✒️
Pentesting Cheatsheet
  • Introduction
  • Basics
  • Information Gathering | OSINT
  • Penetration Testing
    • Scanning and Enumeration
    • HTTP and HTTPS
    • SMB | Windows Domain Enumeration
    • NFS
    • SMTP
    • Reverse Shells
    • Buffer Overflow | Buf Exploitation
    • Linux Privilege Escalation
    • Miscellaneous
    • Redis
  • Active Directory
    • AD Extras
    • Attack Vectors
    • Post Compromise Enumeration
    • Post Compromise Attacks
  • Pivoting
  • Windows Privesc
    • Window Tools/Resources
    • Meterpreter Privesc
    • Powershell Scripting
  • Vulnhub/ PG/ THM/ HTB
  • Apache Log4j
  • Linux Forensics Cheatsheet
Powered by GitBook
On this page
  • NOTE KEEPING
  • Networking Basics

Was this helpful?

Basics

Basic Fundamentals of Networking and Pentesting

PreviousIntroductionNextInformation Gathering | OSINT

Last updated 4 years ago

Was this helpful?

NOTE KEEPING

KeepNote:

CheryTree:

GreenShot:

FlameShot:

OneNote:

Joplin:

Networking Basics

IPv4 / IPv6 -

Pentesting Methodology

1. Reconn­ais­sance

2. Scanning | Enumeration

3. Vulner­ability Assessment

4. Gaining Access | Exploi­tation

5. Mainta­ining Access | Post exploi­tation

6. Cleanup and Removing Evidence

7 Reporting

Mac Address -

OSI Model -

Subnetting

https://en.wikipedia.org/wiki/MAC_address
https://www.geeksforgeeks.org/layers-of-osi-model/
https://www.youtube.com/watch?v=ZxAwQB8TZsM
https://drive.google.com/file/d/1ETKH31-E7G-7ntEOlWGZcDZWuukmeHFe/view
http://keepnote.org/
https://www.giuspen.com/cherrytree/
https://getgreenshot.org/downloads/
https://github.com/lupoDharkael/flameshot
https://products.office.com/en-us/onenote/digital-note-taking-app?rtc=1
https://github.com/laurent22/joplin
https://en.wikipedia.org/wiki/IP_address
Understanding IP Addressing and CIDR ChartsRIPE Network Coordination Centre
networking-a-complete-guide
Logo
Logo