Best Folder Naming System for Kioptrix Level Notes and Evidence: A Clean CTF Workflow That Future-You Will Actually Understand

Kioptrix folder naming system

Mastering the Kioptrix Workflow: From Chaos to Clarity

A Kioptrix folder does not become chaos all at once. It starts quietly: one Nmap scan named scan.txt, a screenshot with no command visible, and a “final” note file that somehow has three cousins. A clean folder naming system fixes that before the mess hardens.

The real pain is not storage—it is retrieval. Stop performing digital archaeology on your own files. This guide provides a repeatable, disciplined CTF workflow designed for OSCP-prep, home labs, and professional bloggers.

  • Start with the skeleton: One case folder per level.
  • Maintain context: Numbered phase folders and clear screenshot names.
  • Report-ready: Disciplined scan outputs and evidence management.

Intentionally boring, tested against real lab friction, and designed for authorized practice only. Let future-you understand the story in seconds.

Kioptrix folder naming system

Why Folder Names Break First

The Real Problem Is Not Storage

Most Kioptrix learners think the problem is note-taking. It usually is not. The real problem is retrieval. Can you find the scan that showed port 139? Can you find the screenshot where SMB shares appeared? Can you find the command that worked before the caffeine wore off and your terminal history became a fossil bed?

Kioptrix is often used as a beginner-friendly vulnerable VM series for learning vulnerability assessment and exploitation in controlled environments. That means the work is not just “solve the box.” The work is learning how to observe, record, compare, and explain what happened. If you are still building your foundation, a simple Kioptrix for beginners workflow can make the first few sessions feel less like wandering through a dark server closet.

A good folder system turns a lab session into a trail. A bad one turns it into digital soup. Soup has its place. Evidence management is not one of them.

Evidence Has a Memory Problem

Screenshots, terminal logs, copied commands, payload notes, exploit references, and final proof files all lose meaning quickly. During the session, everything feels obvious. Tomorrow, the same files look like cave paintings made by someone with strong opinions about SMB.

I learned this the dull way: by reopening an old lab folder and finding five files named scan.txt. One of them mattered. None of them volunteered which one.

The naming system has one job: preserve context when your memory stops being helpful.

The Tiny Naming Choice That Saves Hours

Every folder and file should quietly answer five questions:

  • What Kioptrix level is this?
  • What phase of the workflow does it belong to?
  • What tool, service, or finding does it involve?
  • What does the artifact prove?
  • Should it support the final write-up?
Takeaway: A folder name is not decoration; it is a tiny retrieval engine.
  • Use names that explain purpose.
  • Keep phases separate.
  • Make evidence easy to cite later.

Apply in 60 seconds: Rename one vague file today from screenshot.png to a name that states what it proves.

Start With One Master Folder

Use a Root Folder That Survives Every Tool Change

Begin with one plain parent folder:

kioptrix-labs/

This is intentionally boring. That is the point. A tool-neutral root folder survives your changing habits. Today you may use Obsidian. Tomorrow you may try CherryTree, Notion, VS Code, Logseq, Joplin, or plain Markdown in a terminal. Your folder system should not care. It should sit there calmly, wearing sensible shoes.

Do not name the root folder after your note app. Do not name it after Kali. Do not name it hacking-stuff unless you enjoy creating future legal and organizational fog.

Keep Kioptrix Separate From Random CTF Clutter

Mixing Kioptrix with TryHackMe, Hack The Box, PortSwigger labs, random VulnHub machines, and “one day I’ll organize this” downloads creates slow chaos. At first, it feels efficient. Then you spend 20 minutes hunting for a single screenshot while your motivation quietly leaves through the side door.

A clean split could look like this:

cyber-labs/ kioptrix-labs/ hack-the-box/ tryhackme/ portswigger-academy/ notes-and-cheatsheets/

One parent, clear children, no swamp. Future-you sends a small thank-you note.

Pattern Interrupt: Don’t Build a Cathedral for Five Boxes

Kioptrix does not need a majestic knowledge palace with seven taxonomies, colored tags, and a dashboard that requires maintenance like a houseplant with trust issues.

