{"version":1,"pages":[{"id":"-M3hq3AnqmrZ496tLCWL","title":"Home","pathname":"/","siteSpaceId":"sitesp_kfGnU","description":"If you are here from the STL OWASP CTF, congrats on finding this page but there are no flags to be found here."},{"id":"-M6S0pQ21f-oi68S29oX","title":"Interesting Links","pathname":"/general/content-journal","siteSpaceId":"sitesp_kfGnU","description":"A log to keep track of media","breadcrumbs":[{"label":"General"}]},{"id":"-MG69855PQO973c-ZJ1O","title":"Curriculum","pathname":"/general/content-journal/curriculum","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"General"},{"label":"Interesting Links"}]},{"id":"-MEnR0uUK0Uj7Lln3JXE","title":"Pentest Labs, Wargames Sites","pathname":"/general/labs-wargames-ctf","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"General"}]},{"id":"-MF7kmBbYreqT5ZCeFHi","title":"How To Vulnhub with VirtualBox","pathname":"/general/labs-wargames-ctf/how-to-vulnhub-virtualbox","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"General"},{"label":"Pentest Labs, Wargames Sites"}]},{"id":"-M3lPPAMNKc5K5zS_nlX","title":"Courses","pathname":"/pentest/courses","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-M3lRkcRAdekpmb8WV4j","title":"TCM - Zero to Hero","pathname":"/pentest/courses/beginner-network-pentesting","siteSpaceId":"sitesp_kfGnU","description":"Beginner Network Pentesting","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"}]},{"id":"-MF86DcFrZs_A0fFx7_e","title":"Week 1: Setup","pathname":"/pentest/courses/beginner-network-pentesting/week-1","siteSpaceId":"sitesp_kfGnU","description":"Introduction, Notekeeping, and Introductory Linux","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MF86VRUcJW98Zk6QGfM","title":"ipsweep.sh","pathname":"/pentest/courses/beginner-network-pentesting/week-1/ipsweep.sh","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 1: Setup"}]},{"id":"-MF8ABXYuL1S26YHNdkQ","title":"Week 2: Python 101","pathname":"/pentest/courses/beginner-network-pentesting/week-2","siteSpaceId":"sitesp_kfGnU","description":"Introductory Python","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MF8AD_EFl5R0PiIQv_Y","title":"python101.py","pathname":"/pentest/courses/beginner-network-pentesting/week-2/untitled-1","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 2: Python 101"}]},{"id":"-MFILkWeHta2aKP-GPDZ","title":"bof.py","pathname":"/pentest/courses/beginner-network-pentesting/week-2/bof.py","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 2: Python 101"}]},{"id":"-MFILzgKrwMjCNM7ktCZ","title":"Week 3: Python 102","pathname":"/pentest/courses/beginner-network-pentesting/week-3-python-102","siteSpaceId":"sitesp_kfGnU","description":"Building a Terrible Port Scanner","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIMSPBWGH1euZEMmo8","title":"python102.py","pathname":"/pentest/courses/beginner-network-pentesting/week-3-python-102/python102.py","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 3: Python 102"}]},{"id":"-MFIMXV3gzSvHJtLFzrj","title":"scanner.py","pathname":"/pentest/courses/beginner-network-pentesting/week-3-python-102/scanner.py","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 3: Python 102"}]},{"id":"-MFIMkMg5ho_J2ylDg2A","title":"Week 4: Passive OSINT","pathname":"/pentest/courses/beginner-network-pentesting/week-4-passive-osint","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIMm6VhA-6622P89xH","title":"Week 5: Scanning Tools & Tactics","pathname":"/pentest/courses/beginner-network-pentesting/untitled-1","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIO1qRddYyBB3B_rG7","title":"nmap","pathname":"/pentest/courses/beginner-network-pentesting/untitled-1/nmap","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 5: Scanning Tools & Tactics"}]},{"id":"-MFIOZFASU-whq_qGXDH","title":"Nessus","pathname":"/pentest/courses/beginner-network-pentesting/untitled-1/nessus","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 5: Scanning Tools & Tactics"}]},{"id":"-MFIP6pzMnmgVN1OtB25","title":"msfconsole","pathname":"/pentest/courses/beginner-network-pentesting/untitled-1/msfconsole","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"},{"label":"Week 5: Scanning Tools & Tactics"}]},{"id":"-MFIPBQJt2F8ATKYxpif","title":"Week 6: Enumeration","pathname":"/pentest/courses/beginner-network-pentesting/week-6-enumeration","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIMnUL1zEKh6GdtXL7","title":"Week 7: Exploitation, Shells, and Some Credential Stuffing","pathname":"/pentest/courses/beginner-network-pentesting/untitled-2","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIMusmu7tvnh4ccDTc","title":"Week 8: LLMNR/NBT-NS Poisoning","pathname":"/pentest/courses/beginner-network-pentesting/untitled-3","siteSpaceId":"sitesp_kfGnU","description":"Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIY2WjPO_boddbEIdJ","title":"Week 9: NTLM","pathname":"/pentest/courses/beginner-network-pentesting/week-9","siteSpaceId":"sitesp_kfGnU","description":"NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFIMvIykDf3ZZcWFqDV","title":"Week 10: MS17-010, GPP/cPasswords, and