{"version":1,"pages":[{"id":"-MA6mXv2egYJa7V_h1pJ","title":"Hacker's Rest","pathname":"/hackers-rest","siteSpaceId":"sitesp_oCzih","description":"A collection of notes for Penetration Testers and Ethical Hackers.  My journey to OSCP and beyond."},{"id":"-MA8zW8gDu7aCwnM9HxN","title":"Tools & Cheatsheets","pathname":"/hackers-rest/tools-cheatsheets","siteSpaceId":"sitesp_oCzih","description":"A collection of outside resources on various InfoSec-related subjects."},{"id":"vUzDBL1CQO9NLj3So1l7","title":"Cybersecurity YouTube Channels","pathname":"/hackers-rest/tools-cheatsheets/cybersecurity-youtube-channels","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Tools & Cheatsheets"}]},{"id":"-MDMrIfLgMkiaX0ibSgL","title":"Hacking Methodology","pathname":"/hackers-rest/hacking-methodology","siteSpaceId":"sitesp_oCzih","description":""},{"id":"-MNGEZMlh3Xoew4xH5td","title":"Hands-on Practice","pathname":"/hackers-rest/hands-on-practice","siteSpaceId":"sitesp_oCzih","description":"Sites and resources for gaining the most important experience: hands-on practical application."},{"id":"f9DeAydnwWICvVPvn43X","title":"Network Fundamentals","pathname":"/hackers-rest/fundamentals/networking","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Fundamentals"}]},{"id":"scgNllLVxq0YU2uAHcb1","title":"Computer Fundamentals","pathname":"/hackers-rest/fundamentals/computing","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Fundamentals"}]},{"id":"-MBettUlsc3RiaSKASZn","title":"Windows Fundamentals","pathname":"/hackers-rest/fundamentals/windows-basics","siteSpaceId":"sitesp_oCzih","description":"Windows Fundamentals","breadcrumbs":[{"label":"Fundamentals"}]},{"id":"GEFGMNzg80HcEZ5FUMzQ","title":"cmd.exe","pathname":"/hackers-rest/fundamentals/windows-basics/cmd-shell","siteSpaceId":"sitesp_oCzih","description":"Introduction to the Windows cmd.exe shell","breadcrumbs":[{"label":"Fundamentals"},{"label":"Windows Fundamentals"}]},{"id":"-MBfRq7B3RMdriEr_HOC","title":"PowerShell","pathname":"/hackers-rest/fundamentals/windows-basics/powershell","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Fundamentals"},{"label":"Windows Fundamentals"}]},{"id":"1gBkfp68YAYEfpTbogVa","title":"Windows Utilities","pathname":"/hackers-rest/fundamentals/windows-basics/utilities","siteSpaceId":"sitesp_oCzih","description":"Introduction to Windows built-in commands and utilities","breadcrumbs":[{"label":"Fundamentals"},{"label":"Windows Fundamentals"}]},{"id":"RaHQECFp3j2NviY51NXm","title":"Unix Fundamentals","pathname":"/hackers-rest/fundamentals/unix-fundamentals","siteSpaceId":"sitesp_oCzih","description":"Commands and programs that all Linux users need to know (but many don't!)","breadcrumbs":[{"label":"Fundamentals"}]},{"id":"-MBeslbqk2KP78Zh0x1V","title":"Hardening & Setup","pathname":"/hackers-rest/linux-1/linux-hardening","siteSpaceId":"sitesp_oCzih","description":"A collection of useful programs and configurations for getting your home box set up for pre-engagement use.","breadcrumbs":[{"label":"Unix"}]},{"id":"-MIfSeefqvNb_QdQ1Juk","title":"TMUX/Screen Cheatsheet","pathname":"/hackers-rest/linux-1/linux-hardening/tmux-screen-cheatsheet","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Hardening & Setup"}]},{"id":"-MA8zW8djuPPH3ukMPXP","title":"Red Team Notes","pathname":"/hackers-rest/linux-1/linux-redteam","siteSpaceId":"sitesp_oCzih","description":"Sorted Linux notes, need to separate to different pages and reorganize","breadcrumbs":[{"label":"Unix"}]},{"id":"-MBlNt2zYzsXdiajZ04b","title":"Enumeration","pathname":"/hackers-rest/linux-1/linux-redteam/enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Red Team Notes"}]},{"id":"-MDuZLLFEADbp4BIglLQ","title":"Getting Access","pathname":"/hackers-rest/linux-1/linux-redteam/getting-access","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Red Team Notes"}]},{"id":"-MBlNvyPLCsPflO7oLy2","title":"Privilege Escalation","pathname":"/hackers-rest/linux-1/linux-redteam/privilege-escalation","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Red Team Notes"}]},{"id":"Mvq7VF5QEO7shp3XJ2nv","title":"Pivoting/Lateral