Basics
Basic Fundamentals of Networking and Pentesting
NOTE KEEPING
KeepNote: http://keepnote.org/
CheryTree: https://www.giuspen.com/cherrytree/
GreenShot: https://getgreenshot.org/downloads/
FlameShot: https://github.com/lupoDharkael/flameshot
OneNote: https://products.office.com/en-us/onenote/digital-note-taking-app?rtc=1
Joplin: https://github.com/laurent22/joplin
Networking Basics
IPv4 / IPv6 - https://en.wikipedia.org/wiki/IP_address
Mac Address - https://en.wikipedia.org/wiki/MAC_address
OSI Model - https://www.geeksforgeeks.org/layers-of-osi-model/
Subnetting https://www.youtube.com/watch?v=ZxAwQB8TZsM https://drive.google.com/file/d/1ETKH31-E7G-7ntEOlWGZcDZWuukmeHFe/view
Pentesting Methodology
1. Reconnaissance
2. Scanning | Enumeration
3. Vulnerability Assessment
4. Gaining Access | Exploitation
5. Maintaining Access | Post exploitation
6. Cleanup and Removing Evidence
7 Reporting
Last updated
Was this helpful?