# Hello!

Welcome to Marial's Notes, a growing collection of my experiences from labs and security exercises. This is just a starting point—more will be added soon as I continue to build and refine my work.

### PentesterLab Free Tier Labs

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><strong>Recon Badge</strong></td><td>The Recon badge is a set of 27 exercises created to help you learn Reconnaissance. From findings usual files down to DNS and TLS exploration, this badge will help you get better at finding new targets.</td><td><a href="pentesterlab-labs/recon-badge">recon-badge</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2Feg8WXVhCrXvpsqYck7gC%2FNOTES%20(4).png?alt=media&#x26;token=b83567b1-5c9e-4fb7-85c6-a061b8fe2d4c">NOTES (4).png</a></td></tr></tbody></table>

### TryHackMe Rooms

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><strong>Basic Pentesting</strong></td><td>This is a machine that allows you to practise web app hacking and privilege escalation</td><td><a href="tryhackme-rooms/basic-pentesting">basic-pentesting</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2Fsa1XYzskG2GyCv4ytGX9%2FNOTES%20(2).png?alt=media&#x26;token=d86ada3e-e6d8-44f8-afbd-00f2cd494445">NOTES (2).png</a></td></tr><tr><td><strong>EasyPeasy</strong></td><td>Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob.</td><td><a href="tryhackme-rooms/easypeasy">easypeasy</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2FUjAMZuZXjhKlRFgZvIdt%2FNOTES%20(3).png?alt=media&#x26;token=1095d3cc-ae46-4fff-a0ff-e3154aa0e3c5">NOTES (3).png</a></td></tr><tr><td><strong>Kenobi</strong></td><td>Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.</td><td><a href="tryhackme-rooms/kenobi">kenobi</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2FPAMX9ZaCjGqlcoklWWMx%2FNOTES%20(5).png?alt=media&#x26;token=d4c25841-cd87-4079-8b73-962911adfe49">NOTES (5).png</a></td></tr><tr><td><strong>Vulnversity</strong></td><td>Learn about active recon, web app attacks and privilege escalation.</td><td><a href="tryhackme-rooms/vulnversity">vulnversity</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2FaCZh6TRQUxTA12Rljezy%2FNOTES%20(6).png?alt=media&#x26;token=c639b035-00f6-4145-b670-b3ae89ada922">NOTES (6).png</a></td></tr></tbody></table>

{% hint style="danger" %}
The content and notes provided on this website are for educational purposes only and should be used to promote ethical and responsible practices in penetration testing. I do not claim ownership of any tools mentioned; they are collected and shared based on what works for me in my learning journey. Any misuse of the information or tools found on this site for malicious purposes is strictly prohibited. I am not liable for any actions based on the information provided here. **Always ensure you have proper authorization before engaging in any form of testing.**
{% endhint %}
