Hammaad Mughal
CtrlK
AboutLinkedInGitHubMediumBlog
Home
Home
  • Home
  • About Me
  • eJPT Notes
    • Assessment Methodologies
      • 1.1 Information Gathering
        • CTF - Information Gathering
      • 1.2 Footprinting & Scanning
        • CTF - Footprinting & Scanning
      • 1.3 Enumeration
        • CTF - Enumeration
      • 1.4 Vulnerability Assessment
        • CTF - Vulnerability Assessment
  • Host & Network Auditing
    • 2.1 Auditing Fundamentals
  • Host & Network Penetration Testing
    • 3.1 System / Host Based Attacks
      • CTF 1 - System / Host Based Attacks
      • CTF 2 - System / Host Based Attacks
    • 3.2 Network Based Attacks
      • CTF - Network Based Attacks
    • 3.3 The Metasploit Framework
      • CTF 1 - The Metasploit Framework
      • CTF 2 - The Metasploit Framework
    • 3.4 Exploitation
      • CTF 1 - Exploitation
      • CTF 2 - Exploitation
      • CTF 3 - Exploitation
    • 3.5 Post-Exploitation
      • CTF 1 - Post-Exploitation
      • CTF 2 - Post-Exploitation
    • 3.6 Social Engineering
  • Web Application Penetration Testing
    • 4.1 Introduction to the Web & HTTP Protocol
Powered by GitBook
Page cover

Home

Hey! I’m Hammaad (aka Hmad). I'm 17 and aspiring to be an offensive security professional. This is my personal space to document everything cybersecurity. It's where I can write about my journey as I progress through this field.

What you'll find:

Cover
eJPT Notes
Cover
Hack The Box
Cover
Try Hack Me
Cover
iGCSE Computer Science

Last updated 11 days ago