Quickstart Guide
This guide will help you navigate the safesploitOrg documentation effectively and find the information you need quickly.How to Navigate the Documentation
Identify Your Goal
Determine what you’re trying to accomplish:
- Learning a new skill? → Start with Guides
- Implementing something properly? → Check Best Practices
- Understanding a production incident? → Review Case Studies
- Meeting compliance requirements? → Explore Compliance
- Quick command reference? → Jump to Cheatsheets
Use the Search Function
The documentation search is your fastest path to specific information:
- Search for specific technologies (e.g., “nftables”, “LVM”, “AWS VPC”)
- Search for concepts (e.g., “VLAN trunking”, “zero-trust”, “secrets management”)
- Search for compliance frameworks (e.g., “NIST 800-53”, “Cyber Essentials+”)
Browse by Category
Use the sidebar navigation to explore content by category:
- Best Practices — Organized by domain (Linux, Networking, Cloud & DevOps, Security)
- Guides — Grouped by technology area with step-by-step instructions
- Case Studies — Sorted chronologically by incident date
- Compliance — Structured by framework and regulatory requirement
Quick Links to Popular Content
Linux Best Practices
Hardening, storage management, firewall configuration, and system observability
Networking Guides
VLAN trunking, CIDR notation, routing protocols (OSPF, BGP), and AWS VPC basics
Storage Management
LVM operations, Ceph networking, online resizing, and troubleshooting
Security Frameworks
NIST 800-53, ISO 27001, Cyber Essentials+, and CIS Benchmarks
AWS Incident Analysis
DNS bug in US-EAST-1 causing global DynamoDB endpoint failure
Azure Outage Study
Azure Front Door / CDN routing failure across multiple regions
Cloudflare Post-Mortem
Global outage from malformed bot-management configuration
Password Security
Creating strong, memorable passwords without password managers
Finding Specific Content Types
Guides (How-To)
Guides provide step-by-step instructions for specific tasks:- Linux Administration — RHEL9 nftables migration, system configuration
- Networking — Subnetting with VLSM, route tables, VLAN configuration
- Cloud & DevOps — AWS VPC setup, routing strategies
- Security — Password creation, authentication hardening
Best Practices (Why & When)
Best practices explain the reasoning behind technical decisions:- Linux — Firewall rule management, storage configuration, observability patterns
- Networking — Secure network segmentation, VLAN design, VPN setup
- Cloud & DevOps — Infrastructure as Code, CI/CD security, container hardening
- Security — Secrets management, MFA enforcement, audit logging
- Documentation — Runbook writing, disaster recovery planning
Best practices combine technical implementation with operational context and security considerations.
Case Studies (Learn from Incidents)
Case studies analyze real-world outages and incidents:- Executive summaries for quick understanding
- Technical root cause analysis with diagrams
- Timelines showing how incidents unfolded
- Impact assessments on services and users
- Lessons learned for DevOps, DevSecOps, and SRE teams
- Architecture diagrams illustrating failure modes
Compliance Documentation
Compliance resources help align your infrastructure with industry standards:- Standards & Frameworks — NIST 800-53, ISO 27001, CIS Benchmarks
- Policies — Access controls, backup policies, operational standards
- Audits & Checklists — Self-assessment templates and readiness guides
- Regulatory — GDPR, HIPAA, Cyber Essentials+ requirements
Cheatsheets (Quick Reference)
Cheatsheets provide concise command references:- AWK — Text processing and data extraction patterns
- PowerShell — Common cmdlets and scripting patterns
- More tools being added continuously
Tips for Using the Documentation Effectively
1. Start Broad, Then Narrow
Begin with overview pages (like/guides/overview or /best-practices/overview) to understand the landscape, then drill down into specific topics.
2. Cross-Reference Related Topics
Many topics span multiple sections. For example:- Firewall configuration appears in both Guides (how-to) and Best Practices (principles)
- Storage management includes Linux guides, best practices, and troubleshooting
3. Learn from Real Incidents
Case studies provide context for why certain practices matter:- Read about AWS US-EAST-1 outages to understand DNS dependency risks
- Study Azure CDN failures to learn about routing resilience
- Analyze Cloudflare incidents to see configuration management importance
4. Bookmark Key References
Create bookmarks for pages you reference frequently:- CIDR notation tables
- Compliance checklists
- Command cheatsheets
- Architecture decision records
5. Understand the “Why” Not Just the “How”
The documentation emphasizes reasoning behind decisions:- Why use nftables over iptables?
- Why implement specific VLAN segmentation?
- Why certain compliance controls matter?
Understanding the “why” helps you adapt practices to your specific context rather than blindly following instructions.
Documentation Structure Overview
Content Organization Principles
By Domain
Content is organized by technical domain (Linux, Networking, Cloud, Security) making it easy to find related information.
By Use Case
Multiple entry points exist for the same content — find information by what you’re trying to accomplish.
Cross-Linked
Heavy use of internal links connects related concepts and creates learning paths through the documentation.
Public-Safe
All content is sanitized to share knowledge without exposing sensitive implementation details or credentials.
Next Steps
Now that you understand how to navigate:Explore Best Practices
Start with foundational practices in Linux and systems, then expand to cloud and DevOps.
Read a Guide
Pick a technical guide that matches your current learning goals or project needs.
Study an Incident
Learn from real-world outages at major cloud providers and what they teach us.
Check Compliance
Review security frameworks and regulatory requirements relevant to your environment.