T
T
TODO•SEC
v2 - Compact Menu
Search
⌃
K
T
T
TODO•SEC
v2 - Compact Menu
Search
⌃
K
todo•SEC Home
Contents
Cloud and Networked Systems
Cloud and Networked Systems Topics
InfoSec
Infosec Topics
Powered By
GitBook
Contents
Contents
-
LinkedIn
-
Github
InfoSec Topics
Introduction to Cybersecurity
Penetration Test, Phases of Hacking/PT, Types of Hackers, Types of Testing and The CIA triad
IP Spoofing
Recon
Web
OWASP Top 10
Web Recon
OSINT
Open Source Intelligence
Gaining Access
msfvenom cheatsheet
Web
Directory Traversal
Local File Inclusion
Remote File Copy
Post-Exploitation
macOS
C2
Collection
Credential Access
Defense Evasion
Discovery
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
Windows
C2
Collection
Credential Access
Defense Evasion
Discovery
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
Linux
C2
Collection
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
GCP
C2
Collection
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
Azure
C2
Collection
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
AWS
C2
Collection
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
Controls
Linux
macOS
Windows
Infrastructure
Defensive/BLUE
Cryptography
Monitoring
Splunk
How to install Enterprise Splunk
Web Server Hardening
Remote File Inclusion Patching
Linux Logs
Offensive/RED
Network Security
nmap
Ping Sweep & Don't Ping Scans - nmap
Netcat/Ncat - WIP
Boxes
TryHackMe
Vulnversity
Vulnhub
1.
OSCP Giveaway
2.
OSCP (TJNull's)
3.
OSWE (TJNull's)
HTB
1.
OSCP (TJNull's)
2.
OSWE (TJNull's)
Laws and Regulations
Cloud and Networked Systems Topics
Computer Networks
Ethernet Local Area Networks
MAC Addresses
OSI and TCP/IP, IPv6 and Network Protocols at each layer
What are webpages made of?
Domain Name System
Intro to DHCP
Top 1000 Well Known Ports
Zone-Based Policy Firewall (also known as Zone-Policy Firewall, or ZFW)
802.1Q vs 802.1P (VLAN 0 Priority Tagging)
Wireless
Virtualization
Cloud Systems
AWS
Identity and Access Management
Policies and the root user
Receive and Send emails to custom domain in Route 53 using Simple Email Service and Simple Notification Service - Route53 + SES + SNS = Custom domain emails for less than 20$
macOS
Windows
Wireshark
Windows Basic Networking
Linux
Linux Basic Networking
Basics of CLI, Services in Kali (SSH) and how to change your motd (Banner)
Spawn a TTY/Pseudo Shell
Network Storage
Routing and Switching
350-401 ENCOR: Implementing Cisco Enterprise Network Core Technologies
OSPF
NTP Security
Tune & Optimize EtherChannel Operations
300-410 ENARSI: Implementing Cisco Enterprise Advanced Routing and Services
300-415 ENSDWI: Implementing Cisco SD-WAN Solutions
Code
Bash
1.
wip-W1nn13PwnWifi.sh
2.
Basic Examples of Bash Scripting
3.
Check for live hosts in a /24 network
Python
Language Fundamental Series
1.
AutoBlue-MS17-010 pip2.7 install -r requirements setuptools 'Command errored out with exit status 1'
2.
How to install python2.7 in kali 5.10.0-kali6-amd64
3.
Python 2 vs Python 3
1.
Python2and3code.py
Scripts:
1.
****
forloop.py
2.
BackdoorClient.py
3.
BackdoorServer.py
4.
PortScanner.py
5.
TcpClient.py
6.
TcpServer.py
7.
HttpGo-Getter.py
8.
HttpEnum-Client.py
****
Powershell
:
LinkedIn
-
Github
-
Home
What is NEXT?!
Previous
todo•SEC Home
Next - Cloud and Networked Systems
Cloud and Networked Systems Topics
Last modified
1yr ago