Docs Overview
- I Foundations
- II Red Teaming
- III Purple Teaming
- IV Blue Teaming
- V Capture The Flag
In order to effectively conduct penetration tests, it is essential to have a solid foundation in the underlying technologies, frameworks, and tools that comprise modern computer systems and networks. This section provides an overview of the fundamental concepts, skills, and knowledge required for a penetration tester to perform their job effectively.
I Foundations | Structure
➜ Linux 101
➜ PowerShell 101
➜ Python 101
➜ Python 201
➜ SQL 101
➜ Networking Basics
Get started ➜
A simulated cyber attack where an adversary (red team) attempts to breach an organization's defenses, with the goal of identifying vulnerabilities and weaknesses in their security posture. The exercise aims to mimic real-world attacks, allowing defenders to improve their incident response and mitigation strategies.
II Red Teaming | Structure
➜ Red Team Fundamentals
➜ Initial Access
➜ Post Compromise
➜ Red Team Field Manual
Get started ➜
A cooperative exercise between red and blue teams, where both sides work together to simulate a cyber attack and defense scenario. The goal is to identify vulnerabilities, share knowledge, and improve incident response strategies in a collaborative environment. Purple teaming aims to bridge the gap between offense and defense by fostering a shared understanding of cybersecurity risks and challenges.
III Purple Teaming | Structure
➜ Introduction
Get started ➜
An exercise where a defender (blue team) is tasked with protecting an organization from a simulated attack by a red team. This type of exercise focuses on the defensive aspects of cybersecurity, such as identifying and responding to threats in real-time.
IV Blue Teaming | Structure
➜ Malware Analysis
➜ Blue Team Team Manual
Get started ➜
Capture The Flag (CTF) is a competitive game or exercise where players are presented with a series of challenges to exploit vulnerabilities and capture flags, which represent sensitive information or system credentials. These challenges often involve solving puzzles, decoding messages, identifying security weaknesses, or hacking into mock systems, all while adhering to ethical hacking principles.
CTFs provide an immersive learning experience for cybersecurity professionals and enthusiasts, testing their problem-solving skills, knowledge of operating systems, networking protocols, and various tools used in penetration testing and digital forensics.