Kerberoasting","pathname":"/pentest/courses/beginner-network-pentesting/untitled-4","siteSpaceId":"sitesp_kfGnU","description":"AD Exploitation Part 3","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MFJIuJ6voMKXLg8dEit","title":"Week 11: File Transfers, Pivoting, Reporting","pathname":"/pentest/courses/beginner-network-pentesting/week-11-file-transfers-pivoting-reporting","siteSpaceId":"sitesp_kfGnU","description":"File Transfers, Pivoting, Report Writing, and Career Advice","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MF86UlwFw91KMf-BIwc","title":"Commands","pathname":"/pentest/courses/beginner-network-pentesting/commands","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"},{"label":"TCM - Zero to Hero"}]},{"id":"-MG-T6SpZxSJ0jeQBPX1","title":"Penetration Testing Student (PTS)","pathname":"/pentest/courses/penetration-testing-student-pts","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"}]},{"id":"-M6SZAhxhTHfzBGBHRpq","title":"OSCP Study","pathname":"/pentest/courses/oscp-study","siteSpaceId":"sitesp_kfGnU","description":"Here are the resources my friend Chris found most useful for the OSCP exam","breadcrumbs":[{"label":"Network Pentest"},{"label":"Courses"}]},{"id":"-MFIJW9VbIArNR0xLiO4","title":"Recon","pathname":"/pentest/recon-osint","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MFIywbb9eRRbuN3TaJO","title":"OSINT","pathname":"/pentest/recon-osint/osint","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Recon"}]},{"id":"-MFIz-N5L-fKcSCpEQ8J","title":"Enumeration","pathname":"/pentest/enumeration","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MNRatGLG7ALbbGuoDs1","title":"Samba Shares","pathname":"/pentest/enumeration/samba-shares","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Enumeration"}]},{"id":"-MNResJo3R1G4s6ROgn_","title":"ProFtpd","pathname":"/pentest/enumeration/proftpd","siteSpaceId":"sitesp_kfGnU","description":"ProFtpd is a free and open-source FTP server, compatible with Unix and Windows systems. Its also been vulnerable in the past software versions.","breadcrumbs":[{"label":"Network Pentest"},{"label":"Enumeration"}]},{"id":"-MG5W1KhV20ltA0Adsbx","title":"Gaining Access","pathname":"/pentest/gaining-access","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MG5W5GPAk5wMqrMK9kV","title":"Reverse Shells","pathname":"/pentest/gaining-access/reverse-shells","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Gaining Access"}]},{"id":"-MF7v4AXN55ysBfkxS2v","title":"Privilege Escalation","pathname":"/pentest/privilege-escalation","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MIr6iGjoUTw-YMdyxF5","title":"Meterpreter","pathname":"/pentest/privilege-escalation/meterpreter","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-MG5VR0PWZCuH3cVfgtJ","title":"Spawning a TTY Shell","pathname":"/pentest/privilege-escalation/spawning-a-tty-shell","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-M6gB8ydE1QNy0V1OD3b","title":"Reverse Shell Cheat Sheet","pathname":"/pentest/privilege-escalation/untitled-2","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-M3lQdfGX298tObgpZSy","title":"Cracking Hashes","pathname":"/pentest/privilege-escalation/untitled-1","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-MF3JGESud1v3D9000TM","title":"Restricted Linux Shell Escape","pathname":"/pentest/privilege-escalation/restricted-linux-shell-escape","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-MEnQnB9r58c6WcGxNt0","title":"Linux Privilege Escalation","pathname":"/pentest/privilege-escalation/linux-privilege-escalation","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-MJxboV5nhXLJ7QJtSyR","title":"lxd","pathname":"/pentest/privilege-escalation/linux-privilege-escalation/lxd","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"-MIrJODozmKu4uNhMmQk","title":"sytemctl","pathname":"/pentest/privilege-escalation/linux-privilege-escalation/sytemctl","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"},{"label":"Linux Privilege Escalation"}]},{"id":"-MEnQu6zXuFJVMBAYzy_","title":"Windows Privilege Escalation","pathname":"/pentest/privilege-escalation/windows-privilege-escalation","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"}]},{"id":"-MFIgq88kGz6Z1kpKS77","title":"Active Directory","pathname":"/pentest/privilege-escalation/windows-privilege-escalation/active-directory","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"-MO9FY2P3nntrVLey2n1","title":"What is AD?","pathname":"/pentest/privilege-escalation/windows-privilege-escalation/active-directory/what-is-ad-links","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"},{"label":"Active Directory"}]},{"id":"-MF7hUsntquxRVVGRx0y","title":"User Enumeration","pathname":"/pentest/privilege-escalation/windows-privilege-escalation/user-enumeration","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Privilege Escalation"},{"label":"Windows Privilege Escalation"}]},{"id":"-MGEyU7W4ls2dirRgWCO","title":"Post Exploitation","pathname":"/pentest/post-exploitation","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MGGhFotqp71kpLA6ow8","title":"Cleanup","pathname":"/pentest/post-exploitation/cleanup","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Post Exploitation"}]},{"id":"-MGGh0yOk_4ypA4Xvq7O","title":"Maintaining Access","pathname":"/pentest/post-exploitation/maintaining-access","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Post Exploitation"}]},{"id":"-MGGh539dlOg47MAiW0V","title":"Pivoting","pathname":"/pentest/post-exploitation/pivoting","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Post Exploitation"}]},{"id":"-MGGgnwxckZuuQq22lXG","title":"File Transfers","pathname":"/pentest/post-exploitation/file-transfers","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Post Exploitation"}]},{"id":"-M4jkLX1RjEASlyUu9iA","title":"Covering Tracks","pathname":"/pentest/post-exploitation/5.