Exploit Guide

Exploit Guide

  • Web Application Security
  • Network Security
  • Cheat Sheets
  • Reading Material
  • About Me

›Reading Material

Reading Material

  • Reading Material
Edit

Reading Material

Understanding the basics

Understanding the hacker’s Lingo: http://bedaone.blogspot.com/p/chapter-1-introduction-to-ethical.htm

Networking:

https://www.geeksforgeeks.org/basics-computer-networking/

Computer Security Basics: http://www.ccl.net/cca/documents/dyoung/topics-orig/security1.html

Basic Security Concept:

https://www.prolifics.com/blog/basic-concepts-security

Password cracking:

https://www.youtube.com/watch?v=RtUvMJFP_IE

Now you have gone through the Networking Basics now test it

Testing your networking skills

https://www.proprofs.com/quiz-school/story.php?title=technical-skills-test

Understanding Web Application Vulnerability

OWASP Top Ten 2017: https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf

SQL Injection attack and its prevention: https://medium.com/bugbountywriteup/how-to-write-secure-code-against-injection-attacks-aad4fff058da

XSS attack and prevention: - https://medium.com/@charithra/introduction-to-xss-e9eb90b4323d

XSRF attack: https://medium.com/@xBBsec/csrf-medium-security-dvwa-writeup-f0b5f5c9b160

Understanding Network Security

Network Security: https://www.cisco.com/c/en/us/products/security/what-is-network-security.htm

Linux Command: - https://www-uxsup.csx.cam.ac.uk/pub/doc/suse/suse9.0/userguide-9.0/ch24s04.html

Port Scanning With Nmap:

https://nmap.org/book/port-scanning-tutorial.html

https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/

Packet Sniffing with Wireshark

https://www.youtube.com/watch?v=r0l_54thSYU

Metasploit:

https://www.offensive-security.com/metasploit-unleashed/exploits/

Understanding the Programming Fundamentals

SQL:-https://www.sohamkamani.com/blog/2016/07/07/a-beginners-guide-to-sql/

Html: - https://www.w3schools.com/html/

JavaScript: -https://www.w3schools.com/js/default.asp

Now you have gone through the Programming Fundamental now test it

Testing your Scripting Skills

https://www.hackertest.net/

Understanding Cryptography

https://www.synopsys.com/software-integrity/resources/knowledge-database/cryptography.html

Understanding Mobile Security https://appsecwiki.com/#/mobilesecurity

Cheat Sheets: -These are links that come in handy when you perform different attacks in the labs.

https://github.com/OWASP/CheatcomeSheetSeries/tree/master/cheatsheets

https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet

https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.md

https://portswigger.net/web-security/sql-injection/cheat-sheet

https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.md

https://files.fosswire.com/2007/08/fwunixref.pdf

https://www.loggly.com/wp-content/uploads/2015/05/Linux-Cheat-Sheet-Sponsored-By-Loggly.pdf

https://blogs.sans.org/pen-testing/files/2013/10/NmapCheatSheetv1.1.pdf

https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf

EXTRA STUFF

Books: - In this section, we have provided you with a list of books that would be extremely helpful when you start the course.

Gray Hat Hacking: The Ethical Hacker's Handbook

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

OWASP Testing Guide v4

Hacking, 2nd Edition: The Art of Exploitation

HACKING EXPOSED: NETWORK SECURITY SECRETS AND SOLUTIONS, THIRD EDITION

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The Art of Deception: Controlling the Human Element of Security

Cracking Codes with Python

News related to cybersecurity

https://thehackernews.com/

https://news.ycombinator.com/

https://www.cshub.com/

https://threatpost.com/

Blogs and Youtube channel

https://null-byte.wonderhowto.com/

https://www.darknet.org.uk/

https://www.hackerone.com/blog

https://www.youtube.com/user/JackkTutorials

https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/featured

Tools

These tools will come in handy while going through the

Ettercap: - https://www.thegeekstuff.com/2012/05/ettercap-tutorial/

SQL Map: - https://hackertarget.com/sqlmap-tutorial/

Burp suite: -https://jonathansblog.co.uk/burpsuite-beginners-tutorial

John the Ripper: - https://www.openwall.com/john/doc/EXAMPLES.shtml

LOIC: https://github.com/NewEraCracker/LOIC-

Hydra: - https://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-online-passwords-with-tamper-data-thc-hydra-0155374/

Gathering Information

https://hackernoon.com/https-medium-com-aamralkar-footprinting-and-reconnaissance-e14010b22a89

Maltego: - https://null-byte.wonderhowto.com/how-to/hack-like-pro-use-maltego-do-network-reconnaissance-0158464/

Exploit Guide
Connect
linkedInTwitter
More
GitHub
Copyright © 2022 Siddhanth