KillChain Compendium: PenTest & Security Handbook
Go to file
whackx 1bd88497c1 added information 2023-08-13 22:57:52 +02:00
Cryptography bump 2023-07-01 11:38:51 +02:00
Enumeration added information 2023-08-13 22:57:52 +02:00
Exfiltration Clean up 2023-07-22 22:14:02 +02:00
Exploits a few words 2023-08-12 23:47:12 +02:00
Forensics bump 2023-04-17 22:49:17 +02:00
Miscellaneous fixed url 2023-07-25 22:09:46 +02:00
Open Source Intelligence some additions 2023-07-18 21:47:40 +02:00
Persistence clean up 2023-07-22 22:05:04 +02:00
Post Exploitation clean up and rewrite 2023-08-09 21:50:10 +02:00
Reverse Engineering bump 2023-05-28 14:22:59 +02:00
Reverse Shells bump 2023-04-17 22:49:17 +02:00
Steganography
README.md readme 2023-08-11 17:48:59 +02:00

README.md

KillChain Compendium - A Concise Security Handbook

The "KillChain Compendium" is a steadily growing, organized collection of in-depth resources, insights, and practical guidance, structured within the framework of the Kill Chain methodology. It serves as a comprehensive reference manual, offering knowledge and strategies for navigating the world of hacking, penetration testing, and cybersecurity. Whether you're an aspiring hacker, a seasoned security professional, or anyone seeking to delve into the intricacies of securing digital systems, the "KillChain Compendium" provides insights into each stage of the cyber kill chain while offering notes, actionable advice and real-world examples to bolster your understanding and capabilities in this complex field.

Penetration Testing

Penetration testing, often referred to as pen testing, is a systematic and controlled process of evaluating the security of computer systems, networks, applications, and environments. The primary objective of penetration testing is to identify vulnerabilities and weaknesses that could potentially be exploited by malicious actors.

Pentetration Testing Standards

Pen Testi Campaign

  • Checklist

  • vectr.io

  • Engagement --> Concept of Operations (CONOPS), Resource and Personnel Requirements, Timelines

  • Operations --> Operators, Known Information, Responsibilities

  • Mission --> Exact commands to run and execution time of the engagement

  • Remediation --> Report, Remediation consultation

Methodology

  • Steps
    • Reconnaissance
    • Enumeration/Scanning
    • Gaining Access
    • Privilege Escalation
    • Covering Tracks
    • Reporting

Reconnaissance

  • Duck / SearX / metacrawler / google
  • Wikipedia
  • Shodan.io
  • PeopleFinder.com
  • who.is
  • sublist3r
  • hunter.io
  • builtwith.com
  • wappalyzer

Enumeration

  • nmap
  • nikto
  • gobuster
  • dirbuster
  • metasploit
  • enum4linux / linpeas / winpeas / linenum

Exploitation

Post Exploitation

  • Pivoting

Privilege Escalation

  • Vertically or horizontally

Covering Tracks

Reporting

  • Includes
    • Vulnerabilities
    • Criticality
    • Description
    • Countermeasures
    • Finding summary

Frameworks