-covering-tracks","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"},{"label":"Post Exploitation"}]},{"id":"-MF7tp64GSOuBgd1jCIU","title":"Vulnerabilities Checklist","pathname":"/pentest/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MGGhUzwXoiCil4D0nW3","title":"Report Writing","pathname":"/pentest/report-writing","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Pentest"}]},{"id":"-MLpjIySdaTFwEn4YlMd","title":"Tools","pathname":"/web-app-pentest/tools","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLo6ocWqJ6tQYLBIA4r","title":"Burp Suite","pathname":"/web-app-pentest/tools/burp-suite","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"Tools"}]},{"id":"-MF7wBn5Ed9cObY7jEUy","title":"THC-Hydra BruteForce","pathname":"/web-app-pentest/tools/thc-hydra-bruteforce","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"Tools"}]},{"id":"-MLpj3eshXvQshI1Ln4k","title":"Injection","pathname":"/web-app-pentest/injection","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-M6SPnNT0dQ6HABuq7n_","title":"SQL Injection","pathname":"/web-app-pentest/injection/sql-injection","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"Injection"}]},{"id":"-MLpmn-QZEK7ZgiV0Qdn","title":"Broken Authentication","pathname":"/web-app-pentest/broken-authentication","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLpnqSPuIXM_NwYQlX0","title":"Sensitive Data Exposure","pathname":"/web-app-pentest/sensitive-data-exposure","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLpoM--oYfLE35hq1oU","title":"SQLite3","pathname":"/web-app-pentest/sensitive-data-exposure/sqlite3","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"Sensitive Data Exposure"}]},{"id":"-MLpq-A1x8fr2QG_JiDN","title":"XML External Entity","pathname":"/web-app-pentest/xml-external-entity","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLpqFVn2WbLNt1mpRkv","title":"XML Background","pathname":"/web-app-pentest/xml-external-entity/xml-background","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"XML External Entity"}]},{"id":"-MLu-JbckC46dE62FgmM","title":"XPath Injection","pathname":"/web-app-pentest/xml-external-entity/xpath-injection","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"XML External Entity"}]},{"id":"-MLpu246tNoDXii-hHTH","title":"Broken Access Control","pathname":"/web-app-pentest/broken-access-control","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLpvDr12GqBpB-_aXR3","title":"Security Misconfiguration","pathname":"/web-app-pentest/security-misconfiguration","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLoVqV8L7n25LfCtcpE","title":"Upload/Download","pathname":"/web-app-pentest/upload-download","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MLoVtaxUiba3s7qN8RZ","title":"Download Bypass: Poison Null Byte","pathname":"/web-app-pentest/upload-download/error-only-.md-and-.pdf-files-are-allowed","siteSpaceId":"sitesp_kfGnU","description":"Error: Only .md and .pdf files are allowed!","breadcrumbs":[{"label":"Web App Pentest"},{"label":"Upload/Download"}]},{"id":"-MGJrGeNJPLIqoyNRcOz","title":"XSS","pathname":"/web-app-pentest/xss","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MGKrMeO0WC44NIPtv6Q","title":"DOMXSS","pathname":"/web-app-pentest/xss/domxss","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"XSS"}]},{"id":"-MLoahbqPmvLWtKKZZ0G","title":"Persistent XSS","pathname":"/web-app-pentest/xss/persistent-xss","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"XSS"}]},{"id":"-MLobh6DgyTwK2yXs2zJ","title":"Reflected (Client-side) XSS","pathname":"/web-app-pentest/xss/reflected-client-side-xss","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"XSS"}]},{"id":"-MGKJV-75FvOs0HcC2Mm","title":"Data URLs","pathname":"/web-app-pentest/xss/data-urls","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"},{"label":"XSS"}]},{"id":"-MLtXc0vXKtzikVo3GM0","title":"Insecure Deserialization","pathname":"/web-app-pentest/insecure-deserialization","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MMEPfMQpiGII7-P4Ur2","title":"Components with Known Vulnerabilities","pathname":"/web-app-pentest/components-with-known-vulnerabilities","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MMERs1SFL-TaXshoPNf","title":"Insufficient Logging and Monitoring","pathname":"/web-app-pentest/insufficient-logging-and-monitoring","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MOxbvmvJG58vBCyrp3M","title":"Server-Side