Skip to content

Jarrettgohxz/penetration-testing-ethical-hacking-concepts-gitbook-notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Introduction

Hello readers!

This Gitbook document summarizes my findings and learnings on various offensive security concepts, such as penetration testing, ethical hacking and red teaming, based on my knowledge and research. While I strive for accuracy, some notes may be incomplete or incorrect. I'm continuously updating and refining the content as I learn and gain new insights.

If you notice any mistakes or have suggestions for improvement, feel free to contact me at jarrettgxz.sec@gmail.com. Your feedback is greatly appreciated, thank you!

Without further ado, let's hack away!

GitHub stars

Important notice

  1. You may notice that there are some empty pages/sub-pages with only a title. These pages are simply a work-in-progress, and functions as a way for me to remind myself on pending topics for research and experiments in the future.
  2. The content present in this documentation is based on my understanding and research on that particular topic. Thus, some of the newly added content may not be entirely accurate, and will be refined over time as I experiment more on it.

Note on shell prompt convention

The $ symbol will be used to indicate a shell prompt (defaulting to Bash). Some commands may require root privileges via the sudo command. However, this documentation will not explicitly specify when sudo is required — it should be prepended where necessary.

Note on use of generative AI

This document was supported by OpenAI's ChatGPT, which was used to generate ideas, provide validation, and clarify technical concepts.

However, most of the core theories and principles discussed in this documentation were developed and tested by me, based on research and experimentation conducted to the best of my abilities.

I have received my inspiration and knowledge hugely from the content provided by the following sources:

  1. Hacktricks

{% embed url="https://book.hacktricks.xyz/" %}

  1. TryHackMe

{% embed url="https://tryhackme.com" %}

Shell prompt convention

The $ symbol will be used to indicate a shell prompt (defaulting to Bash). Some commands may require root privileges via the sudo command. However, this documentation will not explicitly specify when sudo is required — it should be prepended where necessary.