The Networking Behind Pivoting
          • Dynamic Port Forwarding with SSH and SOCKS Tunneling
          • Remote/Reverse Port Forwarding with SSH
          • Meterpreter Tunneling & Port Forwarding
          • Socat Redirection with a Reverse Shell
          • Socat Redirection with a Bind Shell
          • SSH Pivoting with Sshuttle
          • Web Server Pivoting with Rpivot
          • Port Forwarding with Windows Netsh
          • Dnscat2
          • Chisel
          • ICMP Tunneling with SOCKS
          • RDP and SOCKS Tunneling with SocksOverRDP
          • Ligolo-ng
        • Active Directory Enumeration & Attacks
          • Initial Enumeration of the Domain
          • LLMNR/NBT-NS Poisoning - from Linux
          • LLMNR/NBT-NS Poisoning - from Windows
          • Enumerating & Retrieving Password Policies
          • Password Spraying - Making a Target User List
          • Internal Password Spraying - from Linux
          • Internal Password Spraying - from Windows
          • Enumerating Security Controls
          • Credentialed Enumeration - from Linux
          • Credentialed Enumeration - from Windows
            • PowerView
          • Living Off the Land
          • Kerberoasting - from Linux
          • Kerberoasting - from Windows
          • ACL Enumeration
          • ACL Abuse Tactics
          • DCSync
          • Privileged Access
      • CRTA
        • Red Teaming in External Environment
          • Scanning & Enumeration
          • Vulnerability Assessment
          • Exploitation
        • 4. Red Teaming in Internal Environment
          • Internal Network Enumeration
          • Active Directory Phases Exploitation
            • Domain Enumeration
          • Local Privilege Escalation
      • CRTP
        • Basic AV Bypass
        • 1. Domain Enumeration
          • 1.2. ACLs
          • 1.3. Trusts
          • 1.4. User Hunting
        • 2. Local Privilege Escalation
      • Empire Operations I
        • Introdução
        • Empire Essentials
    • Web Pentesting
      • CBBH
        • Web Requests
          • cURL
        • Information Gathering - Web Edition
          • WHOIS
          • DNS Enumeration
          • Passive Subdomain Enumeration
          • Passive Infrastructure Identification
          • Fingerprinting
          • Active Subdomain Enumeration
          • Virtual Hosts
          • Crawling
          • Search Engine Discovery
          • Google Dorking
            • Simple Examples
          • Automating Recon
            • FinalRecon
        • Attacking Web Applications with Ffuf
          • Web Fuzzing
          • Directory Fuzzing
          • Page Fuzzing
          • Recursive Fuzzing
          • Sub-domain Fuzzing
          • Vhost Fuzzing
          • Parameter Fuzzing - GET
          • Parameter Fuzzing - POST
          • Value Fuzzing
          • Skills Assessment - Web Fuzzing
          • Cheat Sheet
        • JavaScript Deobfuscation
        • Cross-Site Scripting (XSS)
          • Introduction
          • Stored XSS
          • Reflected XSS
          • DOM XSS
          • XSS Discovery
          • Phishing
          • Session Hijacking
          • Cheat Sheet
        • SQL Injection Fundamentals
          • MySQL
          • SQL Injection
          • Exploitation
          • Skills Assessment - SQL Injection Fundamentals
          • References
        • SQLMap Essentials
          • Getting Started with SQLMap
          • Running SQLMap on an HTTP Request
            • Question-1
            • Question-2
            • Question-3
          • Handling SQLMap Errors
          • Attack Tuning
            • Question-1
            • Question-2
            • Question-3
          • Database Enumeration
            • Question-1
          • Advanced Database Enumeration
            • Question-1
            • Question-2
          • Bypassing Web Application Protections
            • Question-1
            • Question-2
            • Question-3
            • Question-4
          • OS Exploitation
            • Question-1
            • Question-2
          • Skills Assessment
        • Command Injections
          • Intro
          • Dectetion
            • Question
          • Injecting Commands
            • Question
          • Other Injection Operators
            • Common Operators for Injections
            • Question
          • Bypassing Other Blacklisted Characters
          • Blacklisted Command Bypass
          • Advanced Command Obfuscation
