Skip to main content

Obsidian Cheat Sheet - Part 1



Obsidian uses Markdown, a lightweight markup language, to format text. :

  • Headings: Use # for headings.

    • # Heading 1

    • ## Heading 2

    • ### Heading 3

  • Text Styling:

    • Bold: **bold**bold

    • Italic: *italic*italic

    • Bold & Italic: ***bold italic***bold italic

    • Strikethrough: ~~strikethrough~~strikethrough

    • Highlight: ==highlight== → ==highlight==

  • Lists:

    • Unordered: - item or * item

    • Ordered: 1. item

    • Checklist: - [ ] item

  • Code Blocks:

    • Inline: `code`

    • Block: ```
      code block

- **Links**: - Internal: `[[Note Name]]` - External: `[Link Text](http://url.com)` - **Blockquotes**: `> quote` - **Tables**: | Header 1 | Header 2 | |----------|----------| | Row 1 | Data | | Row 2 | Data | --- ### ⚡ Obsidian Shortcuts Boost your productivity with these keyboard shortcuts: - **General**: - `Ctrl + P` (or `Cmd + P` on Mac): Open Command Palette - `Ctrl + O`: Open Quick Switcher - `Ctrl + S`: Save current note - `Ctrl + N`: Create new note - `Ctrl + ,`: Open Settings - **Editing**: - `Ctrl + B`: Bold selected text - `Ctrl + I`: Italicize selected text - `Ctrl + K`: Insert link - `Ctrl + ]`: Indent line - `Ctrl + [`: Unindent line - `Ctrl + D`: Delete current line - `Ctrl + V`: Duplicate current line - **Navigation**: - `Ctrl + G`: Open Graph View - `Ctrl + Alt + ←`: Navigate Back - `Ctrl + Alt + →`: Navigate Forward - `Ctrl + F`: Search within current file - `Ctrl + E`: Toggle Edit/Preview mode --- ### 🌐 Internal Linking & Embedding - **Internal Links**: Use `[[Note Name]]` to link to another note. - **Embeds**: Use `![[Note Name]]` to embed the content of another note. - **Backlinks**: Obsidian automatically tracks backlinks, showing where a note is referenced. --- ### 📁 File Organization Tips - **Folders**: Organize notes into folders for better structure. - **Naming Conventions**: Use consistent naming conventions for notes and folders. - **Tags**: Use tags (`#tagname`) to categorize notes across folders. --- ### 🔗 Additional Resources - **Official Obsidian Documentation**: Explore the [Obsidian Help](https://help.obsidian.md/) for comprehensive guides and tutorials. - **Community Plugins**: Enhance Obsidian's functionality with community plugins available in the [Obsidian Plugin Gallery](https://obsidian.md/plugins).

Comments

Popular posts from this blog

MSRPC (Microsoft Remote Procedure Call) Pentesting - Port 135

  It is also known as a function call or a subroutine call. Default ports are 135, 593. Enumeration nmap --script msrpc-enum -p 135 <target-ip> RPC Endpoints To enumerate RPC endpoints, use impacket-rpcdump. impacket-rpcdump -port 135 <target-ip> | grep -E 'MS-EFSRPC|MS-RPRN|MS-PAR' MS-EFSRPC: It might be vulnerable to PetitPotam. MS-RPRN, MS-PAR: It might be vulnerable to PrintNightmare. Metasploit msfconsole msf> use auxiliary/scanner/dcerpc/endpoint_mapper msf> use auxiliary/scanner/dcerpc/hidden msf> use auxiliary/scanner/dcerpc/management msf> use auxiliary/scanner/dcerpc/tcp_dcerpc_auditor Connect # Anonymous logon rpcclient -N -U "" <target-ip> rpcclient -N -U "" -p 593 <target-ip> rpcclient -N -U "" dc.example.local # Specify username # -W: Workgroup # -N: No password rpcclient -U username <target-ip> rpcclient -W WORKGROUP -U username <target-ip> rpcclient -U username -N <target-ip...

Thread Modelling Cheatsheet: Know Your Weaknesses Before Attackers Do!

Threat Modelling Part - 1 What is Threat Modelling?      Threat modelling is the process of identifying, assessing, and mitigating potential security threats before they happen. It helps teams anticipate how systems can be attacked and build defences proactively , not reactively. Key Concepts Threat: Something (like a hacker or malware) that could exploit a weakness. Vulnerability: A flaw in your system that can be exploited. Risk: The chance that a threat will exploit a vulnerability to cause damage. Analogy : Threat = Burglar Vulnerability = Unlocked door Risk = Getting robbed because the door is open in a bad neighborhood  Threat Modelling Process (High-Level) Define the Scope – What systems/apps are you evaluating? Identify Assets – What needs protection? (e.g. data, services) Identify Threats – Think like an attacker. What could go wrong? Analyze Vulnerabilities – What weaknesses exist? Prioritize Ri...

DNS Pentest - Port 53

Recon Banner Grabbing - Identify DNS Server Versions # Use dig to determine DNS server versions dig version.bind CHAOS TXT @DNS # Alternatively, use nmap script to grab the banner nmap --script dns-nsid <DNS_IP> # Alternatively, use telnet to grab the banner nc -nv -u <DNS_IP> 53 DNS Server Discovery # Using dig dig NS <target-domain> # Using nslookup nslookup -type=NS <target-domain> Enumeration Using DNS enum dnsenum --dnsserver <DNS_IP> --enum -p 0 -s 0 -o subdomains.txt -f <WORDLIST> <DOMAIN> Using dig # Query DNS records dig hackviser.com # Query specific type of DNS records (e.g., A record) dig A hackviser.com # Perform a reverse DNS lookup dig -x <IP_ADDRESS> # Query a specific DNS server dig @<DNS_SERVER_IP> hackviser.com Using nslookup # Perform DNS queries nslookup hackviser.com # Query a specific type of DNS record (e.g., MX record) nslookup -type=MX hackviser.com # Query a specific DNS server nslookup ha...