# Hello!

Welcome to Marial's Notes, a growing collection of my experiences from labs and security exercises. This is just a starting point—more will be added soon as I continue to build and refine my work.

### PentesterLab Free Tier Labs

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><strong>Recon Badge</strong></td><td>The Recon badge is a set of 27 exercises created to help you learn Reconnaissance. From findings usual files down to DNS and TLS exploration, this badge will help you get better at finding new targets.</td><td><a href="pentesterlab-labs/recon-badge">recon-badge</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2Feg8WXVhCrXvpsqYck7gC%2FNOTES%20(4).png?alt=media&#x26;token=b83567b1-5c9e-4fb7-85c6-a061b8fe2d4c">NOTES (4).png</a></td></tr></tbody></table>

### TryHackMe Rooms

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><strong>Basic Pentesting</strong></td><td>This is a machine that allows you to practise web app hacking and privilege escalation</td><td><a href="tryhackme-rooms/basic-pentesting">basic-pentesting</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2Fsa1XYzskG2GyCv4ytGX9%2FNOTES%20(2).png?alt=media&#x26;token=d86ada3e-e6d8-44f8-afbd-00f2cd494445">NOTES (2).png</a></td></tr><tr><td><strong>EasyPeasy</strong></td><td>Practice using tools such as Nmap and GoBuster to locate a hidden directory to get initial access to a vulnerable machine. Then escalate your privileges through a vulnerable cronjob.</td><td><a href="tryhackme-rooms/easypeasy">easypeasy</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2FUjAMZuZXjhKlRFgZvIdt%2FNOTES%20(3).png?alt=media&#x26;token=1095d3cc-ae46-4fff-a0ff-e3154aa0e3c5">NOTES (3).png</a></td></tr><tr><td><strong>Kenobi</strong></td><td>Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation.</td><td><a href="tryhackme-rooms/kenobi">kenobi</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2FPAMX9ZaCjGqlcoklWWMx%2FNOTES%20(5).png?alt=media&#x26;token=d4c25841-cd87-4079-8b73-962911adfe49">NOTES (5).png</a></td></tr><tr><td><strong>Vulnversity</strong></td><td>Learn about active recon, web app attacks and privilege escalation.</td><td><a href="tryhackme-rooms/vulnversity">vulnversity</a></td><td><a href="https://290105472-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F89FZKOizBQcf0e0Qdrp8%2Fuploads%2FaCZh6TRQUxTA12Rljezy%2FNOTES%20(6).png?alt=media&#x26;token=c639b035-00f6-4145-b670-b3ae89ada922">NOTES (6).png</a></td></tr></tbody></table>

{% hint style="danger" %}
The content and notes provided on this website are for educational purposes only and should be used to promote ethical and responsible practices in penetration testing. I do not claim ownership of any tools mentioned; they are collected and shared based on what works for me in my learning journey. Any misuse of the information or tools found on this site for malicious purposes is strictly prohibited. I am not liable for any actions based on the information provided here. **Always ensure you have proper authorization before engaging in any form of testing.**
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.marialc.com/hello.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
