Hacker Kayra
search
⌘Ctrlk
Hacker Kayra
  • πŸ“Introduction Page
  • ⭐Learning Process
  • πŸ” Fundamentals
  • 🧰Tools
  • ✍️Write Ups
  • πŸ“šStudy Notes
  • πŸ§‘β€πŸ’»Other
  • πŸ—„οΈArchive/Backup/Bin
    • Sysmon Usecases (IBM)
    • 🐧Linux Fundamentals (TryHackMe)
    • πŸͺŸWindows Fundamentals (TryHackMe)
    • Active Directory (TryHackMe)
    • FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
    • Certified Threat Hunting Professional (eCTHPv2)
    • OSCP
      • Report Writing
      • βœ…Passive Information Gathering
      • βœ…Active Information Gathering
      • βœ…Vulnerability Scanning
      • Introduction to Web Application Attacks
      • Common Web Application Attacks
      • βœ…Locating Public Exploits
      • βœ…Exploiting Walkthrough
      • Fixing Exploits
      • βœ…Antivirus Evasion
      • Password Attacks
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • Port Redirection and SSH Tunneling
      • Tunneling Through Deep Packet Inspection
      • The Metasploit Framework
      • Active Directory Introduction & Enumeration
      • Attacking Active Directory Authentication
      • Lateral Movement in Active Directory
      • Assembling the Pieces
      • Other General Information
    • ⚑Port Swigger (Web Penetration Testing)
    • Certified Bug Bounty Hunter (CBBH)
    • Getting Started
    • file-certificateCertified Penetration Testing Specialist (CPTS)
    • Old Active Directory
    • Tib3rius Privilege Escalation
    • HTB Archived Write-Ups (Check)
    • πŸ“‹Cheat Sheets
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ—„οΈArchive/Backup/Bin

OSCP

This is my notes for the OSCP based on the original PEN-200 OSCP Course

Report Writingchevron-rightβœ…Passive Information Gatheringchevron-rightβœ…Active Information Gatheringchevron-rightβœ…Vulnerability Scanningchevron-rightIntroduction to Web Application Attackschevron-rightCommon Web Application Attackschevron-rightβœ…Locating Public Exploitschevron-rightβœ…Exploiting Walkthroughchevron-rightFixing Exploitschevron-rightβœ…Antivirus Evasionchevron-rightPassword Attackschevron-rightWindows Privilege Escalationchevron-rightLinux Privilege Escalationchevron-rightPort Redirection and SSH Tunnelingchevron-rightTunneling Through Deep Packet Inspectionchevron-rightThe Metasploit Frameworkchevron-rightActive Directory Introduction & Enumerationchevron-rightAttacking Active Directory Authenticationchevron-rightLateral Movement in Active Directorychevron-rightAssembling the Pieceschevron-rightOther General Informationchevron-right
PreviousEvent IDs, Logging, & SIEMschevron-leftNextReport Writingchevron-right

Last updated 11 months ago