💻
crackcat @ studying
  • 🏠Home
  • 📑Infographics
  • 🛠️How Stuff Works
    • Buffer Overflow - Explained
    • Embedded Firmware Extraction
  • Proxmox+Packer+Terraform+Ansible
  • 📒TryHackMe Write-Ups
    • 📵Mr. Robot
    • 🔗Binex
    • *️CMesS
    • 🏛️Olympus
    • 🧑‍💻UltraTech
    • 🧠Brainpan
  • ⚙️CVE
    • CVE-2019-17571 RCE PoC
    • CVE-2022-45962 Postauth SQLI
  • 🏴CTF Challenges
    • BugBase - RaaS
  • 🏢AllEndEvent
    • Introduction
    • Chapter I
    • Chapter II
    • Chapter III
Powered by GitBook
On this page
  • DHCP Basics
  • Kerberoasting
  • Kerberos Authentication
  • Network Topology - Physical 3-Tier-Model
  • OAuth2 Basics
  • Pivoting
  • Resource Based Constrained Delegation (RBCD) via WebDAV
  • SSH Local Port Forwarding
  • SSH Remote Port Forwarding
  • The Basic Heap Layout
  • The Cyber Kill Chain
  • The Domain Name System
  • The OSI and TCP/IP Model
  • The Penetration Testing Execution Standard
  • The PNG File Structure
  • The (32-bit) Stack Layout
  • The Sudoers File
  • The VirtualBox NatNetwork

Was this helpful?

Infographics

This page features a small collection of infographics that I created.

PreviousHomeNextBuffer Overflow - Explained

Last updated 1 month ago

Was this helpful?

None of the actual content is new or special. It's just my own representation of commonly available information to help remember and visualize some of the basic stuff.

DHCP Basics

Kerberoasting

Kerberos Authentication

Network Topology - Physical 3-Tier-Model

OAuth2 Basics

Pivoting

Resource Based Constrained Delegation (RBCD) via WebDAV

SSH Local Port Forwarding

SSH Remote Port Forwarding

The Basic Heap Layout

The Cyber Kill Chain

The Domain Name System

The OSI and TCP/IP Model

The Penetration Testing Execution Standard

The PNG File Structure

The (32-bit) Stack Layout

The Sudoers File

The VirtualBox NatNetwork

Check for a complete list of available options and values.

This diagram shall visualize the default addresses in a NatNetwork in VirtualBox as most seems a bit unclear or not accurate. Analyzing some basic network traffic we can determine the following structure though.

The infographics were created using and .

📑
the official documentation
documentation
https://www.canva.com
https://www.draw.io
Basic dynamic host configuration protocol (DHCP) communication for an initial IP address assignment
Very basic workflow of a kerberoasting attack
Example of the classical 3-layer network architecture with some basic information on common concepts surrounding this model
Basic workflow of an OAuth2 authorization (OAuth2 is an authorization protocol - do not use for authentication)
A small high level overview of pivoting possibilities
Cheatsheet for abusing WebDAV for privilege escalation, setting up RBCD to gain access
A basic representation of allocated and free chunks on the heap
The Open Systems Interconnection model
Visualisation of the seven steps of the Penetration Testing Execution Standard (PTES)
Structure of a PNG file that might help for a CTF
Basic kerberos authentication flow (see for a cleaner visual representation)
Visualizing SSH port forwarding based on
Visualizing SSH port forwarding based on
Yet another visualization of Lockheed Martin's "Cyber Kill Chain"
A simplified overview of the steps involved in DNS
A detailed representation of the stack layout during a function call on a 32-bit processor
A small guide for entries in the /etc/sudoers file including the most common options
here
this great explanation
this great explanation