[~]$ whoami

Hi there, I’m Dhanraj Chavan đź‘‹!!!

  • I’m a Master’s student at New York University at New York, specializing in Cybersecurity.
  • This is a space where I will be writing about my Cybersecurity write-ups(CTFs & Bug Bounty) and projects.
  • Feel free to reach me out if you have any questions/suggestions.

EJPT Notes

Assessment Methodologies Passive Information Gathering Website Recon & Footprinting IP Addresses host <domain> Directories robots.txt sitemap.xml Names Emails Phone Numbers Physical Addresses Web Technologies Used BuiltWith → Firefox Addon (Recommended) Wappalyzer → Extension whatweb <domain> → Linux Tool webhttrack → Website Copier Whois Enumeration https://who.is website whois <domain> Website Footprinting with Netcraft https://netcraft.com DNS Recon dnsrecon -d <domain> → Kali Linux Tool https://dnsdumpster.com/ WAF wafw00f Subdomain Enumeration Sublist3r Google Dorks cache:ine....

October 28, 2024 Â· 25 min Â· Dhanraj Chavan

Intro to EJPT

Intro 48 Hour Exam 35 Questions Links https://medium.com/@ls5747670/my-ejptv2-experience-and-tips-2024-a91954726fc5 https://infosecwriteups.com/mastering-the-ejptv2-exam-ec38daec16bc https://aluvi.notion.site/eJPTv2-Complete-Cheat-sheet-d5b052c525d94c89b5d41183bd5c39fd https://cisofy.com/lynis/ https://github.com/xonoxitron/INE-eJPT-Certification-Exam-Notes-Cheat-Sheet https://github.com/Nater-aide/EJPT/blob/main/Notes/Wordpress.md https://github.com/miazga-git/eJPT-Study-Notes https://github.com/syselement/ine-notes/blob/main/ejpt/ejpt-cheatsheet.md https://github.com/Nater-aide/EJPT/blob/main/Notes/MYSQL.mdk

October 28, 2024 Â· 1 min Â· Dhanraj Chavan

Chapter 1: Engagement Management

Chapter 1 Objective 1.1 Scope Definition Regulations, Frameworks, and Standards Privacy: Ensure compliance with privacy laws (e.g., GDPR, HIPAA). Notes Security: Adhere to security standards (e.g., ISO/IEC 27001, NIST). Notes Rules of Engagement Exclusions Define what systems, networks, or data are off-limits. Example: Exclude the production environment to avoid disruptions. Test Cases Specify the scenarios and conditions under which the testing will occur. Example: Testing for SQL injection vulnerabilities in the login module....

August 7, 2024 Â· 17 min Â· Dhanraj Chavan

Chapter 2: Reconnaissance and Enumeration

Chapter 2 Objective 2.1 Active and Passive Reconnaissance Active Reconnaissance → Actively interacts with the target system or network to gather information. Methods: Port scanning, ping sweeps, banner grabbing, social engineering. Risks: High detection risk, potential legal issues. Importance: Provides detailed and actionable information about the target’s systems and vulnerabilities. Passive Reconnaissance → Gathers information about the target without directly interacting with the target system or network. Methods: OSINT, WHOIS lookup, DNS enumeration, social media monitoring, website analysis....

August 7, 2024 Â· 15 min Â· Dhanraj Chavan

Chapter 3: Vulnerability Discovery and Analysis

Chapter 3 Objective 3.1 Container Scans Purpose: Assess security of containerized applications and environments. Techniques: Sidecar Scans: Utilize a sidecar container to monitor and analyze the security of a main container. Example: A sidecar container running a security tool to check for vulnerabilities in a main application container. Application Scans Purpose: Identify vulnerabilities in applications at different stages of development and deployment. Techniques: Dynamic Application Security Testing (DAST): Test running applications for vulnerabilities by simulating attacks....

August 7, 2024 Â· 8 min Â· Dhanraj Chavan

Chapter 4: Attacks and Exploits

Chapter 4 Objective 4.1 Target Prioritization High-Value Asset Identification Definition: Determining which assets are most critical to the organization and thus warrant higher priority for security efforts. Examples: Financial databases Intellectual property repositories Critical infrastructure systems Purpose: Focus resources on protecting assets that, if compromised, would have the most significant impact on the organization. Descriptors and Metrics Common Vulnerability Scoring System (CVSS) Base Score: Definition: A numerical score that represents the severity of a vulnerability....

August 7, 2024 Â· 67 min Â· Dhanraj Chavan

Chapter 5: Post-exploitation and Lateral Movement

Chapter 5 Objective 5.1 Scheduled Tasks/Cron Jobs Function: Automating tasks to run at specified times. Use Case: Setting up periodic execution of malicious scripts or commands. Example: Creating a cron job to regularly execute a script that maintains a backdoor connection. Service Creation Function: Creating system services that run with elevated privileges. Use Case: Establishing persistence by installing malicious services. Example: Creating a Windows service that launches a reverse shell upon system startup....

August 7, 2024 Â· 18 min Â· Dhanraj Chavan

Chapter 1: Governance, Risk, and Compliance

Chapter 1 Objective 1.1 Security Program Documentation Policies → Formalized statements that define the organization’s position on an particular issue, its guiding principles & its overall intentions Establish the organization’s stance and expectations. Ex. A data protection policy might state that all employees must encrypt sensitive data before transmitting it over the internet Ex. Security Policy, Privacy Policy Procedures → Detailed, step-by-step instructions on how to perform specific tasks or operations Provide specific directions for performing tasks....

July 23, 2024 Â· 33 min Â· Dhanraj Chavan

Chapter 2: Security Architecture

Chapter 2 Objective 2.1 Firewall → A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Placement: Perimeter Firewall: Positioned at the network boundary to filter traffic between internal and external networks. Internal Firewall: Placed within the network to segment and protect different network segments. Configuration: Rule Setting: Define rules to allow or block traffic based on IP addresses, ports, and protocols....

July 23, 2024 Â· 33 min Â· Dhanraj Chavan

Chapter 3: Security Engineering

Chapter 3 Objective 3.1 Subject Access Control Subject access control involves defining and managing the permissions and access rights for different entities (subjects) in an IT environment, such as users, processes, devices, and services. User Access Control → User access control manages the permissions and access rights of individual users based on their roles and responsibilities. Objective: Ensure users have appropriate access based on their roles. Approach: Use role-based access control (RBAC) and attribute-based access control (ABAC)....

July 23, 2024 Â· 48 min Â· Dhanraj Chavan