vault backup: 2024-08-24 19:34:25

This commit is contained in:
Anton Nesterov 2024-08-24 19:34:25 +02:00
parent 3de11a32a1
commit 35aa42f6d0
No known key found for this signature in database
GPG key ID: 59121E8AE2851FB5
6 changed files with 64 additions and 32 deletions

View file

@ -5,6 +5,6 @@
"layout": "full" "layout": "full"
}, },
"drawing": { "drawing": {
"sketch": false "sketch": true
} }
} }

View file

@ -4,7 +4,7 @@
"autoSaveInterval": 0, "autoSaveInterval": 0,
"autoPushInterval": 0, "autoPushInterval": 0,
"autoPullInterval": 0, "autoPullInterval": 0,
"autoPullOnBoot": false, "autoPullOnBoot": true,
"disablePush": false, "disablePush": false,
"pullBeforePush": true, "pullBeforePush": true,
"disablePopups": false, "disablePopups": false,
@ -19,7 +19,7 @@
"refreshSourceControl": true, "refreshSourceControl": true,
"basePath": "", "basePath": "",
"differentIntervalCommitAndPush": false, "differentIntervalCommitAndPush": false,
"changedFilesInStatusBar": false, "changedFilesInStatusBar": true,
"showedMobileNotice": true, "showedMobileNotice": true,
"refreshSourceControlTimer": 7000, "refreshSourceControlTimer": 7000,
"showBranchStatusBar": true, "showBranchStatusBar": true,
@ -27,8 +27,8 @@
"submoduleRecurseCheckout": false, "submoduleRecurseCheckout": false,
"gitDir": "", "gitDir": "",
"showFileMenu": true, "showFileMenu": true,
"authorInHistoryView": "hide", "authorInHistoryView": "full",
"dateInHistoryView": false, "dateInHistoryView": true,
"lineAuthor": { "lineAuthor": {
"show": false, "show": false,
"followMovement": "inactive", "followMovement": "inactive",
@ -50,7 +50,9 @@
}, },
"textColorCss": "var(--text-muted)", "textColorCss": "var(--text-muted)",
"ignoreWhitespace": false, "ignoreWhitespace": false,
"gutterSpacingFallbackLength": 5 "gutterSpacingFallbackLength": 5,
"lastShownAuthorDisplay": "initials",
"lastShownDateTimeFormatOptions": "date"
}, },
"autoCommitMessage": "vault backup: {{date}}" "autoCommitMessage": "vault backup: {{date}}"
} }

View file

@ -4,36 +4,22 @@
"type": "split", "type": "split",
"children": [ "children": [
{ {
"id": "92d1fe0bcd354bd9", "id": "dfa4a56144cd5b62",
"type": "tabs", "type": "tabs",
"children": [ "children": [
{ {
"id": "142dc1f96240b533", "id": "6e35c33355be0706",
"type": "leaf", "type": "leaf",
"state": { "state": {
"type": "markdown", "type": "markdown",
"state": { "state": {
"file": "Welcome.md", "file": "01 - Planning Considerations.md",
"mode": "source", "mode": "source",
"source": false "source": false
} }
} }
} }
] ]
},
{
"id": "5aaa564bd6d3ec7d",
"type": "tabs",
"children": [
{
"id": "bce607c50fa0eabb",
"type": "leaf",
"state": {
"type": "graph",
"state": {}
}
}
]
} }
], ],
"direction": "vertical" "direction": "vertical"
@ -99,7 +85,7 @@
"state": { "state": {
"type": "backlink", "type": "backlink",
"state": { "state": {
"file": "Welcome.md", "file": "01 - Planning Considerations.md",
"collapseAll": false, "collapseAll": false,
"extraContext": false, "extraContext": false,
"sortOrder": "alphabetical", "sortOrder": "alphabetical",
@ -116,7 +102,7 @@
"state": { "state": {
"type": "outgoing-link", "type": "outgoing-link",
"state": { "state": {
"file": "Welcome.md", "file": "01 - Planning Considerations.md",
"linksCollapsed": false, "linksCollapsed": false,
"unlinkedCollapsed": true "unlinkedCollapsed": true
} }
@ -139,7 +125,7 @@
"state": { "state": {
"type": "outline", "type": "outline",
"state": { "state": {
"file": "Welcome.md" "file": "01 - Planning Considerations.md"
} }
} }
} }
@ -160,8 +146,12 @@
"command-palette:Open command palette": false "command-palette:Open command palette": false
} }
}, },
"active": "142dc1f96240b533", "active": "6e35c33355be0706",
"lastOpenFiles": [ "lastOpenFiles": [
"templates/pentest-report-template.md",
"01 - Planning Considerations.md",
"templates",
"().md",
"Welcome.md" "Welcome.md"
] ]
} }

View file

@ -0,0 +1,45 @@
## Target Audience
- Identify targets of the engagement
- Identify scope and size of the engagement
## Objective
Asses reasons for the assessment. Security, risk assessments, customer personal data protection, etc.
## Compliance
Establish guidelines (or necessity) for compliance with internal and external regulations.
Example: PCI DSS
## Resources
1. Define budgeting requirements for the campaign.
2. Identify target's accessibility:
- Physical access
- Remote access
- Tooling required
## Communication Plan
1. Aquire Trusted Agent(s) within the company for trusted communication
2. Establish communication guidelines and information access control rules during engagement (who knows what)
## Product/Report
Establish reporting guidelines
[Report Template](./templates/pentest-report-template.md)
## Technical Constraints
Identify and establish all technical restrictions during the engagement. What parts of the infrastructure is tested and what is out of scope.
## Comprehensiveness
Identify specifics on the engagement, what parts of the infrastructure is tested, what type of vulnerabilities, etc.

View file

@ -1,5 +0,0 @@
This is your new *vault*.
Make a note of something, [[create a link]], or try [the Importer](https://help.obsidian.md/Plugins/Importer)!
When you're ready, delete this note and make the vault your own.

View file