Introduction

Hello readers!

This Gitbook document summarizes my findings and learnings on various offensive security concepts, such as penetration testing, ethical hacking and red teaming, based on my knowledge and research. While I strive for accuracy, some notes may be incomplete or incorrect. I'm continuously updating and refining the content as I learn and gain new insights.

If you notice any mistakes or have suggestions for improvement, feel free to contact me at jarrettgxz.sec@gmail.com. Your feedback is greatly appreciated, thank you!

Without further ado, let's hack away!

Note on shell prompt convention

The $ symbol will be used to indicate a shell prompt (defaulting to Bash). Some commands may require root privileges via the sudo command. However, this documentation will not explicitly specify when sudo is required — it should be prepended where necessary.

Note on use of generative AI

This document was supported by OpenAI's ChatGPT, which was used to generate ideas, provide validation, and clarify technical concepts.

However, most of the core theories and principles discussed in this documentation were developed and tested by me, based on research and experimentation conducted to the best of my abilities.

I have received my inspiration and knowledge hugely from the content provided by the following sources:

  1. Hacktricks

  1. TryHackMe

Shell prompt convention

The $ symbol will be used to indicate a shell prompt (defaulting to Bash). Some commands may require root privileges via the sudo command. However, this documentation will not explicitly specify when sudo is required — it should be prepended where necessary.

Last updated