The Magic of Learning ##################### **Hey there!** Few years back, when we started our journey in Infosec, we didn't had proper guidance. At that point of time, we decided to share our knowledge gathered during this journey with the community. The blog entries below can be seen as reading material for anyone starting in the InfoSec Community or even a one-stop-reference for a seasoned InfoSec person. Currently, **five series** have been published: - **The Essentials** that covers the essential concepts/skills for somebody who wants to enter the field of CyberSecurity such as Cybersecurity in an Enterprise, Linux Basics, cloud, opensource and secure software development concepts. - **Infrastructure Pentest** that covers all the phases of Infrastructure Pentest as described by `The Penetration Testing Execution Standard `_ such as Intelligence Gathering, Vulnerability Analysis, Exploitation, Post Exploitation, Reporting and Configuration Review. - **Vulnerable Machines**: Knowledge gained by solving/reading write-ups of vulnerable machines provided by `VulnHub `_, `Hack the Box `_ and others. - **Capture the flag** covers what we have learned by solving Capture the flag (CTF) challenges such as Binary Exploitation and Forensics. - **Critical Infrastructure** covers the concepts required to Pentest or Secure a Electrical Grid. Want to provide us some feedback? Write it down at :doc:`Feedback ` page! .. toctree:: :maxdepth: 1 :caption: The Essentials Series_The_Essentials/LFF-ESS-P0A-CyberSecurityEnterprise Series_The_Essentials/LFF-ESS-P0B-LinuxEssentials Series_The_Essentials/LFF-ESS-P0C-CloudEssentials Series_The_Essentials/LFF-ESS-P0E-OpenSource Series_The_Essentials/LFF-ESS-P0D-SecureSoftware .. toctree:: :maxdepth: 1 :caption: Infrastructure Pentest Series_Infrastructure_Pentest/LFF-IPS-P1-IntelligenceGathering Series_Infrastructure_Pentest/LFF-IPS-P2-VulnerabilityAnalysis Series_Infrastructure_Pentest/LFF-IPS-P3-Exploitation Series_Infrastructure_Pentest/LFF-IPS-P4-PostExploitation Series_Infrastructure_Pentest/LFF-IPS-P5-Reporting Series_Infrastructure_Pentest/LFF-IPS-P6-ConfigurationReview .. toctree:: :maxdepth: 1 :caption: Vulnerable Machines Series_Vulnerable_Machines/LFC-VM-P0-InitialRecon Series_Vulnerable_Machines/LFC-VM-P1-FromNothingToUnprivilegedShell Series_Vulnerable_Machines/LFC-VM-P2-UnprivilegedToPrivilegedShell Series_Vulnerable_Machines/LFC-VM-P3-TipsAndTricks Series_Vulnerable_Machines/LFC-VM-P4-Appendix .. toctree:: :maxdepth: 1 :caption: CTF - Challenges Series_Capture_The_Flag/LFC-BinaryExploitation Series_Capture_The_Flag/LFC-Forensics Series_Capture_The_Flag/LFC-ReverseEngineering Series_Capture_The_Flag/LFC-Cryptography Series_Capture_The_Flag/LFC-CodingQuickRef .. toctree:: :maxdepth: 1 :caption: Critical Infrastructure Series_Critical_Infrastructure/LFF-CIS-IndustrialControlSystems Series_Critical_Infrastructure/LFF-CIS-ElectricalGrid .. .. toctree:: .. :maxdepth: 1 .. :caption: Home Lab - Smart City .. Series_Home_Lab_Smart_City/LFF-HLSC-Cloud-Tier .. Series_Home_Lab_Smart_City/LFF-HLSC-Edge-Tier .. Series_Home_Lab_Smart_City/LFF-HLSC-Applications ####################################### Contributors, Blog Archive and About Me ####################################### This is an open source effort by the community for the community. If you have found any error, want to add extra information or contribute in another way. You are a free and encouraged to do so, you can send a pull request on GitHub. - :doc:`Contributors ` - :doc:`Blog Archive ` - :doc:`About Me ` ##################### Obligatory Disclaimer ##################### This blog is purely intended for educational purposes. We do not want anyone to use this information (or any information on this blog) to hack into computers where they do not have permission for or do other illegal things. Therefore we don't want to be held responsible for the acts of other people who took parts of this document and used it for illegal purposes. If you don’t agree, we kindly ask you to leave this website.