Mindmap/CheatSheet for eLearnSecurity-PTPv5
- System Security
- Network Security
- Powershell for Pentester
- Linux Exploitation
- Web Application Security
- Wifi Security
- Ruby and Metasploit
This sections covers the basics of system architecture fundamentals needed to tackle/exploit system vulnerabilities like Buffer Overflows.
- Architecture Fundamentals
- Assembler, Debugger and Tools
- Buffer Overflows
- Shellcoding
- Cryptography and Password-Cracking
- Malware
This section has the largest amount of content in the whole course. It covers network penetration testing methodology, Anonymity and Social Engineering.
- Information Gathering
- Scanning
- Enumeration
- Sniffing and MITM Attacks
- Exploitation
- Post-Exploitation
- Not Included : Anonymity
- Not Included : Social Engineering
This section covers the basics of Windows Powershell and the Offensive usage of Windows Powershell.
- Introduction to Powershell
- Powershell Fundamtentals
- Offensive Powershell
This section covers the methodology and techniques to exploiting a Linux-based system, ranging from Information Gathering to Post-Exploitation.
- Introduction to Linux
- Information Gathering
- Remote Exploitation ( Exploitation over the Network )
- Post-Exploitation
- Currently, working on https://tryhackme.com/room/linuxprivesc , will update the Privilege Escalation portion soon
This section covers the common vulnerabilities found in modern Web Application and how to exploit them.
- Introduction to Web Application
- Information Gathering
- Cross-Site Scripting (XSS)
- SQL Injection (SQLi)
- Other common Web Attacks
This section covers the basics of Wifi Security. Not tested in the exam.
- Pre-requisites
- Environment Setup
- Wireless Standards
- Wifi Network Discovery
- Traffic Anaylsis
- Attacking Wifi Networks
- Using Wifi as attack vector
This section covers the Ruby programming language that would be helpful in tackling Buffer Overflows. Lastly, it also covers a small portion related to Metasploit.
- Installation and Fundamentals
- Control Structures
- Methods, Variables, Scope
- Classes, Modules, Exceptions
- Pentester pre-requisites
- I/O Input/Output
- Network and OS Interaction
- The Web
- Exploitation with Ruby
- Metasploit