Skip to main content

Obsidian Cheat Sheet - Part 1



Obsidian uses Markdown, a lightweight markup language, to format text. :

  • Headings: Use # for headings.

    • # Heading 1

    • ## Heading 2

    • ### Heading 3

  • Text Styling:

    • Bold: **bold**bold

    • Italic: *italic*italic

    • Bold & Italic: ***bold italic***bold italic

    • Strikethrough: ~~strikethrough~~strikethrough

    • Highlight: ==highlight== → ==highlight==

  • Lists:

    • Unordered: - item or * item

    • Ordered: 1. item

    • Checklist: - [ ] item

  • Code Blocks:

    • Inline: `code`

    • Block: ```
      code block

- **Links**: - Internal: `[[Note Name]]` - External: `[Link Text](http://url.com)` - **Blockquotes**: `> quote` - **Tables**: | Header 1 | Header 2 | |----------|----------| | Row 1 | Data | | Row 2 | Data | --- ### ⚡ Obsidian Shortcuts Boost your productivity with these keyboard shortcuts: - **General**: - `Ctrl + P` (or `Cmd + P` on Mac): Open Command Palette - `Ctrl + O`: Open Quick Switcher - `Ctrl + S`: Save current note - `Ctrl + N`: Create new note - `Ctrl + ,`: Open Settings - **Editing**: - `Ctrl + B`: Bold selected text - `Ctrl + I`: Italicize selected text - `Ctrl + K`: Insert link - `Ctrl + ]`: Indent line - `Ctrl + [`: Unindent line - `Ctrl + D`: Delete current line - `Ctrl + V`: Duplicate current line - **Navigation**: - `Ctrl + G`: Open Graph View - `Ctrl + Alt + ←`: Navigate Back - `Ctrl + Alt + →`: Navigate Forward - `Ctrl + F`: Search within current file - `Ctrl + E`: Toggle Edit/Preview mode --- ### 🌐 Internal Linking & Embedding - **Internal Links**: Use `[[Note Name]]` to link to another note. - **Embeds**: Use `![[Note Name]]` to embed the content of another note. - **Backlinks**: Obsidian automatically tracks backlinks, showing where a note is referenced. --- ### 📁 File Organization Tips - **Folders**: Organize notes into folders for better structure. - **Naming Conventions**: Use consistent naming conventions for notes and folders. - **Tags**: Use tags (`#tagname`) to categorize notes across folders. --- ### 🔗 Additional Resources - **Official Obsidian Documentation**: Explore the [Obsidian Help](https://help.obsidian.md/) for comprehensive guides and tutorials. - **Community Plugins**: Enhance Obsidian's functionality with community plugins available in the [Obsidian Plugin Gallery](https://obsidian.md/plugins).

Comments

Popular posts from this blog

DNS Pentest - Port 53

Recon Banner Grabbing - Identify DNS Server Versions # Use dig to determine DNS server versions dig version.bind CHAOS TXT @DNS # Alternatively, use nmap script to grab the banner nmap --script dns-nsid <DNS_IP> # Alternatively, use telnet to grab the banner nc -nv -u <DNS_IP> 53 DNS Server Discovery # Using dig dig NS <target-domain> # Using nslookup nslookup -type=NS <target-domain> Enumeration Using DNS enum dnsenum --dnsserver <DNS_IP> --enum -p 0 -s 0 -o subdomains.txt -f <WORDLIST> <DOMAIN> Using dig # Query DNS records dig hackviser.com # Query specific type of DNS records (e.g., A record) dig A hackviser.com # Perform a reverse DNS lookup dig -x <IP_ADDRESS> # Query a specific DNS server dig @<DNS_SERVER_IP> hackviser.com Using nslookup # Perform DNS queries nslookup hackviser.com # Query a specific type of DNS record (e.g., MX record) nslookup -type=MX hackviser.com # Query a specific DNS server nslookup ha...

Powershell Automation Basics - Part 1

Pentest Notes: PowerShell Automation - Basics Pentest Notes: PowerShell Automation - Basics These notes cover PowerShell automation for penetration testing, focusing on practical applications and techniques. What is PowerShell? A powerful scripting language and command-line shell built on the .NET framework, heavily integrated with Windows. Ideal for system administration and automation, making it a valuable tool for pentesters. Why PowerShell for Pentesting? Native to Windows: Pre-installed on most Windows systems. Object-oriented: Allows for complex data manipulation and interaction with APIs. Access to .NET Framework: Enables interaction with a vast library of classes and functions. Remoting capabilities: Execute commands on remote systems. Bypass security restrictions: Can be used to circumvent some security measures if not properly configured. Basic Syntax Cmdlets: Commands in PowerShell (e.g., Get-Process , Get-Service , Get-ChildItem ). P...

Thread Modelling Cheatsheet: Know Your Weaknesses Before Attackers Do!

Threat Modelling Part - 1 What is Threat Modelling?      Threat modelling is the process of identifying, assessing, and mitigating potential security threats before they happen. It helps teams anticipate how systems can be attacked and build defences proactively , not reactively. Key Concepts Threat: Something (like a hacker or malware) that could exploit a weakness. Vulnerability: A flaw in your system that can be exploited. Risk: The chance that a threat will exploit a vulnerability to cause damage. Analogy : Threat = Burglar Vulnerability = Unlocked door Risk = Getting robbed because the door is open in a bad neighborhood  Threat Modelling Process (High-Level) Define the Scope – What systems/apps are you evaluating? Identify Assets – What needs protection? (e.g. data, services) Identify Threats – Think like an attacker. What could go wrong? Analyze Vulnerabilities – What weaknesses exist? Prioritize Ri...