Request Forgery (SSRF)","pathname":"/web-app-pentest/server-side-request-forgery-ssrf","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Web App Pentest"}]},{"id":"-MEnRnFlgX4AMo0eO5sZ","title":"Intro to CTF","pathname":"/ctf/ctf","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"CTF"}]},{"id":"-M7DUftfUyDj2I6Zkb0f","title":"Forensics","pathname":"/ctf/forensics","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"CTF"}]},{"id":"-MF84Jr6RrTPMuLzI80d","title":"Challenges","pathname":"/ctf/forensics/challenges","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"CTF"},{"label":"Forensics"}]},{"id":"-MEy7Htj9Q3r3WfQ4DnF","title":"Steganography","pathname":"/ctf/steganography","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"CTF"}]},{"id":"-MF82oO0jNa3tZE3wZ-a","title":"Reverse Engineering","pathname":"/ctf/reverse-engineering","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"CTF"}]},{"id":"-MEnUKV0y5laVf4PMyrC","title":"Tools","pathname":"/ctf/crypto","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"CTF"}]},{"id":"-MP2rQW1m5geKjWBLe0H","title":"Courses","pathname":"/network-security/courses","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"-MPv4Uo2qTscpD28J9K2","title":"Sec+","pathname":"/network-security/courses/sec+","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"}]},{"id":"-MP2rUb0I8I5axLCfK_K","title":"IBM Cybersecurity Analyst Professional Certificate","pathname":"/network-security/courses/ibm-cybersecurity-analyst-professional-certificate","siteSpaceId":"sitesp_kfGnU","description":"Coursera Courses | Note: These courses have a lot of spelling errors.","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"}]},{"id":"-M87m89f3mbqgYPEw4JC","title":"ISCI CNSS Course","pathname":"/network-security/courses/isci-cnss-course","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"}]},{"id":"-M7TyLTHxxZVD1wSuadc","title":"Introduction to Network Security","pathname":"/network-security/courses/isci-cnss-course/introduction","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M7TyfYgVKk6mUEovGAh","title":"Network Basics","pathname":"/network-security/courses/isci-cnss-course/introduction/network-basics","siteSpaceId":"sitesp_kfGnU","description":"A network is simply a way for machines / computers to communicate.","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M7TyfE3Swb6IPlnjS4u","title":"Basic Network Utilities","pathname":"/network-security/courses/isci-cnss-course/introduction/untitled-1","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M7TyfVdCjXNGXkzQDl7","title":"The OSI Model","pathname":"/network-security/courses/isci-cnss-course/introduction/untitled-2","siteSpaceId":"sitesp_kfGnU","description":"The Open Systems Interconnect (OSI) model describes how networks communicate.","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M87dCgOd_Bu3d5vblWy","title":"Threat Classification","pathname":"/network-security/courses/isci-cnss-course/introduction/threat-classification","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M87dSHaZbImUpRgVSy3","title":"Security Terminology","pathname":"/network-security/courses/isci-cnss-course/introduction/security-terminology","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M87dSm52MyIfHr1jWp_","title":"Approaches of Network Security","pathname":"/network-security/courses/isci-cnss-course/introduction/approaches-of-network-security","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M87dR6rl7mO5bn96DBQ","title":"Law and Network Security","pathname":"/network-security/courses/isci-cnss-course/introduction/law-and-network-security","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Introduction to Network Security"}]},{"id":"-M87m093LXpy1BHu9wRn","title":"Types of Attacks","pathname":"/network-security/courses/isci-cnss-course/types-of-attacks","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M87qKx6ydnzv479MUfj","title":"Denial of Service Attacks","pathname":"/network-security/courses/isci-cnss-course/types-of-attacks/denial-of-service-attacks","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Types of Attacks"}]},{"id":"-M87qW4GyQv8o-WfuW0Y","title":"Buffer Overflow Attacks","pathname":"/network-security/courses/isci-cnss-course/types-of-attacks/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Types of Attacks"}]},{"id":"-M87spfhdXS7yZe887-k","title":"IP Spoofing","pathname":"/network-security/courses/isci-cnss-course/types-of-attacks/ip-spoofing","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Types of Attacks"}]},{"id":"-M87tqbUmgeNrGEFvfYQ","title":"Session Hijacking","pathname":"/network-security/courses/isci-cnss-course/types-of-attacks/session-hijacking","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Types of Attacks"}]},{"id":"-M87m8gl7i4hhR4y2HxW","title":"Fundamentals of Firewalls","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M88Sw8IFZaa53RA2DmY","title":"What is a Firewall","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/what-is-a-firewall","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Firewalls"}]},{"id":"-M88SvlmTALgO_cHchRA","title":"Firewall