Skip to content

Latest commit

 

History

History
55 lines (39 loc) · 2.87 KB

README.md

File metadata and controls

55 lines (39 loc) · 2.87 KB

Introduction

An attempt to organize the notes I've taken during my time in working through TryHackMe, HacktheBox, and other CTF content. This is very much a work in progress and no guarantees are made to how accurate this content is.

This is for educational purposes only and you should never perform any commands, actions, or steps documented here on systems you are not authorized to perform testing on. I have done my utmost to write these notes in my own words from the various training resources, however all credit should go to the content creators of the various rooms.

Operating Systems

Operating System fundamentals involving explanations on the file system, what to read and change permissions, and common commands to run from the commandline.

Recon and Enumeration

Reconnaissance consists of both Passive and Active surveillance methods. It is the first phase in the MITRE ATT&CK Framework and Ethical Hacking process.

Passive Recon

Footprinting method used to collect information about a target without directly interacting with the target. Common methods might be using an intermediary that interacts with the target or already has information about the target. Tools like Shodan.io, The Wayback Machine, WHOIS, are examples of this.

Active

Direct interaction with the company and services, such as visiting the company website or social media pages.

Enumeration

Direct interaction with company resources in an effort to uncover information relavent to discovering vulnerabilities and additional means of gaining access.

  • HOST - Host IP and Services Identification.
  • NMAP - Commonly used tool for port scanning IP addresses and enumerating services / ports.
  • GoBuster - Webpage directory enumeration.
  • DNS

Gaining Access

Privilege Escalation

Persistance and Exfiltration