Build the system you will use after midnight. Build the one that still works when the coffee has become a personality trait and your eyes are doing that little unfocused dance.

Decision card:

Choose thisWhen it fitsTrade-off
Simple folder treeYou are learning Kioptrix, OSCP-style documentation, or CTF basics.Fast to maintain, slightly less searchable than a database.
Full note app systemYou already maintain Obsidian, Notion, or CherryTree daily.Powerful, but easy to overbuild.
Flat folder onlyYou want maximum speed for a short session.Becomes messy after 20 artifacts.

Neutral action: Start with the simple folder tree. Upgrade only when the pain is real.

Name Each Level Like a Case File

Use Level Number, Box Name, and Status

Each Kioptrix level should have its own folder. Think of it like a case file. Not dramatic. Not cinematic. Just practical.

kioptrix-labs/ kioptrix-level-01-in-progress/ kioptrix-level-02-not-started/ kioptrix-level-03-rooted/ kioptrix-level-04-report-done/ kioptrix-level-05-archived/

This naming style does three things well. It sorts cleanly. It tells you where you left off. It avoids mystery folders with names that feel funny once and useless forever. For learners moving through a sequence, a broader Kioptrix level guide can help connect each folder to the larger practice path.

When I return to a lab after a week, I do not want a riddle. I want a label that says, “You rooted this box, but the report still needs cleaning.” That is not glamorous. It is mercy.

Why Status Belongs in the Folder Name

Status tags help you resume work without rereading half your notes. For Kioptrix, use a small set:

  • not-started
  • in-progress
  • foothold
  • rooted
  • report-done
  • archived

Keep the status simple. Do not create 14 emotional states for one VM. Your folder system is not a weather app for your confidence.

Avoid Cute Names That Age Badly

Names like almost_root_lol, pain_box, kioptrix_real_final, and try_again_final_final feel expressive in the moment. Later, they become evidence of a small organizational crime.

Use names that work when you are calm, tired, rushing, or writing a blog post from the notes six months later.

Takeaway: The best case-file folder name tells you the box, level, and current state without opening anything.
  • Keep level numbers padded.
  • Use lowercase words.
  • Use one status vocabulary.

Apply in 60 seconds: Rename your current folder with this pattern: kioptrix-level-##_status.

The Evidence Tree That Stays Calm

Use Numbered Phase Folders

Inside each Kioptrix level, use numbered folders that follow the usual lab workflow:

kioptrix-level-01-in-progress/ 00-admin/ 01-recon/ 02-enumeration/ 03-vulnerability-research/ 04-exploitation/ 05-privilege-escalation/ 06-proof-and-evidence/ 07-report/ 99-archive/

The numbers are not decoration. They protect workflow order across macOS, Windows, Linux, cloud drives, terminals, and code editors. Alphabetical sorting is polite until it is not. Numbered sorting behaves.

Why Numbers Beat Alphabetical Order

Without numbers, exploitation may appear before enumeration. report may float in the middle. proof may wander around like a lost suitcase. Numbering keeps the story in the right order.

This matters because a Kioptrix write-up is not just a pile of artifacts. It is a sequence:

  1. You identified the target.
  2. You discovered services.
  3. You enumerated details.
  4. You researched a path.
  5. You gained access.
  6. You escalated privileges.
  7. You proved and explained the result.

The “99-archive” Safety Net

The 99-archive folder is where dead ends go to rest without haunting your main workflow. Failed exploit attempts, duplicate screenshots, rough logs, half-useful references, and rabbit holes can live there.

Do not delete too quickly. Failed paths often teach the most. They also stop you from repeating the same mistake next week, which is a quieter kind of victory.

Kioptrix Folder Flow: From Mess to Report

00
Admin
Scope, timeline
01
Recon
Nmap, discovery
02
Enum
Web, SMB, SSH
03
Research
Refs, CVEs, notes
04
Exploit
Attempts, working path
05
Privesc
Checks, proof
06
Evidence
Screens, logs
07
Report
Draft, final
Kioptrix folder naming system

Screenshot Names That Explain Themselves

Use Date, Level, Service, and Finding

Screenshots are seductive because they feel like proof. But a screenshot without context is only a tiny haunted postcard. It says, “Something happened.” It does not explain what, where, why, or whether it mattered.