Types","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/firewall-types","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Firewalls"}]},{"id":"-M88Sv6QABFmZkC3quVY","title":"Firewall Implementation","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/firewall-implementation","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Firewalls"}]},{"id":"-M88SsgpD1u2JZDEEYTe","title":"Proxy Servers","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/proxy-servers","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Firewalls"}]},{"id":"-M88SsKvKN04ZcwjToeQ","title":"Windows Firewalls","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/windows-firewalls","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Firewalls"}]},{"id":"-M87trIHsSjZbY_BfUqY","title":"Linux Firewalls","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-firewalls/linux-firewalls","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Firewalls"}]},{"id":"-M87m8dVEpDlIMvViNem","title":"Intrusion-Detection Systems","pathname":"/network-security/courses/isci-cnss-course/intrusion-detection-systems","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BM8euoLC-yLUa39z5","title":"IDS Concepts","pathname":"/network-security/courses/isci-cnss-course/intrusion-detection-systems/ids-concepts","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Intrusion-Detection Systems"}]},{"id":"-M8BM8VLI8fcgIOGRxTY","title":"Components and Processes of IDS","pathname":"/network-security/courses/isci-cnss-course/intrusion-detection-systems/components-and-processes-of-ids","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Intrusion-Detection Systems"}]},{"id":"-M8BM6EHiLcJy_tLcj_L","title":"Implementing IDS","pathname":"/network-security/courses/isci-cnss-course/intrusion-detection-systems/implementing-ids","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Intrusion-Detection Systems"}]},{"id":"-M8BM5ZpDUO4PNysdON4","title":"Honeypots","pathname":"/network-security/courses/isci-cnss-course/intrusion-detection-systems/honeypots","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Intrusion-Detection Systems"}]},{"id":"-M87m8aJ_sW2PXSuAm32","title":"Fundamentals of Encryption","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-encryption","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BMP9S9AEEaFbc6cka","title":"The History of Encryption","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-encryption/the-history-of-encryption","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Encryption"}]},{"id":"-M8BMOPBqrAo_abESGfE","title":"Modern Encryption Methods","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-encryption/modern-encryption-methods","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Encryption"}]},{"id":"-M8BMNlPbm5JBux7g4F8","title":"Windows and Linux Encryption","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-encryption/windows-and-linux-encryption","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Encryption"}]},{"id":"-M8BMNN8B3RPWEoAum4O","title":"Hashing","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-encryption/hashing","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Encryption"}]},{"id":"-M8BMMX8Wkh5XpWVft00","title":"Cracking Passwords","pathname":"/network-security/courses/isci-cnss-course/fundamentals-of-encryption/cracking-passwords","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Fundamentals of Encryption"}]},{"id":"-M87m8XmJxo2yvUcPX4q","title":"Virtual Private Networks (VPN)","pathname":"/network-security/courses/isci-cnss-course/virtual-private-networks-vpn","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BMiSrA0K5M4HZEeqY","title":"Introduction to VPN","pathname":"/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/introduction-to-vpn","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virtual Private Networks (VPN)"}]},{"id":"-M8BMhzqhjnIeP0PKBB4","title":"VPN Protocols","pathname":"/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/vpn-protocols","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virtual Private Networks (VPN)"}]},{"id":"-M8BMhICJeVDk59mh108","title":"IPSec","pathname":"/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/ipsec","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virtual Private Networks (VPN)"}]},{"id":"-M8BMgvBjOWg3_M6IL_Z","title":"SSL/TLS","pathname":"/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/ssl-tls","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virtual Private Networks (VPN)"}]},{"id":"-M8BMeooE0cimMLVGiq7","title":"VPN Solutions","pathname":"/network-security/courses/isci-cnss-course/virtual-private-networks-vpn/vpn-solutions","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virtual Private Networks (VPN)"}]},{"id":"-M87m8UBPZMHCFBEV0Tx","title":"Operating System Hardening","pathname":"/network-security/courses/isci-cnss-course/operating-system-hardening","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BMsj5BXQ02zlTArS_","title":"Configuring