✒️
Pentesting Cheatsheet
search
⌘Ctrlk
✒️
Pentesting Cheatsheet
  • Introduction
  • Basics
  • Information Gathering | OSINT
  • Penetration Testing
  • Active Directory
  • Pivoting
  • Windows Privesc
  • Vulnhub/ PG/ THM/ HTB
  • Apache Log4j
  • Linux Forensics Cheatsheet
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Basics

Basic Fundamentals of Networking and Pentesting

hashtag
NOTE KEEPING

KeepNote: http://keepnote.org/arrow-up-right

CheryTree: https://www.giuspen.com/cherrytree/arrow-up-right

GreenShot: https://getgreenshot.org/downloads/arrow-up-right

FlameShot: https://github.com/lupoDharkael/flameshotarrow-up-right

OneNote: https://products.office.com/en-us/onenote/digital-note-taking-app?rtc=1arrow-up-right

Joplin: https://github.com/laurent22/joplinarrow-up-right

hashtag
Networking Basics

IPv4 / IPv6 - https://en.wikipedia.org/wiki/IP_addressarrow-up-right

LogoUnderstanding IP Addressing and CIDR ChartsRIPE Network Coordination Centerchevron-right

Mac Address - https://en.wikipedia.org/wiki/MAC_addressarrow-up-right

OSI Model - https://www.geeksforgeeks.org/layers-of-osi-model/arrow-up-right

Subnetting https://www.youtube.com/watch?v=ZxAwQB8TZsMarrow-up-right https://drive.google.com/file/d/1ETKH31-E7G-7ntEOlWGZcDZWuukmeHFe/viewarrow-up-right

LogoTopics | IBMwww.ibm.comchevron-right

Pentesting Methodology

1. Reconn­ais­sance

2. Scanning | Enumeration

3. Vulner­ability Assessment

4. Gaining Access | Exploi­tation

5. Mainta­ining Access | Post exploi­tation

6. Cleanup and Removing Evidence

7 Reporting

PreviousIntroductionchevron-leftNextInformation Gathering | OSINTchevron-right

Last updated 4 years ago

  • NOTE KEEPING
  • Networking Basics