Use this pattern:

YYYY-MM-DD_kioptrix-l01_service_finding_context.png

Examples:

2026-05-15_kioptrix-l01_smb-enum_share-list.png 2026-05-15_kioptrix-l01_web-dirb_admin-panel.png 2026-05-15_kioptrix-l01_root-proof_whoami-id.png

The Screenshot Rule: No Context, No Value

A useful screenshot should show enough information to support the story. Ideally, it includes the command, output, service, target context, or proof detail. A cropped result can be pretty, but pretty is not the goal. Report-ready is the goal. For a deeper naming habit, a ShareX screenshot naming pattern can help you standardize evidence captures before files start breeding in the dark.

I have taken beautiful screenshots that later proved almost useless. The command was missing. The target was not visible. The output was ambiguous. It was evidence-shaped confetti.

Here’s What No One Tells You…

Your screenshot naming system should make image previews less important. You should know what the file contains before opening it. That one change can save several minutes per write-up and a surprising amount of irritation.

Eligibility checklist: Is a screenshot worth keeping?

QuestionYes / NoNext step
Does it show a meaningful finding?YesName it by service and result.
Does it show the command or context?Preferably yesRetake if context is missing.
Will it help your report?MaybeAdd it to the evidence index.

Neutral action: Keep screenshots that prove something. Archive the rest.

Scan Output Needs Its Own Discipline

Save Raw, Clean, and Summary Versions

Scan output deserves its own system because scans are often the spine of the whole Kioptrix path. The first Nmap scan may reveal the service that matters. A later script scan may confirm the version. A screenshot may show the command that produced the result.

Use a dedicated scan folder like this:

01-recon/ nmap/ raw/ parsed/ screenshots/

The raw folder keeps original output. The parsed folder holds cleaned summaries or greppable versions. The screenshots folder captures visual proof when needed.

Name Scan Files by Tool and Scope

Good scan names tell you what happened without opening the file:

2026-05-15_kioptrix-l01_nmap-initial-tcp.txt 2026-05-15_kioptrix-l01_nmap-full-tcp.txt 2026-05-15_kioptrix-l01_nmap-udp-top100.txt 2026-05-15_kioptrix-l01_nmap-scripts-smb.txt

Notice the scope words: initial-tcp, full-tcp, udp-top100, scripts-smb. These are not fancy. They are useful. Useful beats fancy by a mile and usually has better shoes. If Nmap is still the noisy toolbox in the corner, this guide to using Nmap in Kali Linux for Kioptrix gives the scanning stage more shape.

Don’t Overwrite the First Scan

The first scan often matters later. It captures your original view of the target. If you overwrite it, you lose the beginning of the story.

Instead of saving everything as nmap.txt, save each meaningful scan separately. Storage is cheap. Confusion is expensive.

Show me the nerdy details

For scan artifacts, raw output is the original record, parsed output is the working interpretation, and screenshots are visual support. Keeping all three prevents accidental loss of context. If a later enumeration step depends on a port, version, banner, or script result, the raw file lets you verify the exact source instead of trusting memory or copied notes.

Notes Folder vs Evidence Folder

Keep Thinking Separate From Proof

Notes and evidence are cousins, not twins. Notes can be messy, conversational, and half-formed. Evidence should be clean enough that a reader can understand what it proves.

A helpful split looks like this:

00-admin/ scope.md timeline.md commands-cheatsheet.md 06-proof-and-evidence/ screenshots/ terminal-output/ credentials/ final-proof/

Your notes folder is where you think. Your evidence folder is where you support claims. Mixing the two is how a final report becomes archaeology.

Notes Are Messy; Evidence Should Be Clean

Scratch notes can include guesses, “try this later,” half-formed theories, and small emotional noises. That is fine. Learning is not sterile.

Evidence, though, needs enough clarity to support a final write-up. A terminal output file should say what command ran. A screenshot should say what it proves. A credentials file should identify where the credential was found and whether it worked.