Windows","pathname":"/network-security/courses/isci-cnss-course/operating-system-hardening/configuring-windows","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Operating System Hardening"}]},{"id":"-M8BMxf0G3aOloZRAPxl","title":"Configuring Linux","pathname":"/network-security/courses/isci-cnss-course/operating-system-hardening/configuring-linux","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Operating System Hardening"}]},{"id":"-M8BMw62JN9Rc0DQJoEZ","title":"Operating System Patches","pathname":"/network-security/courses/isci-cnss-course/operating-system-hardening/operating-system-patches","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Operating System Hardening"}]},{"id":"-M87m8ROzIW0LNnnvZ7k","title":"Virus Attacks and How to Defend","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BNEE83o7LMnNeyKRc","title":"Virus Types and Attacks","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/virus-types-and-attacks","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virus Attacks and How to Defend"}]},{"id":"-M8BNDo30-cj_mQbdoqr","title":"Virus Scanners","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/virus-scanners","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virus Attacks and How to Defend"}]},{"id":"-M8BNFa6YUa6TlxiTyc3","title":"Antivirus","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/antivirus","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virus Attacks and How to Defend"}]},{"id":"-M8BNFGm95BLHF2BdQ9G","title":"Virus Infection and Identification","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/virus-infection-and-identification","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virus Attacks and How to Defend"}]},{"id":"-M8BNF4Zxxfzyb12K4m7","title":"Trojan Horses","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/trojan-horses","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virus Attacks and How to Defend"}]},{"id":"-M8BMvcSPlRLthpSjF-x","title":"Spyware or Adware","pathname":"/network-security/courses/isci-cnss-course/virus-attacks-and-how-to-defend/spyware-or-adware","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Virus Attacks and How to Defend"}]},{"id":"-M87m8NzB-urWr2-OXR5","title":"Security Policies","pathname":"/network-security/courses/isci-cnss-course/security-policies","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BNWAIOFZIdLScBA2x","title":"User Policies Definition","pathname":"/network-security/courses/isci-cnss-course/security-policies/user-policies-definition","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Policies"}]},{"id":"-M8BNVW_07cxgEL8H08i","title":"System Administration Policies","pathname":"/network-security/courses/isci-cnss-course/security-policies/system-administration-policies","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Policies"}]},{"id":"-M8BNSxeBHfgW5vVQch4","title":"Access Control","pathname":"/network-security/courses/isci-cnss-course/security-policies/access-control","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Policies"}]},{"id":"-M87m8KUDV1yH3E4TTfM","title":"Assessing System Security","pathname":"/network-security/courses/isci-cnss-course/assessing-system-security","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BNkwqfBBh9bXIDVO8","title":"Risk Assessment","pathname":"/network-security/courses/isci-cnss-course/assessing-system-security/risk-assessment","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Assessing System Security"}]},{"id":"-M8BNhPEza2FpjisPdIk","title":"Conducting an Initial Assessment","pathname":"/network-security/courses/isci-cnss-course/assessing-system-security/conducting-an-initial-assessment","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Assessing System Security"}]},{"id":"-M8BNhkrD2nSMt0TkaXp","title":"Probing the Network","pathname":"/network-security/courses/isci-cnss-course/assessing-system-security/probing-the-network","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Assessing System Security"}]},{"id":"-M8BNlAXKjmMu7ZqAkRi","title":"Vulnerabilities","pathname":"/network-security/courses/isci-cnss-course/assessing-system-security/vulnerabilities","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Assessing System Security"}]},{"id":"-M8BNfcS6gVXwODIKyGP","title":"Documenting Security","pathname":"/network-security/courses/isci-cnss-course/assessing-system-security/documenting-security","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Assessing System Security"}]},{"id":"-M87m8GA8ZCG3sRMpmOo","title":"Security Standards","pathname":"/network-security/courses/isci-cnss-course/security-standards","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BO1A2WhKJ6MNYvulD","title":"ISO Standards","pathname":"/network-security/courses/isci-cnss-course/security-standards/iso-standards","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Standards"}]},{"id":"-M8BO0-YisLI9lCA89zs","title":"NIST Standards","pathname":"/network-security/courses/isci-cnss-course/security-standards/nist-standards","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Standards"}]},{"id":"-M8BO-GUcVuGvOFaDPf4","title":"General Data Protection Regulation (GDPR)","pathname":"/network-security/courses/isci-cnss-course/security-standards/general-data-protection-regulation-gdpr","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Standards"}]},{"id":"-M8BNzXJ3QNN2EHlc8uC","title":"PCI DSS","pathname":"/network-security/courses/isci-cnss-course/security-standards/pci-dss","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Security Standards"}]},{"id":"-M87mUYi7DbNJ_R7lABQ","title":"Physical Security and Recovery","pathname":"/network-security/courses/isci-cnss-course/physical-security-and-recovery","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BOAaRd-UH3Y4I6QTp","title":"Physical Security","pathname":"/network-security/courses/isci-cnss-course/physical-security-and-recovery/physical-security","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Physical Security and Recovery"}]},{"id":"-M8BOCN8ST-DRZN_pZ9y","title":"Disaster Recovery","pathname":"/network-security/courses/isci-cnss-course/physical-security-and-recovery/disaster-recovery","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Physical Security and Recovery"}]},{"id":"-M8BOBS3srXKmG7TvRsa","title":"Fault Tolerance","pathname":"/network-security/courses/isci-cnss-course/physical-security-and-recovery/fault-tolerance","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Physical Security and Recovery"}]},{"id":"-M87mTy263aWOuz5kuKg","title":"Attackers Techniques","pathname":"/network-security/courses/isci-cnss-course/attackers-techniques","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"}]},{"id":"-M8BOKo36C5wWUFoWeJu","title":"Hacking Preparation","pathname":"/network-security/courses/isci-cnss-course/attackers-techniques/hacking-preparation","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Attackers Techniques"}]},{"id":"-M8BOLoNNHVXM-9amAgM","title":"The Attack Phase","pathname":"/network-security/courses/isci-cnss-course/attackers-techniques/the-attack-phase","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Attackers Techniques"}]},{"id":"-M8BOJ9XU4FoR3iMSQw5","title":"Hacking Wi-Fi","pathname":"/network-security/courses/isci-cnss-course/attackers-techniques/hacking-wi-fi","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Courses"},{"label":"ISCI CNSS Course"},{"label":"Attackers Techniques"}]},{"id":"-MNeMpvGfn1qhuzqLw9Y","title":"The Web","pathname":"/network-security/the-web","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"-MMh0qyeJROTRQUPBd8B","title":"The OSI Model","pathname":"/network-security/the-osi-model","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"-M7TyevkLwdXMyZahK-3","title":"Malware Traffic Analysis with Wireshark","pathname":"/network-security/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"-M7DU-hXcKnihM7MGQII","title":"Autopsy - open-source digital forensics platform","pathname":"/digital-forensics/autopsy-software","siteSpaceId":"sitesp_kfGnU","description":"Based on Autopsy Basics and Hands On (8-Hours) Course","breadcrumbs":[{"label":"Digital Forensics"}]},{"id":"-M6glMQtOOpzpMypWgBP","title":"Code Review","pathname":"/exploit-dev-analysis/code-review","siteSpaceId":"sitesp_kfGnU","description":"See: https://pentesterlab.com/exercises/codereview/course","breadcrumbs":[{"label":"Exploit Dev/Analysis"}]},{"id":"-M6jpiqaD6EUc6W6Rpgk","title":"Tools","pathname":"/exploit-dev-analysis/code-review/tools","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Code Review"}]},{"id":"-M6S_ZFSD3FzGMPqLouH","title":"Buffer Overflows","pathname":"/exploit-dev-analysis/buffer-overflows","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"}]},{"id":"-MF7wzRuF7oOoxEUkFTk","title":"Static Analysis","pathname":"/exploit-dev-analysis/static-analysis","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"}]},{"id":"-MF7xGOYSqMUX3b9XGgf","title":"Antivirus Scanning","pathname":"/exploit-dev-analysis/static-analysis/antivirus-scanning","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"}]},{"id":"-MF80ihocYht8U97dn98","title":"Hashing","pathname":"/exploit-dev-analysis/static-analysis/hashing","siteSpaceId":"sitesp_kfGnU","description":"A fingerprint for malware","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"}]},{"id":"-MF80bcZv68LJuFQjUbw","title":"File strings","pathname":"/exploit-dev-analysis/static-analysis/file-strings","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"}]},{"id":"-MF8-QwOwC3z8Y0_OzWF","title":"Packed and Obfuscated Malware","pathname":"/exploit-dev-analysis/static-analysis/packed-and-obfuscated-malware","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"}]},{"id":"-MF8-ozV9EITokDaCzYr","title":"Demo: UPX","pathname":"/exploit-dev-analysis/static-analysis/packed-and-obfuscated-malware/demo-upx","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"},{"label":"Packed and Obfuscated Malware"}]},{"id":"-MF7xXx23zLEvyjfeHzB","title":"Portable Executable File Format (PE)","pathname":"/exploit-dev-analysis/static-analysis/portable-executable-file-format-pe","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"}]},{"id":"-MF7xrk-6JbrOUPIHdlx","title":"Tools","pathname":"/exploit-dev-analysis/static-analysis/portable-executable-file-format-pe/tools","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"},{"label":"Portable