Skip to content

Documentation Features Demo

This page demonstrates the enhanced features available in our documentation.

Code Blocks

Syntax Highlighting

# Python code example
def penetration_test():
    """Example penetration testing function."""
    import nmap

    nm = nmap.PortScanner()
    result = nm.scan('127.0.0.1', '22-443')

    for host in nm.all_hosts():
        print(f'Host: {host} ({nm[host].hostname()})')
        for protocol in nm[host].all_protocols():
            ports = nm[host][protocol].keys()
            for port in ports:
                state = nm[host][protocol][port]['state']
                print(f'Port {port}: {state}')
# Bash/Shell commands
nmap -sS -O target.com
gobuster dir -u http://target.com -w /usr/share/wordlists/dirb/common.txt
sqlmap -u "http://target.com/page.php?id=1" --dbs
// JavaScript for web exploitation
function xss_payload() {
    return '<script>alert("XSS")</script>';
}

// Fetch API example
fetch('/api/users')
    .then(response => response.json())
    .then(data => console.log(data));

Math Expressions

Inline Math

Here's an inline math expression: \( P(A|B) = \frac{P(B|A) \cdot P(A)}{P(B)} \)

Display Math

Risk calculation formula:

\[ Risk = \frac{Threat \times Vulnerability \times Asset\_Value}{Countermeasures} \]

CVSS Base Score calculation:

\[ BaseScore = ((0.6 \times Impact) + (0.4 \times Exploitability) - 1.5) \times f(Impact) \]

Tables

Simple Table

Tool Purpose Cost
Burp Suite Web App Testing Paid
OWASP ZAP Web App Testing Free
Nmap Network Scanning Free
Metasploit Exploitation Freemium

Enhanced Table with Alignment

Vulnerability CVSS Score Severity Impact
SQL Injection 9.8 Critical High
XSS 6.1 Medium Medium
CSRF 4.3 Medium Low
Directory Traversal 7.5 High High

Admonitions

Study Tip

Always document your methodology and findings during penetration testing.

Security Warning

Only perform these techniques on systems you own or have explicit permission to test.

Pro Tip

Use automated tools for initial reconnaissance, but always validate findings manually.

Critical

Never run untested exploits against production systems.

Information

The CPTS certification requires comprehensive documentation of all testing phases.

Achievement

Successfully completed the Active Directory module!

Task Lists

CPTS Progress Tracking

  • Penetration Testing Process
  • Getting Started
  • Network Enumeration with Nmap
  • Footprinting
  • Information Gathering - Web Edition
  • Vulnerability Assessment
  • File Transfers

Lab Completion

  • Basic enumeration lab
  • Web application assessment
  • Active Directory attack paths
  • Privilege escalation scenarios

Tabbed Content

Information Gathering Phase

  1. Passive Reconnaissance

    • OSINT gathering
    • Domain enumeration
    • Social media research
  2. Active Reconnaissance

    • Port scanning
    • Service enumeration
    • Vulnerability scanning

Gaining Initial Access

  1. Web Application Attacks

    • SQL injection
    • XSS exploitation
    • File upload vulnerabilities
  2. Network Attacks

    • Service exploitation
    • Password attacks
    • Social engineering

Maintaining Access

  1. Privilege Escalation

    • Local privilege escalation
    • Kernel exploits
    • Misconfiguration abuse
  2. Lateral Movement

    • Network pivoting
    • Credential harvesting
    • Domain escalation

Diagrams with Mermaid

Network Topology

graph TD
    A[Internet] --> B[Firewall]
    B --> C[DMZ]
    C --> D[Web Server]
    C --> E[Mail Server]
    B --> F[Internal Network]
    F --> G[Domain Controller]
    F --> H[File Server]
    F --> I[Workstations]

Attack Flow

sequenceDiagram
    participant A as Attacker
    participant W as Web App
    participant D as Database
    participant S as Server

    A->>W: SQL Injection Payload
    W->>D: Malicious Query
    D->>W: Database Contents
    W->>A: Sensitive Data
    A->>S: Privilege Escalation
    S->>A: System Access

Certification Journey

flowchart LR
    Start([Start Journey]) --> Study[Study Modules]
    Study --> Labs[Complete Labs]
    Labs --> Practice[Practice Skills]
    Practice --> Ready{Ready for Exam?}
    Ready -->|No| Study
    Ready -->|Yes| Exam[Take Exam]
    Exam --> Pass{Pass?}
    Pass -->|No| Study
    Pass -->|Yes| Cert([Certified!])

Key Combinations

Use Ctrl+C to copy and Ctrl+V to paste.

Common shortcuts: - Ctrl+Shift+C - Copy command - Ctrl+Shift+V - Paste command
- Ctrl+L - Clear terminal - Alt+Tab - Switch windows

External Resources

Internal Navigation

Abbreviations

When you use abbreviations like API, CPTS, CBBH, CDSA, HTB, SOC, SIEM, OWASP, XSS, SQL, or CSRF, they will automatically show their full meaning when you hover over them.

Custom Styling

This documentation includes enhanced styling for: - Better code block appearance - Improved table formatting - External link indicators - Enhanced admonition styling - Custom checkbox styling for task lists


This page demonstrates all the enhanced features available for creating comprehensive cybersecurity documentation!