πNotetaking & Organization
π― Overview
π Essential Notetaking Structure
Core Categories
# Primary sections for comprehensive documentation:
1. Attack Path # Complete exploitation chain with screenshots
2. Credentials # Centralized credential tracking
3. Findings # Individual vulnerabilities with evidence
4. Vulnerability Scan Research # Scanner analysis and research
5. Service Enumeration Research # Service investigation notes
6. Web Application Research # Web app discoveries and testing
7. AD Enumeration Research # Active Directory investigation
8. OSINT # Open source intelligence gathering
9. Administrative Information # Contacts, objectives, RoE
10. Scoping Information # IP ranges, URLs, provided credentials
11. Activity Log # High-level activity tracking
12. Payload Log # Uploaded files and cleanup trackingFolder Structure
π οΈ Recommended Tools
Notetaking Applications
Session Logging
πΊ Tmux Logging Setup
Installation
Usage
Key Bindings
π Evidence Collection
What to Capture
Screenshot Best Practices
Terminal Output Formatting
π Artifact Tracking
Payload Documentation
System Modifications
Sample Tracking Format
π― HTB Academy Lab Solutions
Lab Questions
Practical Exercises
π Assessment Workflow
Pre-Assessment Setup
During Assessment
Post-Assessment
β οΈ Data Handling Guidelines
What NOT to Collect
Compliance Considerations
π‘ Key Takeaways
Last updated