Skip to content

IamKsNoob/PTPv5

Repository files navigation

PTPv5 - eLearnSecurity

Mindmap/CheatSheet for eLearnSecurity-PTPv5

Table of Contents

System Security

This sections covers the basics of system architecture fundamentals needed to tackle/exploit system vulnerabilities like Buffer Overflows.

  • Architecture Fundamentals
  • Assembler, Debugger and Tools
  • Buffer Overflows
  • Shellcoding
  • Cryptography and Password-Cracking
  • Malware

Network Security

This section has the largest amount of content in the whole course. It covers network penetration testing methodology, Anonymity and Social Engineering.

  • Information Gathering
  • Scanning
  • Enumeration
  • Sniffing and MITM Attacks
  • Exploitation
  • Post-Exploitation
  • Not Included : Anonymity
  • Not Included : Social Engineering

Powershell for Pentester

This section covers the basics of Windows Powershell and the Offensive usage of Windows Powershell.

  • Introduction to Powershell
  • Powershell Fundamtentals
  • Offensive Powershell

Linux Exploitation

This section covers the methodology and techniques to exploiting a Linux-based system, ranging from Information Gathering to Post-Exploitation.

  • Introduction to Linux
  • Information Gathering
  • Remote Exploitation ( Exploitation over the Network )
  • Post-Exploitation

Web Application Security

This section covers the common vulnerabilities found in modern Web Application and how to exploit them.

  • Introduction to Web Application
  • Information Gathering
  • Cross-Site Scripting (XSS)
  • SQL Injection (SQLi)
  • Other common Web Attacks

Wifi Security

This section covers the basics of Wifi Security. Not tested in the exam.

  • Pre-requisites
  • Environment Setup
  • Wireless Standards
  • Wifi Network Discovery
  • Traffic Anaylsis
  • Attacking Wifi Networks
  • Using Wifi as attack vector

Ruby and Metasploit

This section covers the Ruby programming language that would be helpful in tackling Buffer Overflows. Lastly, it also covers a small portion related to Metasploit.

  • Installation and Fundamentals
  • Control Structures
  • Methods, Variables, Scope
  • Classes, Modules, Exceptions
  • Pentester pre-requisites
  • I/O Input/Output
  • Network and OS Interaction
  • The Web
  • Exploitation with Ruby
  • Metasploit

About

Mindmap/CheatSheet for eLearnSecurity-PTPv5

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published