An attempt to organize the notes I've taken during my time in working through TryHackMe, HacktheBox, and other CTF content. This is very much a work in progress and no guarantees are made to how accurate this content is.
This is for educational purposes only and you should never perform any commands, actions, or steps documented here on systems you are not authorized to perform testing on. I have done my utmost to write these notes in my own words from the various training resources, however all credit should go to the content creators of the various rooms.
Operating System fundamentals involving explanations on the file system, what to read and change permissions, and common commands to run from the commandline.
Reconnaissance consists of both Passive and Active surveillance methods. It is the first phase in the MITRE ATT&CK Framework and Ethical Hacking process.
Footprinting method used to collect information about a target without directly interacting with the target. Common methods might be using an intermediary that interacts with the target or already has information about the target. Tools like Shodan.io, The Wayback Machine, WHOIS, are examples of this.
Direct interaction with the company and services, such as visiting the company website or social media pages.
Direct interaction with company resources in an effort to uncover information relavent to discovering vulnerabilities and additional means of gaining access.