- Introduction
- Part I: Foundations
- 1. Welcome to Trapdoor Security
- 2. Building Your Lab
- 3. The Hacker Mindset
- 4. Networking for Hackers
- Part II: Reconnaissance
- 5. Passive Information Gathering
- 6. Active Reconnaissance & Port Scanning
- Part III: Service Exploitation
- 7. HTTP/HTTPS (80, 443, 8080, 8443)
- 8. SSH (22)
- 9. FTP (20, 21)
- 10. SMB (139, 445)
- 11. Database Services
❱
- 11.1. MySQL (3306)
- 11.2. PostgreSQL (5432)
- 11.3. MSSQL (1433)
- 11.4. MongoDB (27017)
- 11.5. Redis (6379)
- 12. DNS (53)
- 13. Email Services
❱
- 13.1. SMTP (25, 587)
- 13.2. POP3 (110, 995)
- 13.3. IMAP (143, 993)
- 14. SNMP (161, 162)
- 15. RDP (3389)
- 16. NFS (2049)
- 17. LDAP (389, 636)
- 18. Less Common Services
❱
- 18.1. VNC (5900)
- 18.2. Telnet (23)
- 18.3. TFTP (69)
- 18.4. Rsync (873)
- 18.5. Docker (2375, 2376)
- 18.6. Kubernetes
- 18.7. Jenkins (8080)
- 18.8. Elasticsearch (9200)
- Part IV: Post-Exploitation
- 19. Linux Privilege Escalation
- 20. Windows Privilege Escalation
- 21. Lateral Movement & Pivoting
- 22. Persistence Mechanisms
- Part V: Specialized Topics
- 23. Active Directory Deep Dive
- 24. Cloud Security
❱
- 24.1. AWS Security
- 24.2. Azure Security
- 24.3. GCP Security
- 25. Wireless & Physical Security
- 26. Social Engineering
- Part VI: Professional Skills
- 27. Writing Penetration Test Reports
- 28. Your Path Forward
- Appendices
- 29. Command Reference Cheat Sheet
- 30. Tool Installation Guides
- 31. Legal Frameworks & Resources
- 32. Recommended Reading
- 33. Community & Resources
- Contributing
- About the Author