Commit 159a472e authored by bobloblaw's avatar bobloblaw
Browse files

Updates README.md

Auto commit by GitBook Editor
parent 5f9d48c6
Loading
Loading
Loading
Loading
+6 −6
Original line number Diff line number Diff line
# IT-Security

My notepad about stuff related to IT-security. Stuff I have come across that I don't feel like googeling again. 
My notepad about stuff related to IT-security, and specifically penetration testing. Stuff I have come across that I don't feel like googeling again.

I have used this book to try to write down how some things work, but at the same time I want to use it as a reference book to find commands and things I just can't remember. Therefore I have tried to create a TLDR section in the beginning of some chapters where I have copy-paste ready commands that are useful. And if you want to know more you can continue to read the rest of the chapter. This is my way of making the book a hybrid between the Red team field manual and a standard introduction book to pentesting.

Also, this book is just a collection of stuff that is available on the interwebz. I am just a simple collector. I have tried to include a reference section to show where I found the technique, but sometimes I have just forgotten about it or I don't know. But I make no claim to any originality, everything here is just copy-pasted from someone else. 
I have used this book to try to write down how some things work, but at the same time I want to use it as a reference book to find commands and things I just can't remember. Therefore I have tried to create a TLDR section in the beginning of some chapters where I have copy-paste ready commands that are useful. And if you want to know more you can continue to read the rest of the chapter. This is my way of making the book a hybrid between the Red Team Field Manual and a standard introduction book to pentesting.

Also, this book is just a collection of stuff that is available on the interwebz. I am just a simple collector. I have tried to include a reference section to show where I found the technique, but sometimes I have just forgotten about it or I don't know. This book is my way of trying to give something back to the infosec community and I hope it can be useful to someone.

## Find practical examples

@@ -19,6 +18,7 @@ site:hackerone.com sql-injection

## Disclaimers

Sometimes the line isn't very clear between the chapters. Some actions might be considered part of the vulnerability analysis-phase, but it could also but considered part of the recon-phase. Whatever, it doesn't really matter. 
Sometimes the line isn't very clear between the chapters. Some actions might be considered part of the vulnerability analysis-phase, but it could also but considered part of the recon-phase. It is what it is.

These chapters are written sporadically with a lot of stuff missing. I just add stuff wherever whenever. Also, things might not be accurate, I might have misunderstood something or misused a tool. So don't trust me or this book for any accuracy.
These chapters are written sporadically with a lot of stuff missing. I just add stuff wherever. Also, things might not be accurate, I might have misunderstood something or misused a tool. So don't trust me or this book for any accuracy.
 No newline at end of file