hello and welcome to another episode of breaking stuff with Robert. Today we're going to be talking about Cherry Tree, which is a hierarchical note taking application that uses rich text on Cem syntax, highlighting
that you can do within that you can store data in single ex email or SQL like files, and it does allow you to do some password protection against us, which is great. We'll show you how to do that.
All items, you know, such as folder sub folders, notes etcetera are what are called nodes in this particular application. So when we're using nodes in this, that's what we're talking about on Dhe. Really?
Anything you're looking to do with this,
you're going to be able to do as far as taking notes. And so in this course, we're gonna show you how that works. Provide you with the demo
target audience is here again. Anyone looking to keep track of information? If you're doing a project, you've got some testing. You're doing network information that you're trying to store really anything you can think of. You can store in this application if you're not doing it somewhere else. Already
prerequisites here is really a need for a flexible note taking tool. If you're just looking for something to use, you know, to kind of gather evidence or while you're testing whatever the case may be, this is great
and, as we say, a fundamental knowledge of Cali Lennox command line utilization. Because you have to pull up a terminal and put cherry tree in tow. Pull it up if you're using Callie Lennox. So with those things in Mom, let's go ahead and jump into our demo environment.
Hello and welcome everybody into our handy dandy *** machine. Let's jump right into our quick review here of Cherry Tree so you might notice that I have this final in the top left hand corner of my desk top. We'll go over that here shortly,
but what that does is I've saved an example file, and it is currently password protected. So on tight cherry Tree in, it'll open that previous instance, and I have to enter a password
open that So the reason we wanted that is because if we're working with sensitive data sets, we wanna try to do everything we can to protect that information.
So on the left hand side, here. I've already created some nodes. The way that we can do that is you've got creative and a note here, apparent node or to the selected note. And then you can do a sub node or a child node. And so when we hit that button,
just do a test here.
You see that That creates
test under, um,
this particular tree or this set of notes that we've got created. And then if I want to put a sub note under that,
I can do test one or test whatever the case may be here, you'll see that that creates a stub, notes. So this creates a primary never like this one
or this one. And then in this case, this created a sub net like here.
And so where that could be beneficial is like I just did like security things, right? That's just kind of the primary know that I'm keeping track of security things under, and I've got an I P address here that I did some security things too, And so I validated
and I p address using, if config. I put some basic notes here on a figure. Maybe I'm gonna take this and put it in a report later or something more formal
on. Then I've got, you know, in in maps, can
and a snippet here. And then I kind of highlighted a port here that was of interest.
And then we get a in cat connection to that particular port and were able to get into the system that we were looking at. So, you know, really, really easy. All of this was copy paste, ragging drop. Just click into a space and you can enter text a scene here.
It's pretty easy to to go through the motions of laying out text. It's it's rich text
and so really easy to work with there.
If for any reason I found that I didn't need a node
or I needed to change the properties, you can right click a sub note or a primary node here
and you can change some of the properties. Delete. It changed the name of it. So one of that to be test dash one or something like that, I can change it and make it bold. Do some additional information if I want to be plain text. Whatever the case may be. An attack for searching.
You can do all of that here and you can see that that updates the node. You've got some four manning options here at the top, as well as some things that you can do for bullet lists, numbering, etcetera. And then, as I was saying earlier, I made this file to where you know you have to enter a password to open it so you could go file, save as,
and then you can see here. It's got some options. So SQL light not protected or password protected. Same thing XML protected, not protected. You enter password here twice. Okay. And that saves it. Is that file type with that type of password against it? So when you come back later and try to open it or somebody else tries to get into it, they have to have the password.
So that's pretty much the high level for cherry tree. A lot of this is just getting in here and kicking the tires and seeing what you can do with it, how it'll really fit kind of your day to day. Or if it could be worked into a project where you've got maybe a note here for each major phase of that, or for each major major phase of testing, whatever the case may be. And then you
keep track your notes
and then export that all out. You can export this to a pdf by just clicking. Pdf here, and you can do it by selected node or the whole tree.
And then we'll just take that and save it to the desktop for now, in the form that it wants to as far as the name. And then it's not pretty. But it's something that you can take and either attached to a report as evidence or whatever the case may be. There you can see that it had those nodes in some notes, but there was no information
in those, and so it didn't populate that with any data. But if you had put something there, it would have populated this such
So I hope that you enjoyed the demo. Let's go ahead and jump back over to our slides.
All right, so I hope you enjoyed that demo of Cherry Tree and some of the things that it has to offer. Maybe you've got a good use case for it now or Maybe you've got enough knowledge of it to at least get in there and kick the tires on it and see if there's something that you can use with that. So I hope you enjoyed that demo. With that in mind, I want to thank you for your town today,
and I look forward to seeing you again soon.
How to Use Doona (BSWR)
Doona is a network protocol fuzzing tool and it is a fork of the Bruteforce ...
Certificate of Completion Offered
How to Use CaseFile (BSWR)
In this course we will cover the tool CaseFile. CaseFile builds graphs with offline data ...
Certificate of Completion Offered