Movement","pathname":"/hackers-rest/linux-1/linux-redteam/pivoting-lateral-movement","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Red Team Notes"}]},{"id":"-MPAdqUW1fvxZ1E_Eoyx","title":"Data Exfiltration","pathname":"/hackers-rest/linux-1/linux-redteam/exfiltration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Red Team Notes"}]},{"id":"-MBvIOOT1zEIv09SQtcy","title":"Persistence","pathname":"/hackers-rest/linux-1/linux-redteam/persistance","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Unix"},{"label":"Red Team Notes"}]},{"id":"-MBlZ7SZNJLu4aLbGbuM","title":"Vim","pathname":"/hackers-rest/linux-1/vim","siteSpaceId":"sitesp_oCzih","description":"Love it or hate it, most distros have it installed.  It's best to know at least how to edit files, and exit. Knowing how to exit vi is one of life's greatest mysteries.","breadcrumbs":[{"label":"Unix"}]},{"id":"-MBeuDtaypJOruzpVABN","title":"Hardening & Setup","pathname":"/hackers-rest/windows-1/windows-hardening","siteSpaceId":"sitesp_oCzih","description":"A collection of useful programs and configurations for getting your home box set up for pre-engagement use. I think I want to rename this page to something else...can't think of a good title right now","breadcrumbs":[{"label":"Windows"}]},{"id":"-MA8zW8eNprMKhU8R0q0","title":"Red Team Notes","pathname":"/hackers-rest/windows-1/windows-redteam","siteSpaceId":"sitesp_oCzih","description":"Sorted Linux notes, need to separate to different pages and reorganize","breadcrumbs":[{"label":"Windows"}]},{"id":"-MBlOZqsHBL2PV5Lu4_p","title":"Enumeration","pathname":"/hackers-rest/windows-1/windows-redteam/enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"-MDu_HHX3uQsEjP0mP1S","title":"Getting Access","pathname":"/hackers-rest/windows-1/windows-redteam/getting-access","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"-MBlOdRz6evhrnIG-uA_","title":"Privilege Escalation","pathname":"/hackers-rest/windows-1/windows-redteam/privilege-escalation","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"qJU4bXJC2g8DUqLLHT4L","title":"Pivoting/Lateral Movement","pathname":"/hackers-rest/windows-1/windows-redteam/pivoting-lateral-movement","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"-MDAEBHn4iLuMI0nkfYB","title":"Persistence","pathname":"/hackers-rest/windows-1/windows-redteam/persistence","siteSpaceId":"sitesp_oCzih","description":"Various techniques for maintaining persistence.  Includes methods that can be accomplished both with and without elevated privileges. Will provide commands for both cmd.exe and PowerShell if possible.","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"rZ60uHCwzIr1vxBZNjbp","title":"Data Exfiltration","pathname":"/hackers-rest/windows-1/windows-redteam/data-exfiltration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"-MBfRu_Lr0brJGtGGgr2","title":"Active Directory","pathname":"/hackers-rest/windows-1/windows-redteam/active-directory","siteSpaceId":"sitesp_oCzih","description":"Active Directory-Specific commands and strategies","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"uRcnJRE5bcdB4QRfFK1K","title":"Enumeration","pathname":"/hackers-rest/windows-1/windows-redteam/active-directory/enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"},{"label":"Active Directory"}]},{"id":"VrOvPT2VHo0DaxKrEkJI","title":"Getting Access","pathname":"/hackers-rest/windows-1/windows-redteam/active-directory/getting-access","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"},{"label":"Active Directory"}]},{"id":"QvX7xvvq5GS5sdlCBx5y","title":"Privilege Escalation","pathname":"/hackers-rest/windows-1/windows-redteam/active-directory/privilege-escalation","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"},{"label":"Active Directory"}]},{"id":"DudpWrr0cLLiRKMFfL9o","title":"Persistence","pathname":"/hackers-rest/windows-1/windows-redteam/active-directory/persistence","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"},{"label":"Active