InfoSec
Directory map
Top-level notes
- Attacking DNS
- Attacking RDP
- Attacking SMB
- Cracking Protected Files and Archives
- Crawling
- Enumeration
- Laudanum
- robots.txt
- Shell Harnesses
- Shells and Payloads
- Well-Known URIs
Active Directory
File transfers
File inclusion
HTB
Linux
Pivoting, tunneling, and port forwarding
SQL
Vulnerabilities
Windows
- Windows Authentication Process
- ADDS
- Attacking Windows Credential Manager
- Windows Logon Types
- Pass the Certificate (PtC)
- Pass the Hash (PtH)
- Pass the Ticket (PtT)
XSS (Cross-Site Scripting)
- XSS — types, labs, phishing, discovery, defacing, session hijacking, prevention
- XSS phishing — fake login forms, credential capture
- XSS discovery — scanners, payloads, code review
- XSS defacing — stored XSS, visual takeover
- XSS session hijacking — blind XSS, cookie stealing
- XSS prevention — validation, encoding, CSP, headers