I keep a messy timeline.md because it gives the session a pulse. It might say, “Tried SMB first. Got distracted by web. Came back after version clue.” That is not polished, but it helps me reconstruct the work. A dedicated Kioptrix technical journal can keep those thoughts readable without forcing every note to wear a tie.

The “I Know What Happened” Trap

During the session, memory feels reliable. By tomorrow morning, it has packed a small suitcase and left. This is why your folder system must capture context as you go.

Takeaway: Let notes be human, but make evidence auditable.
  • Use admin files for scope and timeline.
  • Use evidence folders for proof files.
  • Keep credentials in one controlled place.

Apply in 60 seconds: Create timeline.md and add the first three actions you took.

Who This Is For / Not For

Best For Kioptrix Beginners and OSCP-Prep Learners

This system is best for cybersecurity learners who need repeatable habits. It is especially useful if you are working through Kioptrix, preparing for OSCP-style documentation, practicing report writing, or trying to stop your Downloads folder from becoming a threat model.

It also helps if you are the kind of learner who solves something once, then forgets the path. That is most of us. Anyone claiming perfect memory after three hours of enumeration should be offered water and gentle skepticism.

Also Useful for Blog Write-Ups

If you publish walkthroughs, tutorials, or study reflections, this structure saves you from hunting through random artifacts later. Your screenshots are already named. Your evidence is already grouped. Your report folder already contains polished images.

That means your blog post can focus on explanation instead of recovery. There is a difference between writing and excavating. One feels creative. The other feels like arguing with a drawer. When the folder is clean, turning the work into a technical write-up becomes less about rescue work and more about teaching.

Not For Unauthorized Testing

This workflow is for owned labs, intentionally vulnerable VMs, classroom environments, employer-approved training ranges, and authorized practice. It is not a workflow for testing real systems without permission.

That boundary matters. Good documentation habits are professional habits. So is staying inside scope.

Quote-prep list for a lab report or blog write-up:

  • Target name and level.
  • Lab source and scope statement.
  • Initial scan summary.
  • Key enumeration evidence.
  • Working exploitation path.
  • Privilege escalation proof.

Neutral action: Write a one-sentence scope statement before the first scan.

Common Mistakes That Turn Notes Into Soup

Mistake 1: Mixing Every Box in One Folder

A folder called ctf-stuff/ feels flexible for about three machines. Then it becomes a swamp with terminal logs, screenshots, payloads, wordlists, old reports, and a file named important.txt that contains no emotional support whatsoever.

One box, one case folder. That single rule prevents most mess.

Mistake 2: Saving Only Screenshots, Not Commands

Screenshots show what happened. Commands show how it happened. You need both. A screenshot of a shell is useful. A terminal log showing the command sequence is better. A report that includes the relevant command, output, and explanation is best.

Mistake 3: Renaming Files Only at the End

Renaming everything at the end sounds efficient until every file looks familiar and suspicious at the same time. Rename as you capture. It adds seconds now and saves minutes later.

Mistake 4: Hiding Credentials in Random Notes

Credentials should live in one controlled file:

06-proof-and-evidence/credentials/credentials-found.md

Include where each credential came from, what service it worked on, and whether it was reused. Do not scatter passwords across screenshots, scratch notes, and terminal scrollback like confetti at a very anxious parade.

Mistake 5: Treating Failed Paths as Trash

Failed paths are not always trash. They show your reasoning. They help you avoid repeated mistakes. They can make a final write-up more honest, especially when explaining why one path was abandoned. A review habit, especially after a messy session, can turn those failed paths into durable lessons instead of loose cables on the floor.

Takeaway: Most CTF note chaos comes from mixing artifacts, delaying names, and deleting dead ends too early.
  • Separate each box.
  • Name files immediately.
  • Archive failed paths instead of erasing them.

Apply in 60 seconds: Add a 99-archive folder to your current Kioptrix level.

A Simple File Naming Formula

The Five-Part Naming Pattern

Use this file naming formula:

date_box_phase_tool_or_service_result.ext

Examples:

2026-05-15_kioptrix-l02_enum_http_login-page.png 2026-05-15_kioptrix-l02_exploit_web-shell-upload.txt 2026-05-15_kioptrix-l02_privesc_kernel-version.txt

The exact words can vary, but the logic should not. Date first. Box second. Phase third. Tool or service fourth. Result last.

