Basic Fundamentals of Networking and Pentesting
KeepNote: http://keepnote.org/arrow-up-right
CheryTree: https://www.giuspen.com/cherrytree/arrow-up-right
GreenShot: https://getgreenshot.org/downloads/arrow-up-right
FlameShot: https://github.com/lupoDharkael/flameshotarrow-up-right
OneNote: https://products.office.com/en-us/onenote/digital-note-taking-app?rtc=1arrow-up-right
Joplin: https://github.com/laurent22/joplinarrow-up-right
IPv4 / IPv6 - https://en.wikipedia.org/wiki/IP_addressarrow-up-right
Mac Address - https://en.wikipedia.org/wiki/MAC_addressarrow-up-right
OSI Model - https://www.geeksforgeeks.org/layers-of-osi-model/arrow-up-right
Subnetting https://www.youtube.com/watch?v=ZxAwQB8TZsMarrow-up-right https://drive.google.com/file/d/1ETKH31-E7G-7ntEOlWGZcDZWuukmeHFe/viewarrow-up-right
Pentesting Methodology
1. Reconnaissance
2. Scanning | Enumeration
3. Vulnerability Assessment
4. Gaining Access | Exploitation
5. Maintaining Access | Post exploitation
6. Cleanup and Removing Evidence
7 Reporting
Last updated 4 years ago