Directory"}]},{"id":"-MXSyN337YVIeDkrXa1B","title":"Kerberos","pathname":"/hackers-rest/windows-1/windows-redteam/kerberos","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"-MXF2Z71V0f2zjIkxA1P","title":"Impacket","pathname":"/hackers-rest/windows-1/windows-redteam/impacket","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Windows"},{"label":"Red Team Notes"}]},{"id":"-MF2pyaKHev0HXnwtozT","title":"MacOS Basics","pathname":"/hackers-rest/macos/macos-basics","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"}]},{"id":"-MF2qA8Q_oSjXa4oSqxm","title":"Hardening & Configuration","pathname":"/hackers-rest/macos/macos-hardening","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"}]},{"id":"-MF2nu5IRj9eIFcDFBKC","title":"Red Team Notes","pathname":"/hackers-rest/macos/macos-redteam","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"}]},{"id":"-MF2oJWa0vnObuSWmaje","title":"Enumeration","pathname":"/hackers-rest/macos/macos-redteam/enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"},{"label":"Red Team Notes"}]},{"id":"-MF2p0Nphs2BEf_69JlO","title":"Getting Access","pathname":"/hackers-rest/macos/macos-redteam/getting-access","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"},{"label":"Red Team Notes"}]},{"id":"-MF2pC05fU9Q23StY7L0","title":"Privilege Escalation","pathname":"/hackers-rest/macos/macos-redteam/privilege-escalation","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"},{"label":"Red Team Notes"}]},{"id":"-MF2pISf4-uSk2gjXh6J","title":"Persistence","pathname":"/hackers-rest/macos/macos-redteam/persistence","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"MacOS"},{"label":"Red Team Notes"}]},{"id":"-MWtkEO8LNkqn6T2QrR7","title":"Burp Suite","pathname":"/hackers-rest/web/burp-suite","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Web"}]},{"id":"-MBg-x-2fybgtRXelExR","title":"DNS","pathname":"/hackers-rest/web/dns","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Web"}]},{"id":"-MBerUvOH9yunqesyWfK","title":"Web Notes","pathname":"/hackers-rest/web/web-notes","siteSpaceId":"sitesp_oCzih","description":"TODO: Need to pull web notes out of the OS Agnostic section (and then rename that to something better!)","breadcrumbs":[{"label":"Web"}]},{"id":"-MWtsxN1a0-eBxFbJtNo","title":"Enumeration","pathname":"/hackers-rest/web/web-notes/enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Web"},{"label":"Web Notes"}]},{"id":"-MWtspY7euU6QAN3RKqC","title":"Web Filter Bypass","pathname":"/hackers-rest/web/web-notes/web-filter-bypass","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Web"},{"label":"Web Notes"}]},{"id":"-MWtscWRHDEPvBKvqiG7","title":"Command Injection","pathname":"/hackers-rest/web/web-notes/command-injection","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Web"},{"label":"Web Notes"}]},{"id":"-MVbnDVEusdaWRtS5zvH","title":"Subdomain/Virtual Host Enumeration","pathname":"/hackers-rest/web/web-notes/subdomain-virtual-host-enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Web"},{"label":"Web Notes"}]},{"id":"-MVcFjWR57STjrsxf89l","title":"The Web Application Hacker's Handbook","pathname":"/hackers-rest/web/web-notes/the-web-application-hackers-handbook","siteSpaceId":"sitesp_oCzih","description":"Web Application Hacker's Handbook Task Checklist","breadcrumbs":[{"label":"Web"},{"label":"Web Notes"}]},{"id":"-MDKSzAu1qLUY3m1Y1Sr","title":"iOS","pathname":"/hackers-rest/mobile/ios","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Mobile"}]},{"id":"-MDKTEUwpE1txKvrsxfQ","title":"Android","pathname":"/hackers-rest/mobile/android","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"Mobile"}]},{"id":"-MWUUf6TBWz93YRMCnJg","title":"Basic Enumeration","pathname":"/hackers-rest/os-agnostic/basic-enumeration","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MGpi78URyqfE5QnrLkm","title":"Cryptography & Encryption","pathname":"/hackers-rest/os-agnostic/cryptography-and-encryption","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MG_1pVLA8DhagIJH7Uj","title":"Network Hardware","pathname":"/hackers-rest/os-agnostic/network-hardware","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MA8zW8fPTIUztGkpHD0","title":"OS Agnostic","pathname":"/hackers-rest/os-agnostic/os_agnostic","siteSpaceId":"sitesp_oCzih","description":"TODO: