Logo
KCN

Kaldei's Cybersecurity Notes

1 – Enumeration

Enumeration step – a note for enumerating hosts, ports, subdomains, web paths, users, ...

2 – Vulns Assessment

Vulnerability Assessment step – a note for finding and assessing vulnerabilities.

3 - Buffer Overflow

Gaining Access step – a note for Buffer Overflows.

3 - Windows Domain Exploitation

Gaining Access step – a note for attacking Windows Domain.

3 – Brute Force

Gaining Access step – a note for brute forcing passwords, login pages, archives, ...

3 – Reverse Shell

Gaining Access step – a note for obtaining a reverse shell on the target.

4 – Foothold

Foothold step – a note for confirming foothold and adding a little persistence.

5 – Privesc Linux

Privilege Escalation step – a note for elevating privileges on a Linux machine.

5 – Privesc Windows

Privilege Escalation step – a note for elevating privileges on a Windows machine.

5 – Privesc Windows Domain

Privilege Escalation step – a note for elevating privileges on a Windows Domain.