Table of contents Cyber Security Guide Recon Passive Recon Using Search Engines Researching People DNS Recon Active Recon Enumerating Services Port Scanning Enumeration CheatSheet Using NetCat Finding Vulnerabilities Manual Testing and Analysis Initial Scanning Port Knocking Automated Testing Exploitation Exploitation Cheat Sheet Exploit Development Stack Buffer Overflows Web Application Enumerating Content Common Web Services Server Side Vulnerabilities Command Injection File Inclusion IP Access Controls PHP Bypass Tips XXE Injection SQL Injection SQL Injection Cheat Sheet NoSQL injection Uploading Web Shells Client Side Vulnerabilities Broken Authentication CSRF XSS - Cross Site Scripting OWASP Top 10 Remote Services SMB - Ports 139,445 Other Escaping Sandboxes Phishing Privilege Escalation Linux Privilege Escalation Windows Privilege Escalation Post Exploitation Windows Linux Persistence Covering Your Tracks Password Related Attacks Generating Custom Password Lists Offline Attacks Online Attacks Pass the Hash Attacks Other Resources