Cyberclopaedia
❱
License
Contributing
Reconnaissance
❱
Enumeration
❱
Port Scanning
❱
SYN Scan
Operation Security (OpSec)
TCP Connect Scan
FIN, NULL & XMAS Scans
Vulnerability Scanning
❱
Nmap Scripting Engine (NSE)
LDAP Enumeration (389, 636, 3268, 3269)
DNS Server Enumeration (53)
FTP Enumeration (21)
SNMP Enumeration (161)
Web Server Enumeration (80, 443)
Open-Source Intelligence (OSINT)
❱
Instagram User Enumeration
Harvesting E-Mails
Domain Name Enumeration
Whois Enumeration
Google Dorks
Subdomain Enumeration
Exploitation
❱
Windows
❱
SCF File Attacks
Web
❱
SQL Injection
❱
Union Injection
Database Enumeration
Directory Traversal
HTTP Parameter Pollution
File Inclusion
HTTP Response Splitting
File Upload
WebSockets
CRLF Injection
Template Injection
Cross-Site Request Forgery
Open Redirect
Host Header Injection
Command Injection
PHP Object Injection
Cross-Site Scripting (XSS)
DNS
❱
DNS Cache Poisoning
DNS Traffic Amplification
Binary Exploitation
❱
Stack Exploitation
❱
Return to _dl_resolve
Buffer Overflows
Return-oriented programming (ROP)
Protection Mechanisms
Sigreturn-oriented Programming (SROP)
Format String Vulnerabilities
Heap Exploitation
❱
Use After Free (UAF)
Post Exploitation
❱
Privilege Escalation
❱
Windows
❱
Misconfigured Services
❱
Insecure Service Permissions
Unquoted Service Paths
Weak Registry Permissions
Insecure Service Executable Permissions
Scheduled Tasks
AlwaysInstallElevated Group Policy
Bypassing UAC
Kernel Exploits
AutoRun Programmes
Token Impersonation
Stored Credentials
Startup Applications
Linux
❱
Abusing SUID & SGID Binaries
NFS Root Squashing
Kernel Exploits
Abusing Linux Capabilities
Sudo Escalation via LD_PRELOAD
Sudo Shell Escape Sequences
Pivoting
❱
Tunneling with Chisel
SSH Tunneling
Enumeration
❱
Windows
❱
System Enumeration
Linux
❱
Network Enumeration
Hunting Down Sensitive Files
System Enumeration
User Enumeration
Active Directory (AD)
❱
Domain Enumeration with PowerView
Domain Data Enumeration with Bloodhound
System Internals
❱
Windows
❱
Active Directory (AD)
❱
Schema
❱
Default Schema
❱
Users
Domain Controllers
Groups
Contacts
Computers
Attributes
Classes
Domain Controllers
The Directory Information Tree (DIT)
Naming Contexts
The Active Directory Hierarchy
File System
Linux
❱
File System
Processes
Command Line
Reverse Engineering
❱
Program Anatomy
❱
The Heap
Registers
The Stack
Instructions
Reverse Engineering with radare2
❱
Strings
Seeking
Flags
Binary Info
Analysis
Assembly Programming
❱
x86-64
❱
Variables
Addressing Modes
Registers
Instruction Set
Data Representation
Memory
Reverse Engineering with Ghidra
❱
Creating a Project and Loading a Binary
Initial Analysis
Binary Formats
❱
ELF
❱
Symbols
Relocations
Sections
Segments
The ELF Header
Dynamic Linking
PE
❱
NT Headers
The DOS Header
Relocations
Sections
The Rich Header
The DOS Stub
Reverse Engineering Android Applications
Basic Reverse Engineering using objdump, strace, and ltrace
Assembly
Hardware Hacking
❱
Wireless Attacks
❱
Deauth Attack
Hacking WPA Networks
Hacking WEP Networks
Cryptography
❱
Primitives
❱
Pseudorandom Generators (PRGs)
Pseudorandom Function Generators (PRFGs)
Pseudorandom Permutations (PRPs)
Hash Functions
❱
Merkle-Damgård Transform
Security Definitions
Davies-Meyer Transform
Birthday Attacks
Public-Key Cryptography
❱
Security Definitions
❱
Chosen-Plaintext Attack (CPA)
Perfect Secrecy
Mathematical Prerequisites
Key Management
❱
Key Exchange
❱
Security Definitions
Diffie-Hellman Key Exchange
Private-Key Cryptography
❱
Stream Ciphers
❱
Hardware-Oriented Stream Ciphers
❱
Grain-128a
One-Time Passwords
❱
HMAC-Based One-Time Passwords (HOTP)
Time-Based One-Time Passwords (TOTP)
Security Definitions
❱
Ciphertext-Only Attack (COA)
❱
Perfect Secrecy
Semantic Security
P vs NP
Chosen Ciphertext Attack (CCA)
Randomness
Chosen Plaintext Attack (CPA)
Ciphertext Integrity (CI)
Block Ciphers
❱
Modes of Operation
❱
Cipher Block Chaining (CBC) Mode
Counter (CTR) Mode
Electronic Cookbook (ECB) Mode
Padding Oracle Attack
Advanced Encryption Standard (AES)
Encrypting Non-Conforming Messages
Message Authentication Codes (MACs)
❱
Hash-Based MACs (HMAC)
Fixed-Length MACs
Authenticated Encryption
One-Time Pad
Integrity Verification
❱
Merkle Trees
Mathematical Prerequisites
Computer Science Prerequisites
Breaking Classical Cryptrography
Networking
❱
Application Layer Addressing
❱
Uniform Resource Locators (URLs)
❱
URL Encoding
Uniform Resource Names (URNs)
The TCP-IP Suite and the OSI Model
❱
(2) The Datalink Layer
(1) The Physical Layer
Protocols
❱
WLAN (IEEE 802.11)
❱
Management Frames
❱
Discovery Frames
Action Frames
Authentication Frames
Association Frames
Authentication & Association
WiFi Protected Access (WPA)
Control Frames
Data Frames
Encryption & Integrity
Domain Name System (DNS)
❱
DNS Protocol
The in-addr.arpa Domain
The Domain Name System
Internet Protocol (IP)
❱
Internet Protocol v4 (IPv4)
❱
Classful Addressing
Classless Inter-Domain Routing (CIDR)
Subnetting
IPv4 Datagrams
Internet Protocol v6 (IPv6)
Network Time Protocol (NTP)
File Transfer Protocol (FTP)
Ethernet (IEEE 802.3)
Leightweight Directory Access Protocol (LDAP)
Address Resolution Protocol (ARP)
Simple Network Management Protocol (SNMP)
Server Message Block (SMB)
Networks
VLANs
Network Address Translation (NAT)
Subnetting
Light
Rust
Coal
Navy
Ayu
The Cyberclopaedia