Rename this to something more interesting or appropriate, pull out stuff to its own section.","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MDLrLxEZuhUGuqLceau","title":"OSINT","pathname":"/hackers-rest/os-agnostic/osint","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MBg-FZfFRIGNI_mrNP_","title":"Password Cracking","pathname":"/hackers-rest/os-agnostic/password-cracking","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MIMIk6lkGiQpl6OlfMM","title":"Gathering the Hashes","pathname":"/hackers-rest/os-agnostic/password-cracking/gathering-the-hashes","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Password Cracking"}]},{"id":"-MIMInMMCcfBQ3fHWjU-","title":"Wordlist Manipulation","pathname":"/hackers-rest/os-agnostic/password-cracking/wordlist-manipulation","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Password Cracking"}]},{"id":"-MIMInqDoDa-5ks5fzCF","title":"Cracking the Hashes","pathname":"/hackers-rest/os-agnostic/password-cracking/cracking-the-hashes","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Password Cracking"}]},{"id":"37FhWIIuQRasMTXUCZOD","title":"Pivoting","pathname":"/hackers-rest/os-agnostic/pivoting","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"Y8DWEpv1B9nFZ6Icmmce","title":"Chisel","pathname":"/hackers-rest/os-agnostic/pivoting/chisel","siteSpaceId":"sitesp_oCzih","description":"Pivoting using Chisel","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Pivoting"}]},{"id":"WuKQk62Av8cjZRZIQLCU","title":"Plink.exe","pathname":"/hackers-rest/os-agnostic/pivoting/plink.exe","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Pivoting"}]},{"id":"fPHqE1Tsw3jOuyXQr27j","title":"Proxychains","pathname":"/hackers-rest/os-agnostic/pivoting/proxychains","siteSpaceId":"sitesp_oCzih","description":"Pivoting using Proxychains","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Pivoting"}]},{"id":"bjsqsNfxN2V1SNMv3ak7","title":"SSH","pathname":"/hackers-rest/os-agnostic/pivoting/ssh","siteSpaceId":"sitesp_oCzih","description":"Pivoting Using SSH","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Pivoting"}]},{"id":"RFyPkGEyhU8UrLF3f41I","title":"Sshuttle","pathname":"/hackers-rest/os-agnostic/pivoting/sshuttle","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Pivoting"}]},{"id":"BGf3mCGwEztNrAhOWQmY","title":"Socat","pathname":"/hackers-rest/os-agnostic/pivoting/socat","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Pivoting"}]},{"id":"-MBg-i_xOen9woLvSq7N","title":"Reverse Engineering & Binary Exploitation","pathname":"/hackers-rest/os-agnostic/reverse-engineering-and-binary-exploitation","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MRGLOQkuJjkMxnyeEsd","title":"Buffer Overflow","pathname":"/hackers-rest/os-agnostic/reverse-engineering-and-binary-exploitation/buffer-overflow","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Reverse Engineering & Binary Exploitation"}]},{"id":"-MBfSc_sNCwdp3JrRzoe","title":"Scripting","pathname":"/hackers-rest/os-agnostic/scripting","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MK1reloDY4VvUzG8lZw","title":"Script Language Syntax","pathname":"/hackers-rest/os-agnostic/scripting/script-language-comparison","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"},{"label":"Scripting"}]},{"id":"-MBg33fTlUWEpT93bZRF","title":"SQL","pathname":"/hackers-rest/os-agnostic/sql","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MBg2R1cecQvQD42htqp","title":"SSH & SCP","pathname":"/hackers-rest/os-agnostic/ssh-and-scp","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MBffo-bYtzFhx_u1eCt","title":"Steganography","pathname":"/hackers-rest/os-agnostic/steganography","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MFSygpNb3ESbdMKrV0v","title":"Wireless","pathname":"/hackers-rest/os-agnostic/wifi","siteSpaceId":"sitesp_oCzih","description":"","breadcrumbs":[{"label":"OS Agnostic"}]},{"id":"-MBerZirUt_ftksypgPW","title":"Unsorted","pathname":"/hackers-rest/untitled","siteSpaceId":"sitesp_oCzih","description":"Misc notes that still need to be sorted through and sent to their proper homes."}]}