The Magic of Learning
#####################
**Hey there!** Few years back, when we started our journey in Infosec, we didn't had proper guidance. At that point of time, we decided to share our knowledge gathered during this journey with the community. The blog entries below can be seen as reading material for anyone starting in the InfoSec Community or even a one-stop-reference for a seasoned InfoSec person.
Currently, **five series** have been published:
- **The Essentials** that covers the essential concepts/skills for somebody who wants to enter the field of CyberSecurity such as Cybersecurity in an Enterprise, Linux Basics, cloud, opensource and secure software development concepts.
- **Infrastructure Pentest** that covers all the phases of Infrastructure Pentest as described by `The Penetration Testing Execution Standard `_ such as Intelligence Gathering, Vulnerability Analysis, Exploitation, Post Exploitation, Reporting and Configuration Review.
- **Vulnerable Machines**: Knowledge gained by solving/reading write-ups of vulnerable machines provided by `VulnHub `_, `Hack the Box `_ and others.
- **Capture the flag** covers what we have learned by solving Capture the flag (CTF) challenges such as Binary Exploitation and Forensics.
- **Critical Infrastructure** covers the concepts required to Pentest or Secure a Electrical Grid.
Want to provide us some feedback? Write it down at :doc:`Feedback ` page!
.. toctree::
:maxdepth: 1
:caption: The Essentials
Series_The_Essentials/LFF-ESS-P0A-CyberSecurityEnterprise
Series_The_Essentials/LFF-ESS-P0B-LinuxEssentials
Series_The_Essentials/LFF-ESS-P0C-CloudEssentials
Series_The_Essentials/LFF-ESS-P0E-OpenSource
Series_The_Essentials/LFF-ESS-P0D-SecureSoftware
.. toctree::
:maxdepth: 1
:caption: Infrastructure Pentest
Series_Infrastructure_Pentest/LFF-IPS-P1-IntelligenceGathering
Series_Infrastructure_Pentest/LFF-IPS-P2-VulnerabilityAnalysis
Series_Infrastructure_Pentest/LFF-IPS-P3-Exploitation
Series_Infrastructure_Pentest/LFF-IPS-P4-PostExploitation
Series_Infrastructure_Pentest/LFF-IPS-P5-Reporting
Series_Infrastructure_Pentest/LFF-IPS-P6-ConfigurationReview
.. toctree::
:maxdepth: 1
:caption: Vulnerable Machines
Series_Vulnerable_Machines/LFC-VM-P0-InitialRecon
Series_Vulnerable_Machines/LFC-VM-P1-FromNothingToUnprivilegedShell
Series_Vulnerable_Machines/LFC-VM-P2-UnprivilegedToPrivilegedShell
Series_Vulnerable_Machines/LFC-VM-P3-TipsAndTricks
Series_Vulnerable_Machines/LFC-VM-P4-Appendix
.. toctree::
:maxdepth: 1
:caption: CTF - Challenges
Series_Capture_The_Flag/LFC-BinaryExploitation
Series_Capture_The_Flag/LFC-Forensics
Series_Capture_The_Flag/LFC-ReverseEngineering
Series_Capture_The_Flag/LFC-Cryptography
Series_Capture_The_Flag/LFC-CodingQuickRef
.. toctree::
:maxdepth: 1
:caption: Critical Infrastructure
Series_Critical_Infrastructure/LFF-CIS-IndustrialControlSystems
Series_Critical_Infrastructure/LFF-CIS-ElectricalGrid
.. .. toctree::
.. :maxdepth: 1
.. :caption: Home Lab - Smart City
.. Series_Home_Lab_Smart_City/LFF-HLSC-Cloud-Tier
.. Series_Home_Lab_Smart_City/LFF-HLSC-Edge-Tier
.. Series_Home_Lab_Smart_City/LFF-HLSC-Applications
#######################################
Contributors, Blog Archive and About Me
#######################################
This is an open source effort by the community for the community. If you have found any error, want to add extra information or contribute in another way. You are a free and encouraged to do so, you can send a pull request on GitHub.
- :doc:`Contributors `
- :doc:`Blog Archive `
- :doc:`About Me `
#####################
Obligatory Disclaimer
#####################
This blog is purely intended for educational purposes. We do not want anyone to use this information (or any information on this blog) to hack into computers where they do not have permission for or do other illegal things. Therefore we don't want to be held responsible for the acts of other people who took parts of this document and used it for illegal purposes. If you don’t agree, we kindly ask you to leave this website.