# Infographics

{% hint style="info" %}
None of the actual content is new or special. It's just my own representation of commonly available information to help remember and visualize some of the basic stuff.
{% endhint %}

## DHCP Basics

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FEbLj3tlxaZshTbu8qxC8%2FDHCP%20Basics.png?alt=media&#x26;token=4c55713f-d8b7-45c1-a6cc-345417de3cf7" alt=""><figcaption><p>Basic dynamic host configuration protocol (DHCP) communication for an initial IP address assignment</p></figcaption></figure>

## Kerberoasting

![Very basic workflow of a kerberoasting attack](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FevNQ51woS0O0dBO1co8e%2FKerberoasting.png?alt=media\&token=e3ee8e2d-93d6-45a5-ba0f-6b54ebbcb360)

## Kerberos Authentication

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FOSL7W0gNobsCiB3KvIEu%2FKerberosAuthentication.png?alt=media&#x26;token=2451b3cd-24c0-4800-a5ad-4de705a8bb5d" alt=""><figcaption><p>Basic kerberos authentication flow (see <a href="https://web.archive.org/web/20230708145448/https://en.wikipedia.org/wiki/Kerberos_(protocol)">here</a> for a cleaner visual representation)</p></figcaption></figure>

## Network Topology - Physical 3-Tier-Model

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FR8zN5Nv8ZJ7cOsaGI4eT%2FNetworkSetup.png?alt=media&#x26;token=7cf9d67e-1d90-44ad-8958-8fedaba23d14" alt=""><figcaption><p>Example of the classical 3-layer network architecture with some basic information on common concepts surrounding this model</p></figcaption></figure>

## OAuth2 Basics

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FZNTcPeGTuWfoSD0DXRiO%2FOAuth2%20Basics.png?alt=media&#x26;token=c7de9397-6816-4e9b-8d2d-c94c35b7c68e" alt=""><figcaption><p>Basic workflow of an OAuth2 authorization (OAuth2 is an authorization protocol - do not use for authentication)</p></figcaption></figure>

## Pivoting

![A small high level overview of pivoting possibilities](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FqUeC10eGOYxk6xsvhK4b%2Fpivoting.png?alt=media\&token=d0a67971-9a0c-43fb-a46b-c57d5b6682a1)

## Resource Based Constrained Delegation (RBCD) via WebDAV

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2Fp8Bv5voC2SF3VujgKSRq%2FResource%20Based%20Constrained%20Delegation.png?alt=media&#x26;token=b9901271-2c64-4e79-8d23-cd9632b7f961" alt=""><figcaption><p>Cheatsheet for abusing WebDAV for privilege escalation, setting up RBCD to gain access</p></figcaption></figure>

## SSH Local Port Forwarding

![Visualizing SSH port forwarding based on this great explanation](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FqvAUzDCUSGOMM8n3V8ry%2Flocal-port-forwarding.png?alt=media\&token=26504ad5-b04f-4c88-8176-7e4e7c1b05fb)

## SSH Remote Port Forwarding

![Visualizing SSH port forwarding based on this great explanation](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FRVGQbaFlLJIfcoIrAPJJ%2Fremote-port-forwarding.png?alt=media\&token=3ae9f60b-b97c-402b-ad4b-ed64d44c85a8)

## The Basic Heap Layout

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FisvRmFhL1AZc3GMjOoe6%2Fbasic-heap-structure.png?alt=media&#x26;token=542b7a87-beb7-49f6-928a-08e901238726" alt=""><figcaption><p>A basic representation of allocated and free chunks on the heap</p></figcaption></figure>

## The Cyber Kill Chain

![Yet another visualization of Lockheed Martin's "Cyber Kill Chain"](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Mhlz_oZ3oVPSWFmU_3o%2F-MhmLXI4wVkBj2u5GBPt%2F-MhmRJjjadtntsLZ2ezd%2FThe%20Cyber%20Kill%20Chain.png?alt=media\&token=dffadc6a-bac8-4d53-9378-52a0dc5cce5b)

## The Domain Name System

![A simplified overview of the steps involved in DNS](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Mhlz_oZ3oVPSWFmU_3o%2F-MhmRl_WINvnUZ0xgW_5%2F-MhmSQfDlLJC-xytctXo%2FDomain%20Name%20System.png?alt=media\&token=08b1c51f-377a-4de7-b45f-25d41a8bd14e)

## The OSI and TCP/IP Model

![The Open Systems Interconnection model](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FqFFSbyfHux63ayfoXOYd%2Fosi-model.PNG?alt=media\&token=8409646f-7814-4f93-9b50-6d80319cdb26)

## The Penetration Testing Execution Standard

<figure><img src="https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FLdoa0hrplazNFDVo4v14%2FPTES.png?alt=media&#x26;token=c9197e2a-0d26-472b-8ad1-a50239fcfbde" alt=""><figcaption><p>Visualisation of the seven steps of the Penetration Testing Execution Standard (PTES)</p></figcaption></figure>

## The PNG File Structure

![Structure of a PNG file that might help for a CTF](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FO06yOTN0mPSqVGdCRpr4%2Fpng-structure.png?alt=media\&token=21e9d340-2ae8-4336-bab2-08b490b95a62)

## The (32-bit) Stack Layout&#x20;

![A detailed representation of the stack layout during a function call on a 32-bit processor](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Mhlz_oZ3oVPSWFmU_3o%2F-MhmRl_WINvnUZ0xgW_5%2F-MhmTTV5XQn3lxe_Ae5C%2F32-bit-Stack.png?alt=media\&token=1c5f7857-b718-412d-8eaa-3f3fbd99dce0)

## The Sudoers File

Check [the official documentation](https://www.sudo.ws/man/1.8.13/sudoers.man.html) for a complete list of available options and values.

![A small guide for entries in the /etc/sudoers file including the most common options](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FN0oG6FyMh91B0fP49CPs%2FThe%20Sudoers%20File.png?alt=media\&token=47998fc5-2a2f-4ae9-9051-bebbd185af13)

## The VirtualBox NatNetwork

This diagram shall visualize the default addresses in a NatNetwork in VirtualBox as most [documentation](https://docs.oracle.com/en/virtualization/virtualbox/6.0/admin/changenat.html) seems a bit unclear or not accurate. Analyzing some basic network traffic we can determine the following structure though.

![](https://1971224599-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-Mhlz_oZ3oVPSWFmU_3o%2Fuploads%2FIpKfdrDHgnTxBmjnLuti%2Fvirtualbox-natnetwork.png?alt=media\&token=21017368-080f-4284-a1bd-f5d6e5fce7f4)

{% hint style="info" %}
The infographics were created using <https://www.canva.com> and <https://www.draw.io>.
{% endhint %}

##
