# Welcome to Disboard

<figure><img src="https://3194248079-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MMRDc44tPNsBhsf--dD%2Fuploads%2Fq5GbIeICETTOKgF0chT2%2Fchess_icon.png?alt=media&#x26;token=ccd73c57-9b86-499d-a9a9-d468b0e8a738" alt="" width="375"><figcaption></figcaption></figure>

### About This Board

Welcome to **Disboard**, your digital *command center* for hacking know-how and strategic mastery. Here, reconnaissance meets logic, and exploits are executed with the precision of a well-played chess match.

Delve into a realm where each technique—from **Web Hacking** to **Privilege Escalation**—is a chess piece on a board of discovery.

***

### Your Setup — “Opening Moves”

* **King (Reconnaissance)** – Scout your opponent. Initiate moves like `nmap`, `dirsearch`, and passive reconnaissance to gain early intel.
* **Queen (Exploitation)** – Command powerful tools like Metasploit, shells, and payloads to strike with precision.
* **Rook (Enumeration & Privilege Escalation)** – Control the field. Move laterally through enumeration, root access, and privilege escalation on Windows or Linux.
* **Bishop (Tools & Techniques)** – Penetrated from angles: Hydra, Wireshark, Steganography, and more.
* **Knight (Offensive Moves)** – Surprise your target with lateral attacks: reverse shells, hash cracking, or stealthy pivots.
* **Pawns (Utilities & Quick Tricks)** – Basic essentials: netcat, Bash one-liners, compiling C exploits, helpful l33t tricks.

***

### Choose Your Game Mode

| Mode                    | Objective                                      | Signature Move                                                           |
| ----------------------- | ---------------------------------------------- | ------------------------------------------------------------------------ |
| **Recon Chess**         | Gather intel across your network and targets   | `nmap -sV`, `smbmap`, `enum4linux`                                       |
| **Exploit Checkmate**   | Deliver the final blow with exploitation tools | Metasploit, reverse shells, MSFvenom payloads                            |
| **Privilege Promotion** | Elevate access to root—or beyond               | `chmod u+s`, SUID binaries, sudoers edits                                |
| **Tool Blitz**          | Rapid-fire tactical maneuvers                  | Hydra cracking, fuzzing, XSS, SQLi — think blitz chess, fast and furious |

***

### Tactical Resources

* **Quick Guide (Your Opening Repertoire)** – Fast-reference commands like `nmap`, `sam­ba`, `dirsearch`, and shell escapes.
* **Reconnaissance** – Passive & active methods for probing and mapping your network.
* **Enumeration** – Dive deep into SMB, services, protocols, and hidden vectors.
* **Web Attacks** – Exploit the web: OWASP Top 10, SQL Injection, XSS, fuzzing, API vulnerabilities.
* **Privilege Escalation** – Dominate Linux and Windows environments.
* **Exploitation Tools** – Metasploit, shells, KOTH, source review, and payload crafting.
* **Training Arenas** – Collections like Hack the Box, TryHackMe, CompTIA labs, and more.

***

### Ready to Execute Your Strategy?

The board is set. Choose your opening, plot your attack, and crown yourself with mastery.

**Start exploring** your favorite move—or play your best game.

***

> *“In hacking and chess alike, the most powerful position arises not from brute strength, but from a well-calculated approach.”*\
> — *The Grandmaster of Code and Chaos*


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://tjf952.gitbook.io/disboard/welcome-to-disboard.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
