Hey folks, I stumbled upon this document within the public domain today, the Penetration Tester's Survival Guide. This will help penetration testers during offensive security engagements and certification preparation (ie. CEH, OSCP).
I did not contribute to the writing of this guide.
Download: https://nofile.io/f/ZjOqK6KD7us/Penteste...-Guide.pdf
Table of Contents:
Enjoy.
I did not contribute to the writing of this guide.
Download: https://nofile.io/f/ZjOqK6KD7us/Penteste...-Guide.pdf
Table of Contents:
- Kali Linux
- Information Gathering & Vulnerability Scanning
- Passive Information Gathering
- Active Information Gathering
- Port Scanning
- Enumeration
- HTTP Enumeration
- Passive Information Gathering
- Buffer Overflows and Exploits
- Shells
- File Transfers
- Privilege Escalation
- Linux Privilege Escalation
- Windows Privilege Escalation
- Linux Privilege Escalation
- Client, Web and Password Attacks
- Client Attacks
- Web Attacks
- File Inclusion Vulnerabilities LFI/RFI
- Database Vulnerabilities
- Password Attacks
- Password Hash Attacks
- Client Attacks
- Networking, Pivoting and Tunneling
- The Metasploit Framework
- Bypassing Antivirus Software