TAKE ME BACK
NETWORKING FUNDAMENTALS
NETWORKING FUNDAMENTALS
OSI MODEL Layers
MORE NETWORKING
NETWORK DEVICES
Data Packets & PROTOCOLS
MORE PROTOCOLS
TCP-IP Suite
TCP and UDP
SMB(Samba),NetBIOS and NTLM
SNMP
SSH
CODING
HTML
Introduction
A Simple HTML Document
The Basics
Attributes
Headings
LINUX COMMANDS
Introduction To Linux
Linux Directory Structure (File System Structure)
Linux Commands You Should Know
Linux File,Directory Permissions
CTFs
OverTheWire Bandits
NETWORK FOOTPRINTING
Introduction to Network footprinting
Setting up Pentest lab
Metasploitable Details
Nslookup tool
NMAP
Wireshark And Nmap
Zenmap [Nmap GUI]
The Hacking Methodology
Vulnerability Analysis
Banner Grabbing
Nmap NSE Scripts
Nmap Advance Scans
ENUMERATION
Scanning
Enumeration & SNMP
NetBIOS Enumeration
SSH Enumeration
EXPLLOITATION
Metasploit
Compromising SSH keys using telnet
Discover open ports and associated services in Windows
MS Windows File System Structure
WEB
Internet Vs WWW & Ownership
Domain Name Service (DNS)
How DNS Works?
DNS Components
Zones And Records
DNSSEC,DOH,DOT
Wireshark & DNS
HTTP
HTTP Headers
More HTTP - Cookies,Proxy,Auth
Wireshark & HTTP
WebGoat
HTTP Basics
HTTP Proxies & OWASP ZAP
Browser Developer Tools
CIA & Encoding
Cryptography
More Resources
NOTE:
These Notes are based on Information I gathered from:
Internet,Wikipedia,Books & Youtube.
If you feel that I've used your material and you deserve a credit. Please open an Issue on github. I'll be happy to add your name in the credits.