Welcome to Ptest Method’s documentation!

This Repo will be my knowledge database about Pentesting skills. It has been inspired by https://bitvijays.github.io And some of the content will be the same as a starting point.

Always keep in mind when you have a problem just launch a search over internet about it, 99 % of the time the comunity already sollved this issue.

The Essentials Series

The Essentials Series covers the essential concepts/ skills for somebody who wants to enter the field of CyberSecurity.

  • CyberSecurity in an Enterprise : IT Technical challenges faced by a company during their transformation from a start-up of two people growing to Micro, Small, Medium-sized, larger size company and their solutions.
  • Linux Basics : Essential linux commands and concepts required in the Infosec field.

Infrastructure Pentest Series

The Infrastructure Pentest Series cover all the phases of Infrastructure Pentest as described by The Penetration Testing Execution Standard.

  • Intelligence Gathering : Technical steps to perform during the information gathering phase of an organization and figuring out the attack-surface area.
  • Vulnerability Analysis : Exploring different services running on different ports of a machine by utilizing metasploit-fu, nmap or other tools.
  • Exploitation : Enumeration methods that can be used after compromising a domain user credentials and Remote code execution methods after compromising administrative credentials.
  • Post Exploitation : Different methods to gather credentials after getting an administrative remote shell. Also, performing post-exploitation to leave high-impact to C-Level executives is also covered in this section.
  • Reporting : Open-source ways to automate report writing after a successfull Pentest.
  • Configuration Review : Methods to perform configuration review for the switches, routers, firewall and endpoint devices.

Pentest Stages

Hardening Series

The Hardening Series cover all the procedures needed to be more secure.
  • Securing Debian : Technical steps to harden Debian systems.

Metasploit Documentation

Here you will find the documentation of some tools.

Obligatory Disclaimer

This blog is purely intended for educational purposes. We do not want anyone to use this information (or any information on this blog) to hack into computers where they do not have permission for or do other illegal things. Therefore we don’t want to be held responsible for the acts of other people who took parts of this document and used it for illegal purposes. If you don’t agree, we kindly ask you to leave this website.

Indices and tables