Use Hyphens Inside Ideas, Underscores Between Ideas

This is a small habit with a large payoff:

  • Use underscores to separate major parts.
  • Use hyphens inside a phrase.
  • Keep everything lowercase.

So instead of:

Kioptrix Level 2 Web Shell Upload Final Screenshot.png

Use:

2026-05-15_kioptrix-l02_exploit_web-shell-upload.png

Keep Everything Lowercase

Lowercase names reduce friction across systems, terminals, scripts, shell autocompletion, cloud sync, and your own tired eyes. Capitalization is not evil. It is just one more tiny thing that can go sideways.

Mini calculator: filename clarity score

Give yourself 1 point for each item your filename includes:

  • Date
  • Kioptrix level
  • Phase
  • Tool or service
  • Result or proof value

Score: 4–5 is report-ready. 2–3 needs context. 0–1 is a mystery object.

Neutral action: Fix any file scoring below 3 before ending the session.

Build a Report-Ready Workflow

Put Final Evidence Where Your Report Can Find It

Your report folder should be clean. It should not contain every experiment, screenshot, half-written command, and abandoned idea. Those belong elsewhere.

Use this:

07-report/ draft.md final.md images/ references.md

The report folder is for polished or report-bound material. Think of it as the dining table, not the garage. If you want the finished document to feel more professional, these Kioptrix report writing tips can help translate evidence into a clear reader-friendly narrative.

Use One Evidence Index

An evidence index turns your artifacts into a usable map. Create this file:

06-proof-and-evidence/evidence-index.md

Use simple fields:

Evidence ID: File name: What it proves: Related command: Related note section: Use in report? yes/no

This does not need to be elaborate. Five useful entries are better than an empty perfect template.

Don’t Make the Report Folder a Junk Drawer

When everything goes into the report folder, the report folder stops meaning anything. Keep raw scans in recon. Keep rough attempts in exploitation. Keep screenshots in evidence. Copy only final, polished images into 07-report/images/ when needed.

Takeaway: A report-ready workflow starts before the report exists.
  • Index evidence as you go.
  • Separate draft files from raw artifacts.
  • Move only polished images into the report folder.

Apply in 60 seconds: Create evidence-index.md with one entry for your strongest proof file.

Short Story: The Screenshot That Couldn’t Testify

I once had a perfect-looking screenshot from a lab session. The terminal was crisp. The output looked important. The image had that “this belongs in the write-up” confidence. Then I opened it two weeks later and realized it did not show the command, the target, or the service.

It was a dramatic photograph of a conclusion with no witness statement. I spent 30 minutes retracing the path just to prove what the image should have explained in 10 seconds. Since then, I name evidence like I am writing a note to a future stranger. Because in practice, I am. Future-me has the same face, but far less context and a much shorter temper.

The Minimal Template to Copy

Starter Folder Tree

Here is the full starter structure. Copy it, adjust it, and keep it boring enough to survive real use:

kioptrix-labs/ kioptrix-level-01-in-progress/ 00-admin/ scope.md timeline.md 01-recon/ nmap/ network-discovery/ 02-enumeration/ web/ smb/ ssh/ other-services/ 03-vulnerability-research/ references.md exploit-notes.md 04-exploitation/ attempts/ working-path/ 05-privilege-escalation/ system-info/ privesc-checks/ working-path/ 06-proof-and-evidence/ screenshots/ terminal-output/ credentials/ final-proof/ evidence-index.md 07-report/ draft.md final.md images/ 99-archive/

Starter File Naming Pattern

Use this pattern for most artifacts:

YYYY-MM-DD_kioptrix-l##_phase_tool-service_result.ext

For example:

2026-05-15_kioptrix-l01_recon_nmap-initial-tcp.txt 2026-05-15_kioptrix-l01_enum_smb-share-list.png 2026-05-15_kioptrix-l01_privesc_whoami-id.txt 2026-05-15_kioptrix-l01_report_final-images-root-proof.png

Pattern Interrupt: Boring Is the Upgrade

The best naming system should feel almost too plain. That is the upgrade. Fancy folders impress you once. Boring folders rescue you repeatedly.

