Notes

      • Sec2 - PenTesting Overview
      • Sec3 - Pre-Engagement Activities
      • Sec4 - Frameworks
      • Sec5 - Information Gathering
      • Sec6 - Open Source Intelligence
      • Sec7 - Scanning & Enumeration
      • Sec8 - Recon & Enumeration Tools
      • Sec9 - Nmap & NSE
      • Sec10 - Scripting Basics
      • Sec11 - Modifying Scripts
      • Sec12 - Analyzing Scans
      • Sec13 - Discovering Vulnerabilities
      • Sec14 - Vulnerability Discovery Tools
      • Sec15 - Social Engineering Attacks
      • Sec16 - Wireless Attacks
      • Sec17 - Network Attacls
      • Sec18 - Authentication Attacks
      • Sec19 - Host Attacks
      • Sec20 - Web Application Vulnerabilities
      • Sec21 - Web Application Attacks
      • Sec22 - Cloud Attacks
      • Sec23 - Attacking Specialized Systems
      • Sec24 - Automated Attacks
      • Sec25 - Persistence
      • Sec26 - Lateral Movement
      • Sec27 - Exfiltration
      • Sec28 - Cleanup & Restoration
      • Sec29 - Remediation Recommendations
      • Sec30 - PenTest Reporting
            • File Structure
            • Introduction to Shell
            • Linux Distributions
            • Firewall Setup
            • Linux Security
            • System Logs
            • Network Configuration
            • Remote Desktop Protocols in Linux
            • Backup and Restore
            • Containerization
            • File System Management
            • Network Services
            • Package Management
            • Service & Process Management
            • Task Scheduling
            • User Management
            • Web Services
            • Getting Help
            • Prompt Description
            • System Information
            • Editing Files
            • File Descriptions & Redirections
            • Filter Contents
            • Find Files & Directories
            • Navigation
            • Permission Management
            • Regular Expressions
            • Working with Files and Directories
            • Firewall & IDS-IPS Evasion
            • Introduction to MSFVenom
            • Introduction to Metasploit
            • Introduction to MSFconsole
            • Databases MSF
            • Encoders
            • Modules
            • Payloads
            • Plugins & Mixins
            • Targets
            • Meterpreter
            • Sessions & Jobs
            • Intro to Databases
            • Types of Databases
            • Intro to MySQL
            • SQL Statements
            • Tooling
            • Web Fuzzing
            • Directory & File Fuzzing
            • Filtering Fuzzing Output
            • Parameter & Value Fuzzing
            • Recursive Fuzzing
            • Validating Findings
            • Virtual Host & Subdomain Fuzzing
            • API Fuzzing
            • Identifying Endpoints
            • Web Programming Interfaces
            • HTTP Headers
            • HTTP Requests and Responses
            • Hypertext Transfer Protocol
            • Hypertext Transfer Protocol Secure
            • CRUD API
            • GET Method
            • HTTP Methods and Codes
            • POST Method
        • Tools
    Home

    ❯

    CompTIA PenTest+

    Folder: CompTIA-PenTest+

    29 items under this folder.

    • Jun 06, 2025

      Sec26 - Lateral Movement

      • Jun 06, 2025

        Sec27 - Exfiltration

        • Jun 06, 2025

          Sec28 - Cleanup & Restoration

          • Jun 06, 2025

            Sec29 - Remediation Recommendations

            • Jun 06, 2025

              Sec3 - Pre-Engagement Activities

              • Jun 06, 2025

                Sec30 - PenTest Reporting

                • Jun 06, 2025

                  Sec4 - Frameworks

                  • Jun 06, 2025

                    Sec5 - Information Gathering

                    • Jun 06, 2025

                      Sec6 - Open Source Intelligence

                      • Jun 06, 2025

                        Sec7 - Scanning & Enumeration

                        • Jun 06, 2025

                          Sec8 - Recon & Enumeration Tools

                          • Jun 06, 2025

                            Sec9 - Nmap & NSE

                            • Jun 06, 2025

                              Sec10 - Scripting Basics

                              • Jun 06, 2025

                                Sec11 - Modifying Scripts

                                • Jun 06, 2025

                                  Sec12 - Analyzing Scans

                                  • Jun 06, 2025

                                    Sec13 - Discovering Vulnerabilities

                                    • Jun 06, 2025

                                      Sec14 - Vulnerability Discovery Tools

                                      • Jun 06, 2025

                                        Sec15 - Social Engineering Attacks

                                        • Jun 06, 2025

                                          Sec16 - Wireless Attacks

                                          • Jun 06, 2025

                                            Sec17 - Network Attacls

                                            • Jun 06, 2025

                                              Sec18 - Authentication Attacks

                                              • Jun 06, 2025

                                                Sec19 - Host Attacks

                                                • Jun 06, 2025

                                                  Sec2 - PenTesting Overview

                                                  • Jun 06, 2025

                                                    Sec20 - Web Application Vulnerabilities

                                                    • Jun 06, 2025

                                                      Sec21 - Web Application Attacks

                                                      • Jun 06, 2025

                                                        Sec22 - Cloud Attacks

                                                        • Jun 06, 2025

                                                          Sec23 - Attacking Specialized Systems

                                                          • Jun 06, 2025

                                                            Sec24 - Automated Attacks

                                                            • Jun 06, 2025

                                                              Sec25 - Persistence


                                                              Powered By Quartz © 2025 | GitHub - Notes.CuriousAvenger.net | LinkedIn - Sai Praneth