Passion
  • What is this GitBook about ?
  • Privilege Escalation
    • Linux
    • Windows
  • Network Security
    • Port Scanning
    • DNS Enumeration
    • FTP Enumeration
    • SSH Enumeration
    • SMB Enumeration
    • SMTP Enumeration
    • POP3 Enumeration
  • Checklists
    • Active Directory Security
    • OS Command Injection
    • Buffer Overflow
    • Broken Access Control
    • Local File Inclusion
    • SSRF
    • XXE Attacks
    • SQL Injection
    • XSS
  • WebApp Security
    • Local File Inclusion
    • File Upload Attacks
      • IIS Server File Upload
      • Escaping Sandbox via File Upload
    • Broken Access Control
      • Vertical PrivEsc
      • Horizontal PrivEsc
      • Horizontal => Vertical
    • OS Command Injection
    • SSTI
      • Finding the Injection Point
      • Indentification
      • Exploitation
    • XXE Attacks
      • XXE to LFI
      • XXE to SSRF
      • XXE via File upload
      • XInclude Attacks
      • Blind XXE Attacks
        • Identification
        • Exploitation
        • Blind XXE to LFI
        • Blind XXE by defining Local DTD
    • SQL Injection
    • Server Side Request Forgery
      • Various Attack Methods
      • Exploiting Blind SSRF
    • OAuth Attacks
      • In Password-Based Logins
    • XSS
      • Reflected XSS
      • Stored XSS
      • DOM XSS
      • Blind XSS
      • Perfecting our Payload
      • Exploiting Blind XSS
  • WebApp Mitigations
    • SSTI
  • Docker Security
    • Configuration
    • Ngnix Deployment
  • ☁️Cloud Security
    • AWS
      • Cloud Breach S3
      • IAM PrivEsc - RollBack
      • IAM PrivEsc - Attachment
Powered by GitBook
On this page
  • Pre-requisites
  • Wanna connect . . . . ?

What is this GitBook about ?

This is my Contribution to the Infosec Community :)

NextLinux

Last updated 1 year ago

This is my publicly accessible personal notes and it's all about how to enter into the world of Ethical Hacking and Penetration Testing from a N00b to an Intermediate level !

  • This is my way of experimenting things

By breaking, investigating, rehashing and taking notes

Although these methodologies are already discovered by many top notch cybersecurity researchers, I don't guarantee their proprietorship

Pre-requisites

An Intermediate Knowledge on how penetration testing works.
Low level and High level Programming and any scripting languages.
Usage of Kali linux or Parrot OS and thier wide variety of tools.
Both the linux terminal and the command prompt.
Networking Conceptuals.
And We are all SET !!!

Wanna connect . . . . ?

  • Instagram - d0pt3x

  • LinkedIn -

  • Twitter - AkashNxg

  • Discord - d0pt3x (#9149)

  • Mail - d0pt3x@proton.me

Akash Kannan