          • Evasion Tools
            • Linux (Bashfuscator)
            • Windows (DOSfuscation)
        • File Upload Attacks
          • Upload Exploitation
          • Blacklist Filters
          • Whitelist Filters
          • Type Filters
            • Question
          • Limited File Uploads
            • Question-1
            • Question-2
        • Server-Side Attacks
          • SSRF Exploitation Example
          • Blind SSRF Exploitation Example
            • Question-1
          • SSI Injection Exploitation Example
            • References
            • Question-1
          • SSTI Identification
          • SSTI Exploitation Example 1
            • Question-1
          • SSTI Exploitation Example 2
            • Question-1
          • SSTI Exploitation Example 3
          • Skills Assessment
        • Login Brute Forcing
          • Default Passwords
            • Question-1
          • Username Brute Force
          • Determine Login Parameters
          • Login Form Attacks
            • Question-1
          • Personalized Wordlists
          • Service Authentication Brute Forcing
        • Broken Authentication
          • Enumerating Users
          • Brute-Forcing Passwords
          • Brute-Forcing Password Reset Tokens
          • Brute-Forcing 2FA Codes
          • Default Credentials
          • Vulnerable Password Reset
        • Web Attacks
          • HTTP Verb Tampering
          • IDOR
            • Question-1
            • Question-2
          • XXE
            • Identificar XXE
              • Question-1
        • File Inclusion
          • File Disclosure
            • Basic LFI - 1
            • LFI Bypass - 1
            • PHP Filters - 1
          • Remote Code Execution
            • PHP Wrappers - 1
            • RFI - 1
            • LFI & Uploads - 1
            • Log Poisoning - 1
          • Automation and Prevention
        • Hacking WordPress
          • WordPress Core Version Enumeration
          • Plugins and Themes Enumeration
          • Directory Indexing
          • User Enumeration
          • WPScan Enumeration
          • Exploiting a Vulnerable Plugin
          • Attacking WordPress Users
          • Remote Code Execution (RCE) via the Theme Editor
            • Question
          • Attacking WordPress with Metasploit
    • Wi-Fi Pentesting
      • OSWP
        • Wi-Fi Penetration Testing Basics
          • Wi-Fi Interfaces
          • Interface Modes
          • Aircrack-ng Essencial
            • Airmon-ng
            • Airodump-ng
            • Airgraph-ng
            • Aireplay-ng
            • Airdecap-ng
            • Aircrack-ng
          • Connecting to Wi-Fi Networks
          • Finding Hidden SSIDs
          • Bypassing Mac Filtering
        • Attacking Wi-Fi Protected Setup (WPS)
          • Wi-Fi Protected Setup Overview
          • WPS Reconnaissance
          • Online PIN Brute-Forcing Using Reaver
          • Secured Access Points
          • Using Multiple Pre-defined PINs
          • Using PIN Generation Tools
          • The Pixie Dust Attack
          • Push Button Configuration
          • Crashing a Target AP with MDK4
    • Basic programming
      • Introduction to Windows Command Line
      • Git
        • Creating Snapshots
        • Browsing History
        • Branching and merging
        • Remotes
        • Advanced Git
  • Writeups
    • Tryhackme
      • CyberLens
      • Hack Smarter Security
      • Sustah
      • TryHack3M: Subscribe
      • TryHack3M: Bricks Heist
      • HOLO - Network
        • Initial Recon
        • Web App Exploitation 101
        • Docker
        • PrivEsc
      • Airplane
      • Publisher
    • Cyberranges
      • SQL Injection 101
  • Machines to pratice for :
    • CPTS & OSCP
      • Linux Boxes
      • Windows Boxes
      • Active Directory Boxes
    • OSEP
Powered by GitBook
On this page

README

NextMy Roadmap to Becoming a Penetration Tester & Red Team

Last updated 1 month ago

Escrevo estas anotações para fins de aprendizagem porque vejo muito conteúdo em uma plataforma diferente, então decidi coletar todas as informações valiosas e armazená-las em um local de fácil acesso para todos, inclusive eu. muitas informações e textos foram copiados/colados de outros sites.

Meu objetivo é apenas compartilhar informações uns com os outros. Obrigado a todas as pessoas que compartilham informações na internet gratuitamente. Eu apenas tento compartilhar informações gratuitas com todos.

SamuraiX