This guide is currently under development, and I greatly welcome any suggestions or feedback or at reaper.gitbook@gmail.com

Prerequisites & Skills

Why This Matters

Penetration testing is like being a digital locksmith, you can’t pick locks if you don’t understand how they work.

Core Knowledge

Security Fundamentals

  • CIA Triad: Confidentiality, Integrity, Availability

  • Attack Vectors: Social engineering, unpatched systems, misconfigurations, insider threats

Networking Basics

  • TCP vs UDP: TCP = reliable, UDP = fast but lossy

  • HTTP/HTTPS: Web apps are the main attack surface

  • DNS: Human-readable names → IP addresses, attack opportunities: poisoning, takeover

  • Ports & Services: Common targets:

    • 80/443 (HTTP/HTTPS), 22 (SSH), 3389 (RDP), 445 (SMB)

    • DB ports: 3306 (MySQL), 5432 (PostgreSQL), 1433 (MSSQL)

Operating Systems

  • Windows: Active Directory, PowerShell, services, registry, event logs

  • Linux: Filesystem (/etc, /var/log, /tmp), Bash scripting, cron jobs, process permissions

Scripting & Programming

  • Python: Automation, network tools, parsing, API interaction

  • Bash: Linux automation, text processing, system integration

  • PowerShell: Windows automation, remoting, object-oriented commands

Web Technologies

  • HTML/JS: DOM manipulation, events, AJAX

  • HTTP: Methods (GET/POST/PUT/DELETE), headers, cookies, status codes

Quick Resources: Kali Linux, VirtualBox/VMware, Metasploitable, OWASP Testing Guide, "Web Application Hacker’s Handbook"

Start simple, practice constantly, understand systems, then break them creatively.

Last updated

Was this helpful?