It is a mindmap for conducting network attacks. For the most part, it will be useful to pentesters or red team operators. The mindmap will be maintained and updated by me.
All information contained in this repository is provided for educational and research purposes only. The author is not responsible for any illegal use of this mindmap
- Traffic Hijacking
- MiTM Attacks
- Dynamic IGP Routing
- Configuration Exfiltration
- DoS
- NAC/802.1X Bypassing
- GRE Pivoting
- Cisco EEM for hiding user
- Authentication Cracking
- Information Gathering
- Cisco Passwords
- VLAN Bypassing