Welcome to exitno.de
This site contains some notes focused on IT security.
Most of the notes were taken during security courses from Offensive Security, eLearnSecurity or SANS.
The main topics cover wireless technologies, pentesting as well as reverse engineering.
The focus of the wireless section lies on wlan and bluetooth. It summarizes some commands needed to setup connections and how to investigate the security of these connections.
In the pentesting section you can find commands needed for network pentesting together with some notes about possible postexploitation steps on a compromised host system.
Finally I added a section about reverse engineering where I gather some information about basic binary analysis and tools like ida pro and radare2.
__
___ ___ ( / \ |\ )
/ \ |\ / \ |\ ( \ / ||\ )
| | | | | | | | ( / \__ ||| )
\ _/ | |\ \ _/ | |\ O ( | \__ \__|/| )
/ \ | |\ / \ | |\ o ( | |------- )
| \__ | || | \__ | || ___ ____________ _
| \____ \\____ |/ | | \____ \\____ |/ | o / \/| \/ \o
| | -------------- | | -------------- |_\___/_|_______________|
W O R K H O M E S L E E P