If your system requires inspiration, it will fail on tired days. If it requires only small predictable choices, it will keep working.

Coverage tier map: how much structure do you need?

TierBest forWhat changes
Tier 1One quick Kioptrix attemptUse level folder plus screenshots and notes.
Tier 2Beginner practiceAdd numbered phase folders.
Tier 3OSCP-style habitsAdd evidence index and report folder.
Tier 4Blog publishingAdd polished images and references.
Tier 5Repeatable lab portfolioAdd templates across all boxes.

Neutral action: Most learners should start at Tier 2 or Tier 3.

Kioptrix folder naming system

FAQ

What is the best folder structure for Kioptrix notes?

The best folder structure uses one folder per Kioptrix level, then separates recon, enumeration, vulnerability research, exploitation, privilege escalation, proof, and reporting into numbered subfolders. This keeps the workflow in order and prevents screenshots, scans, and notes from merging into one confusing pile.

Should I keep screenshots and notes in the same folder?

Usually no. Keep notes and evidence separate. Notes can be messy because they capture thinking. Evidence should be cleaner because it supports a final report, walkthrough, or study review. A simple split between 00-admin, 06-proof-and-evidence, and 07-report works well.

How should I name Kioptrix screenshots?

Name Kioptrix screenshots with the date, Kioptrix level, phase or service, and what the screenshot proves. A useful pattern is YYYY-MM-DD_kioptrix-l##_phase_service-result.png. For example, 2026-05-15_kioptrix-l01_enum_smb-share-list.png is much clearer than Screenshot_238.png.

Should failed exploit attempts be saved?

Yes. Save failed attempts in an attempts folder or 99-archive. Failed paths help you understand your reasoning, avoid repeating mistakes, and explain why the final path worked. Just keep them out of the polished report folder so they do not clutter final evidence.

Is this folder system useful for OSCP prep?

Yes. A repeatable Kioptrix evidence system builds habits that transfer well to OSCP-style lab documentation: clean scans, clear commands, separated proof files, controlled credentials notes, and report-ready images. The structure is simple enough for beginners but disciplined enough for serious practice.

Can I use this system with Obsidian, Notion, CherryTree, or plain Markdown?

Yes. The system is tool-neutral. It works with Obsidian, Notion exports, CherryTree, VS Code, Logseq, Joplin, or plain Markdown folders. Markdown is especially portable because it stays searchable, easy to back up, and readable outside a single app. If you are choosing tools, a practical Kioptrix note-taking tool comparison can help you avoid building a museum when you only need a workbench.

Where should I store found credentials in a Kioptrix lab?

Store found credentials in one controlled file, such as 06-proof-and-evidence/credentials/credentials-found.md. Include the source, service, username, password or hash, whether it worked, and any related screenshot or command output. Do not scatter credentials across random notes.

How detailed should my Kioptrix evidence index be?

Keep it simple. Each entry should include the evidence ID, file name, what it proves, related command, related note section, and whether it belongs in the report. The index is not meant to become another project. It is a map back to your proof.

Next Step: Build One Empty Level Folder Today

The cleanest Kioptrix folder system does not begin after root. It begins before the first scan. That is the small trick that closes the loop from the opening problem: you are not trying to organize the mess afterward. You are building a little net that catches evidence as it happens.

Create this folder today:

kioptrix-labs/kioptrix-level-01-in-progress/

Then add the numbered subfolders from the starter template. Do not wait until the box is solved. By then, the trail has already gone cold, and your screenshots have started speaking in riddles.

For broader cybersecurity learning structure, NIST’s NICE framework is useful because it treats cybersecurity knowledge and work roles as organized building blocks rather than random tricks. That same mindset applies here: name the work so you can repeat the work. If you want to build the habit beyond one box, a Kioptrix lab consistency system can keep your practice from turning into a heroic burst followed by three weeks of silence.

Your 15-minute action: create the skeleton, add scope.md, add timeline.md, and save your first scan with a real name. That is enough. The folder does not need to sing opera. It only needs to help future-you find the truth without opening 37 mystery files.

Last reviewed: 2026-05.