Skip to content

Latest commit

 

History

History
87 lines (68 loc) · 2.78 KB

README.md

File metadata and controls

87 lines (68 loc) · 2.78 KB

PTPv5 - eLearnSecurity

Mindmap/CheatSheet for eLearnSecurity-PTPv5

Table of Contents

System Security

This sections covers the basics of system architecture fundamentals needed to tackle/exploit system vulnerabilities like Buffer Overflows.

  • Architecture Fundamentals
  • Assembler, Debugger and Tools
  • Buffer Overflows
  • Shellcoding
  • Cryptography and Password-Cracking
  • Malware

Network Security

This section has the largest amount of content in the whole course. It covers network penetration testing methodology, Anonymity and Social Engineering.

  • Information Gathering
  • Scanning
  • Enumeration
  • Sniffing and MITM Attacks
  • Exploitation
  • Post-Exploitation
  • Not Included : Anonymity
  • Not Included : Social Engineering

Powershell for Pentester

This section covers the basics of Windows Powershell and the Offensive usage of Windows Powershell.

  • Introduction to Powershell
  • Powershell Fundamtentals
  • Offensive Powershell

Linux Exploitation

This section covers the methodology and techniques to exploiting a Linux-based system, ranging from Information Gathering to Post-Exploitation.

  • Introduction to Linux
  • Information Gathering
  • Remote Exploitation ( Exploitation over the Network )
  • Post-Exploitation

Web Application Security

This section covers the common vulnerabilities found in modern Web Application and how to exploit them.

  • Introduction to Web Application
  • Information Gathering
  • Cross-Site Scripting (XSS)
  • SQL Injection (SQLi)
  • Other common Web Attacks

Wifi Security

This section covers the basics of Wifi Security. Not tested in the exam.

  • Pre-requisites
  • Environment Setup
  • Wireless Standards
  • Wifi Network Discovery
  • Traffic Anaylsis
  • Attacking Wifi Networks
  • Using Wifi as attack vector

Ruby and Metasploit

This section covers the Ruby programming language that would be helpful in tackling Buffer Overflows. Lastly, it also covers a small portion related to Metasploit.

  • Installation and Fundamentals
  • Control Structures
  • Methods, Variables, Scope
  • Classes, Modules, Exceptions
  • Pentester pre-requisites
  • I/O Input/Output
  • Network and OS Interaction
  • The Web
  • Exploitation with Ruby
  • Metasploit