# Core Knowledge Areas

- [Information Gathering](/pentesting-notes/core-knowledge-areas/information-gathering.md)
- [OSCP Tools Restrictions](/pentesting-notes/core-knowledge-areas/information-gathering/oscp-tools-restrictions.md)
- [Linux Privilege Escalation](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation.md)
- [Enumeration](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/enumeration.md)
- [Programs, Jobs and Services](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/programs-jobs-and-services.md)
- [Environment Variables Abuse](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/environment-variables-abuse.md)
- [Capabilities Abuse](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/capabilities-abuse.md)
- [Persistence](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/persistence.md)
- [Security Bypass](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/security-bypass.md)
- [Privilege Escalation Checklist](/pentesting-notes/core-knowledge-areas/linux-privilege-escalation/checklist.md)
- [Windows Privilege Escalation](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation.md)
- [Enumeration](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/enumeration.md)
- [Credential Hunting](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/credential-hunting.md)
- [Service Exploitation](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/service-exploitation.md)
- [Registry Exploits](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/registry-exploits.md)
- [Scheduled Tasks](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/scheduled-tasks.md)
- [Token Impersonation](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/token-impersonation.md)
- [Kernel Exploits](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/kernel-exploits.md)
- [Privilege Escalation Checklist](/pentesting-notes/core-knowledge-areas/windows-privilege-escalation/checklist.md)
- [Tools & Utilities](/pentesting-notes/core-knowledge-areas/tools.md)
- [Nmap](/pentesting-notes/core-knowledge-areas/tools/nmap.md)
- [Gobuster](/pentesting-notes/core-knowledge-areas/tools/gobuster.md)
- [John the Ripper](/pentesting-notes/core-knowledge-areas/tools/john.md)
- [Hydra](/pentesting-notes/core-knowledge-areas/tools/hydra.md)
- [Linux Commands Cheatsheet](/pentesting-notes/core-knowledge-areas/tools/linux-commands.md)
- [Windows Commands Cheatsheet](/pentesting-notes/core-knowledge-areas/tools/windows-commands.md)
- [File Transfer Techniques](/pentesting-notes/core-knowledge-areas/tools/file-transfers.md)
