githubEdit

Learning Path

Suggested reading order based on skill level and topic progression.

🟢 Beginner Path

Start here if you're new to penetration testing.

Week 1-2: Foundations

  1. Network Scanningarrow-up-right - Nmap fundamentals

  2. Host Scanningarrow-up-right - Service identification

Week 3-4: Web Basics

  1. Crawl/Fuzzarrow-up-right - Directory discovery

  2. XSSarrow-up-right - Cross-site scripting

  3. CSRFarrow-up-right - Request forgery

Week 5-6: First Exploitation

  1. Payloadsarrow-up-right - Common payloads

  2. Webshellsarrow-up-right - Web-based access

Resources for Beginners


🟡 Intermediate Path

For those comfortable with basics, ready to deepen skills.

Web Application Testing

  1. SQLiarrow-up-right - SQL injection mastery

  2. SSRFarrow-up-right - Server-side request forgery

  3. XXEarrow-up-right - XML attacks

  4. LFI/RFIarrow-up-right - File inclusion

  5. SSTIarrow-up-right - Template injection

Authentication & Authorization

  1. Bruteforcingarrow-up-right - Credential attacks

  2. JWTarrow-up-right - Token attacks

  3. OAutharrow-up-right - OAuth flaws

  4. IDORarrow-up-right - Access control bypass

Post-Exploitation Basics

  1. Pivotingarrow-up-right - Network movement

Cloud Fundamentals

  1. AWSarrow-up-right - AWS attacks


🔴 Advanced Path

For experienced testers looking to master advanced techniques.

Advanced Exploitation

  1. Buffer Overflowarrow-up-right - Binary exploitation

  2. Supply Chainarrow-up-right - Dependency attacks

Windows & Active Directory

Cloud Security

  1. Azurearrow-up-right - Azure attacks

  2. GCParrow-up-right - GCP attacks

  3. Serverlessarrow-up-right - Function exploitation

Evasion & Stealth

  1. Purple Teamarrow-up-right - Detection engineering

Mobile Security

  1. Androidarrow-up-right - Android testing

  2. iOSarrow-up-right - iOS testing

Specialized Topics

  1. Hardware Hackingarrow-up-right - Physical security


📋 Certification Paths

OSCP-Focused

  1. Network Scanning → Host Scanning → Ports

  2. Web Attacks (SQLi, LFI, Command Injection)

  3. Reverse Shells → File Transfer

  4. Linux Privesc → Windows Privesc

  5. Pivoting

  6. Buffer Overflow basics

Web Application Focus (BSCP/eWPT)

  1. All Web Attacks sections

  2. API Security

  3. JWT, OAuth, OIDC

  4. Web Technologies (all subsections)

  5. Request Smuggling, Cache Poisoning

Cloud Security Focus

  1. AWS → Azure → GCP

  2. Docker & Kubernetes

  3. Serverless

  4. Cloud Info Gathering

Red Team Focus

  1. All Post-Exploitation

  2. AD & Kerberos

  3. RT/EDR Evasion

  4. Purple Team

  5. Social Engineering

  6. C2 Framework basics (Web Exploits)


🎯 Quick Reference by Task

Last updated

Was this helpful?