Executable File Format (PE)"}]},{"id":"-MF7xrzN8HxGuF1cGgIp","title":"Linked Libraries and Functions","pathname":"/exploit-dev-analysis/static-analysis/portable-executable-file-format-pe/linked-libraries-and-functions","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"},{"label":"Portable Executable File Format (PE)"}]},{"id":"-MF7xU3bV5L9nR2x6MUd","title":"PE File Headers and Sections","pathname":"/exploit-dev-analysis/static-analysis/portable-executable-file-format-pe/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Exploit Dev/Analysis"},{"label":"Static Analysis"},{"label":"Portable Executable File Format (PE)"}]},{"id":"-MGfr6vY85kIQOWL4DnU","title":"./missing-semester","pathname":"/shell-scripting/.-missing-semester","siteSpaceId":"sitesp_kfGnU","description":"The Missing Semester of Your CS Education","breadcrumbs":[{"label":"Shell"}]},{"id":"-MGfrHOTqUtFX1Fm_Quy","title":"Course overview + the shell","pathname":"/shell-scripting/.-missing-semester/course-overview-+-the-shell","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"},{"label":"./missing-semester"}]},{"id":"-MGoS6yeq8a1ta5jwjgw","title":"Shell Tools and Scripting","pathname":"/shell-scripting/.-missing-semester/shell-tools-and-scripting","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"},{"label":"./missing-semester"}]},{"id":"-MGoxXGZuLr8Wmp8dOgL","title":"Editors (Vim)","pathname":"/shell-scripting/.-missing-semester/editors-vim","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"},{"label":"./missing-semester"}]},{"id":"-MKGCT0ogrgIS36_8G9f","title":"Data Wrangling","pathname":"/shell-scripting/.-missing-semester/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"},{"label":"./missing-semester"}]},{"id":"-MMgl0BlCQJoL2QjgMdB","title":"Command-line Environment","pathname":"/shell-scripting/.-missing-semester/command-line-environment","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"},{"label":"./missing-semester"}]},{"id":"-MF7i_sL5L9eSn68vUp2","title":"Bash Tricks","pathname":"/shell-scripting/bash-tricks","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"}]},{"id":"-M3lR-5mZZ7gUz9EU4FO","title":".bashrc","pathname":"/shell-scripting/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"}]},{"id":"-MF7i4Dqhlc-T_yFJs0m","title":"Random Commands","pathname":"/shell-scripting/random-commands","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"}]},{"id":"-MNRhSlBV6r9-DAxqv46","title":"sed","pathname":"/shell-scripting/random-commands/sed","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Shell"},{"label":"Random Commands"}]},{"id":"-M8aWnqaDSbOvmubiaXD","title":"NAND2Tetris","pathname":"/hardware/nand2tetris","siteSpaceId":"sitesp_kfGnU","description":"Build a Modern Computer from First Principles","breadcrumbs":[{"label":"Hardware"}]},{"id":"-M8aedJHqzX4t49mWHSG","title":"Boolean Functions and Gate Logic","pathname":"/hardware/nand2tetris/boolean-functions-and-gate-logic","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Hardware"},{"label":"NAND2Tetris"}]},{"id":"-M8aedGFnlLBwFM3GQrF","title":"Boolean Arithmetic and the ALU","pathname":"/hardware/nand2tetris/boolean-arithmetic-and-the-alu","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Hardware"},{"label":"NAND2Tetris"}]},{"id":"-MIPumeKBxMAAl0x9ksh","title":"Memory","pathname":"/hardware/nand2tetris/memory","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Hardware"},{"label":"NAND2Tetris"}]},{"id":"-MIPuvOzSujD7dO5YB08","title":"Machine Language","pathname":"/hardware/nand2tetris/machine-language","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Hardware"},{"label":"NAND2Tetris"}]},{"id":"-MIPv-Cr7x5nwIvQ_DCM","title":"Computer Architecture","pathname":"/hardware/nand2tetris/computer-architecture","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Hardware"},{"label":"NAND2Tetris"}]},{"id":"-MIPv-bRkUQg213F0hbw","title":"Assembler","pathname":"/hardware/nand2tetris/assembler","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Hardware"},{"label":"NAND2Tetris"}]},{"id":"-M3lQaT6K49lYKdKbPd0","title":"K8s","pathname":"/other/k8s","siteSpaceId":"sitesp_kfGnU","description":"An Overview of Kubernetes","breadcrumbs":[{"label":"Other"}]},{"id":"-M6SSwETtwYTeFIrubv1","title":"Chapter 1: From Monolith to Microservices","pathname":"/other/k8s/chapter-1-from-monolith-to-microservices","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Other"},{"label":"K8s"}]},{"id":"-M6SRLVjNbZNDWqb9RhE","title":"Chapter 2: Container Orchestration","pathname":"/other/k8s/untitled","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Other"},{"label":"K8s"}]},{"id":"-M6SV3MAFi0vRxYAXp8E","title":"Chapter 3: Kubernetes","pathname":"/other/k8s/chapter-3-kubernetes","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Other"},{"label":"K8s"}]},{"id":"-M6SV9AL1__uxcVHUEKE","title":"Chapter 4: Kubernetes Architecture","pathname":"/other/k8s/chapter-4-kubernetes-architecture","siteSpaceId":"sitesp_kfGnU","description":"","breadcrumbs":[{"label":"Other"},{"label":"K8s"}]}]}