Notes
Search
Search
Dark mode
Light mode
Explorer
CompTIA PenTest+
Sec2 - PenTesting Overview
Sec3 - Pre-Engagement Activities
Sec4 - Frameworks
Sec5 - Information Gathering
Sec6 - Open Source Intelligence
Sec7 - Scanning & Enumeration
Sec8 - Recon & Enumeration Tools
Sec9 - Nmap & NSE
Sec10 - Scripting Basics
Sec11 - Modifying Scripts
Sec12 - Analyzing Scans
Sec13 - Discovering Vulnerabilities
Sec14 - Vulnerability Discovery Tools
Sec15 - Social Engineering Attacks
Sec16 - Wireless Attacks
Sec17 - Network Attacls
Sec18 - Authentication Attacks
Sec19 - Host Attacks
Sec20 - Web Application Vulnerabilities
Sec21 - Web Application Attacks
Sec22 - Cloud Attacks
Sec23 - Attacking Specialized Systems
Sec24 - Automated Attacks
Sec25 - Persistence
Sec26 - Lateral Movement
Sec27 - Exfiltration
Sec28 - Cleanup & Restoration
Sec29 - Remediation Recommendations
Sec30 - PenTest Reporting
HackTheBox
Linux Fundamentals
Introduction
File Structure
Introduction to Shell
Linux Distributions
Linux Hardening
Firewall Setup
Linux Security
System Logs
Linux Networking
Network Configuration
Remote Desktop Protocols in Linux
System Management
Backup and Restore
Containerization
File System Management
Network Services
Package Management
Service & Process Management
Task Scheduling
User Management
Web Services
The Shell
Getting Help
Prompt Description
System Information
Workflow
Editing Files
File Descriptions & Redirections
Filter Contents
Find Files & Directories
Navigation
Permission Management
Regular Expressions
Working with Files and Directories
Metasploit Framework
Additional Notes
Firewall & IDS-IPS Evasion
Introduction to MSFVenom
Introduction
Introduction to Metasploit
Introduction to MSFconsole
MSF Components
Databases MSF
Encoders
Modules
Payloads
Plugins & Mixins
Targets
MSF Sessions
Meterpreter
Sessions & Jobs
SQL Injection
Intro to Databases
Intro to Databases
Types of Databases
MySQL
Intro to MySQL
SQL Statements
Web Fuzzing
Introduction
Tooling
Web Fuzzing
Methodologies
Directory & File Fuzzing
Filtering Fuzzing Output
Parameter & Value Fuzzing
Recursive Fuzzing
Validating Findings
Virtual Host & Subdomain Fuzzing
Web APIs
API Fuzzing
Identifying Endpoints
Web Programming Interfaces
Web Requests
HTTP Fundamentals
HTTP Headers
HTTP Requests and Responses
Hypertext Transfer Protocol
Hypertext Transfer Protocol Secure
HTTP Methods
CRUD API
GET Method
HTTP Methods and Codes
POST Method
Workstation
Tools
Home
❯
HackTheBox
HackTheBox
5 items under this folder.
Jun 06, 2025
Web Requests
Jun 06, 2025
Web Fuzzing
Jun 06, 2025
Metasploit Framework
Jun 06, 2025
Linux Fundamentals
Jun 06, 2025
SQL Injection