Documentation Features Demo¶
This page demonstrates the enhanced features available in our documentation.
Code Blocks¶
Syntax Highlighting¶
# Python code example
def penetration_test():
"""Example penetration testing function."""
import nmap
nm = nmap.PortScanner()
result = nm.scan('127.0.0.1', '22-443')
for host in nm.all_hosts():
print(f'Host: {host} ({nm[host].hostname()})')
for protocol in nm[host].all_protocols():
ports = nm[host][protocol].keys()
for port in ports:
state = nm[host][protocol][port]['state']
print(f'Port {port}: {state}')
# Bash/Shell commands
nmap -sS -O target.com
gobuster dir -u http://target.com -w /usr/share/wordlists/dirb/common.txt
sqlmap -u "http://target.com/page.php?id=1" --dbs
// JavaScript for web exploitation
function xss_payload() {
return '<script>alert("XSS")</script>';
}
// Fetch API example
fetch('/api/users')
.then(response => response.json())
.then(data => console.log(data));
Math Expressions¶
Inline Math¶
Here's an inline math expression: \( P(A|B) = \frac{P(B|A) \cdot P(A)}{P(B)} \)
Display Math¶
Risk calculation formula:
CVSS Base Score calculation:
Tables¶
Simple Table¶
| Tool | Purpose | Cost |
|---|---|---|
| Burp Suite | Web App Testing | Paid |
| OWASP ZAP | Web App Testing | Free |
| Nmap | Network Scanning | Free |
| Metasploit | Exploitation | Freemium |
Enhanced Table with Alignment¶
| Vulnerability | CVSS Score | Severity | Impact |
|---|---|---|---|
| SQL Injection | 9.8 | Critical | High |
| XSS | 6.1 | Medium | Medium |
| CSRF | 4.3 | Medium | Low |
| Directory Traversal | 7.5 | High | High |
Admonitions¶
Study Tip
Always document your methodology and findings during penetration testing.
Security Warning
Only perform these techniques on systems you own or have explicit permission to test.
Pro Tip
Use automated tools for initial reconnaissance, but always validate findings manually.
Critical
Never run untested exploits against production systems.
Information
The CPTS certification requires comprehensive documentation of all testing phases.
Achievement
Successfully completed the Active Directory module!
Task Lists¶
CPTS Progress Tracking¶
- Penetration Testing Process
- Getting Started
- Network Enumeration with Nmap
- Footprinting
- Information Gathering - Web Edition
- Vulnerability Assessment
- File Transfers
Lab Completion¶
-
Basic enumeration lab -
Web application assessment - Active Directory attack paths
- Privilege escalation scenarios
Tabbed Content¶
Information Gathering Phase¶
-
Passive Reconnaissance
- OSINT gathering
- Domain enumeration
- Social media research
-
Active Reconnaissance
- Port scanning
- Service enumeration
- Vulnerability scanning
Gaining Initial Access¶
-
Web Application Attacks
- SQL injection
- XSS exploitation
- File upload vulnerabilities
-
Network Attacks
- Service exploitation
- Password attacks
- Social engineering
Maintaining Access¶
-
Privilege Escalation
- Local privilege escalation
- Kernel exploits
- Misconfiguration abuse
-
Lateral Movement
- Network pivoting
- Credential harvesting
- Domain escalation
Diagrams with Mermaid¶
Network Topology¶
graph TD
A[Internet] --> B[Firewall]
B --> C[DMZ]
C --> D[Web Server]
C --> E[Mail Server]
B --> F[Internal Network]
F --> G[Domain Controller]
F --> H[File Server]
F --> I[Workstations] Attack Flow¶
sequenceDiagram
participant A as Attacker
participant W as Web App
participant D as Database
participant S as Server
A->>W: SQL Injection Payload
W->>D: Malicious Query
D->>W: Database Contents
W->>A: Sensitive Data
A->>S: Privilege Escalation
S->>A: System Access Certification Journey¶
flowchart LR
Start([Start Journey]) --> Study[Study Modules]
Study --> Labs[Complete Labs]
Labs --> Practice[Practice Skills]
Practice --> Ready{Ready for Exam?}
Ready -->|No| Study
Ready -->|Yes| Exam[Take Exam]
Exam --> Pass{Pass?}
Pass -->|No| Study
Pass -->|Yes| Cert([Certified!]) Key Combinations¶
Use Ctrl+C to copy and Ctrl+V to paste.
Common shortcuts: - Ctrl+Shift+C - Copy command - Ctrl+Shift+V - Paste command
- Ctrl+L - Clear terminal - Alt+Tab - Switch windows
External and Internal Links¶
External Resources¶
Internal Navigation¶
Abbreviations¶
When you use abbreviations like API, CPTS, CBBH, CDSA, HTB, SOC, SIEM, OWASP, XSS, SQL, or CSRF, they will automatically show their full meaning when you hover over them.
Custom Styling¶
This documentation includes enhanced styling for: - Better code block appearance - Improved table formatting - External link indicators - Enhanced admonition styling - Custom checkbox styling for task lists
This page demonstrates all the enhanced features available for creating comprehensive cybersecurity documentation!