Permalink
Switch branches/tags
Nothing to show
Find file Copy path
8d3ec32 Aug 1, 2018
1 contributor

Users who have contributed to this file

117 lines (75 sloc) 4.38 KB

Welcome to Ptest Method's documentation!

This Repo will be my knowledge database about Pentesting skills. It has been inspired by https://bitvijays.github.io And some of the content will be the same as a starting point.

Always keep in mind when you have a problem just launch a search over internet about it, 99 % of the time the comunity already sollved this issue.

The Essentials Series

The Essentials Series covers the essential concepts/ skills for somebody who wants to enter the field of CyberSecurity.

.. toctree::
   :maxdepth: 2
   :caption: The Essentials

   LFF-ESS-P0A-CyberSecurityEnterprise
   LFF-ESS-P0B-LinuxEssentials


Infrastructure Pentest Series

The Infrastructure Pentest Series cover all the phases of Infrastructure Pentest as described by The Penetration Testing Execution Standard.

.. toctree::
   :maxdepth: 2
   :caption: Pentest Stages

   LFF-IPS-P1-IntelligenceGathering
   LFF-IPS-P2-VulnerabilityAnalysis
   LFF-IPS-P3-Exploitation
   LFF-IPS-P4-PostExploitation
   LFF-IPS-P5-Reporting
   LFF-IPS-P6-ConfigurationReview
   LFFWirelessPentesting


Hardening Series

The Hardening Series cover all the procedures needed to be more secure.
.. toctree::
   :maxdepth: 2
   :caption: Hardening

   LFFSecuringDebian


Metasploit Documentation

Here you will find the documentation of some tools.

.. toctree::
   :maxdepth: 2
   :caption: Metasploit Fundamentals

   MetasploitFundamentals


Other Tools

.. toctree::
   :maxdepth: 2
   :caption: Other Tools

   pupy
   cme

Obligatory Disclaimer

This blog is purely intended for educational purposes. We do not want anyone to use this information (or any information on this blog) to hack into computers where they do not have permission for or do other illegal things. Therefore we don't want to be held responsible for the acts of other people who took parts of this document and used it for illegal purposes. If you don’t agree, we kindly ask you to leave this website.

Indices and tables