Giter Site home page Giter Site logo

ptpv5's Introduction

PTPv5 - eLearnSecurity

Mindmap/CheatSheet for eLearnSecurity-PTPv5

Table of Contents

System Security

This sections covers the basics of system architecture fundamentals needed to tackle/exploit system vulnerabilities like Buffer Overflows.

  • Architecture Fundamentals
  • Assembler, Debugger and Tools
  • Buffer Overflows
  • Shellcoding
  • Cryptography and Password-Cracking
  • Malware

Network Security

This section has the largest amount of content in the whole course. It covers network penetration testing methodology, Anonymity and Social Engineering.

  • Information Gathering
  • Scanning
  • Enumeration
  • Sniffing and MITM Attacks
  • Exploitation
  • Post-Exploitation
  • Not Included : Anonymity
  • Not Included : Social Engineering

Powershell for Pentester

This section covers the basics of Windows Powershell and the Offensive usage of Windows Powershell.

  • Introduction to Powershell
  • Powershell Fundamtentals
  • Offensive Powershell

Linux Exploitation

This section covers the methodology and techniques to exploiting a Linux-based system, ranging from Information Gathering to Post-Exploitation.

  • Introduction to Linux
  • Information Gathering
  • Remote Exploitation ( Exploitation over the Network )
  • Post-Exploitation

Web Application Security

This section covers the common vulnerabilities found in modern Web Application and how to exploit them.

  • Introduction to Web Application
  • Information Gathering
  • Cross-Site Scripting (XSS)
  • SQL Injection (SQLi)
  • Other common Web Attacks

Wifi Security

This section covers the basics of Wifi Security. Not tested in the exam.

  • Pre-requisites
  • Environment Setup
  • Wireless Standards
  • Wifi Network Discovery
  • Traffic Anaylsis
  • Attacking Wifi Networks
  • Using Wifi as attack vector

Ruby and Metasploit

This section covers the Ruby programming language that would be helpful in tackling Buffer Overflows. Lastly, it also covers a small portion related to Metasploit.

  • Installation and Fundamentals
  • Control Structures
  • Methods, Variables, Scope
  • Classes, Modules, Exceptions
  • Pentester pre-requisites
  • I/O Input/Output
  • Network and OS Interaction
  • The Web
  • Exploitation with Ruby
  • Metasploit

ptpv5's People

Contributors

iamksnoob avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.