Files
atkison 9b5969b7e0 Update README.md
Grammatical changes
2021-03-12 11:19:19 -06:00
..
2021-03-12 11:19:19 -06:00

Practice

I'm just going to paste a bunch of sites. I'll fix it up and make it look nice some time next week.

Stay up to date with the world of linux:
https://www.linux.com/

Learn about current cyber security news.
https://www.reuters.com/news/archive/cybersecurity

Learn hands on cyber security techinques. The virtual machines for this site are already in the Virtual Machine directory with the directions on how to install them. Yeah I know, I'm awesome.
https://seedsecuritylabs.org/index.html

The following is a link to a website in which you can buy some great courses and learn a whole lot. Don't EVER pay full price for a course. Just put it in your wishlist, wait a few days, and then check again; there will be a sale.
https://www.udemy.com/

Practice your cyber security skills.
https://0x00sec.org/

Core hacking course on YouTube
https://www.youtube.com/playlist?list=PLMGUdaTHpFQLmSAk5_cTM8Y502hhVpeNf

Linux Commands
https://www.mediacollege.com/linux/command/linux-command.html

Web hacking
https://www.pentesterlab.com/

https://www.hackthissite.org/

Over the wire wargames
https://overthewire.org/wargames/

Tools to download

Read
https://trailofbits.github.io/ctf/
https://trailofbits.github.io/ctf/exploits/binary1.html

FORENSICS:
Volatility
https://github.com/volatilityfoundation/volatility/wiki/Command-Reference

Autopsy
An easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones.
It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.
https://www.autopsy.com/

The Sleuth Kit
A collection of command line tools and a C library that allows you to analyze disk images and recover files from them.
It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.
https://www.sleuthkit.org/

FTK Imager
https://accessdata.com/product-download/ftk-imager-version-4-2-0

Git Version Control
Learn git
https://en.wikipedia.org/wiki/Git
https://try.github.io/

binwalk
https://github.com/ReFirmLabs/binwalk

BINARY EXPLOITATION:
GDB
https://www.gnu.org/software/gdb/

pwntools
https://github.com/Gallopsled/pwntools#readme

gdb enhanced features
https://gef.readthedocs.io/en/latest/config/

binary ninja
https://binary.ninja/

DATA:
Quickly parsing data, patching data or looking for hidden metadata

Hex editor GHex
https://wiki.gnome.org/Apps/Ghex

Online tool hexed
https://hexed.it/

Bless is a binary (hex) editor, a program that enables you to edit files as a sequence of bytes. It is written in C# and uses the Gtk# bindings for the GTK+ toolkit.
https://github.com/bwrsandman/Bless

The following commands are going to be helpful:
strings, file, exiftool

As always, you can use Python to help.

NETWORK TRAFFIC ANALYSIS:
Wireshark
It is probably already installed.
https://www.wireshark.org/

The Telnet protocol is an old, insecure protocol used to remotely login to and administer computers.

tshark
network protocol analyzer. It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing a decoded form of those packets to the standard output or writing the packets to a file.
https://www.wireshark.org/docs/man-pages/tshark.html

Scapy
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.
https://scapy.net/

Get familiar with:
netcat
https://linux.die.net/man/1/nc

nmap
https://nmap.org/

WEB APPLICATION EXPLOITATION:
modify XHR requests, tinker with POST data, adjust query string parameters and get confident with header or cookie manipulation, so research on those.

Burp Suite
https://portswigger.net/bur

OWASP ZAP
https://www.zaproxy.org/

Ensure you're familiar with your browser's dev tools - get used to the Console, Network and Application tabs.

InspectElement by right-clicking on the site or F12
exploit trusted client input
manipulate cookie data

SQL Injection
https://owasp.org/www-community/attacks/SQL_Injection

OPEN SOURCE INTELLIGENCE:
exif online image viewer
http://exif.regex.info/exif.cgi

DNS record types, which is defined initially in RFC 1035 by the Internet Engineering Task Force (IETF) in November 1987, the portion of the RFC detailing DNS TYPE values is available via
https://tools.ietf.org/html/rfc1035#page-12

There will be questions in that you can just google

SSL certificates help to secure the communication between a client and a server. Most modern browsers should have an interface to view the certificates in a SSL certificate chain.

Online barcode reader
https://online-barcode-reader.inliteresearch.com/

CRYPTOGRAPHY:
Intro to number systems and binary
https://www.khanacademy.org/math/algebra-home/alg-intro-to-algebra/algebra-alternate-number-bases/v/number-systems-introduction
or
https://www.purplemath.com/modules/numbbase.htm
or
https://betterexplained.com/articles/numbers-and-bases/

Conversion tools
https://www.rapidtables.com/convert/number/hex-to-ascii.html
The 0x is used to indicate that the value is hexadecimal and should not be converted.

https://www.base64decode.org/

https://www.binaryhexconverter.com/binary-to-ascii-text-converter

ROT13
https://rot13.com/

http://rumkin.com/tools/cipher/atbash.php

Morse code translator
https://morsecode.world/international/translator.html

Commands:
strings

PASSWORD CRACKING:
Hashcat
https://hashcat.net/wiki/doku.php?id=dictionary_attack

Rockyou wordlist download link
downloads.skullsecurity.org/passwords/rockyou.txt.bz2

CeWL
https://tools.kali.org/password-attacks/cewl

ophcrack
https://ophcrack.sourceforge.io/download.php?type=ophcrack

XP Special wordlists
https://ophcrack.sourceforge.io/tables.php

LOG ANALYSIS:
Commands that will be helpful
cat | cut | sort | uniq | wc | awk | grep

DB browser for SQLite on ParrotOS

Epoch Converter
https://www.epochconverter.com/

WIRELESS ACCESS EXPLOITATION:
aircrack-ng
https://www.aircrack-ng.org/

Rockyou wordlist
Wireshark

use aircrack after finding the beacon bssid and use -b argument Select the target network based on the access point MAC address.
aircrack-ng -w /usr/share/wordlists/rockyou.txt -b C0:4A:00:80:76:E4 PCAP3.cap

ENUMERATION AND EXPLOITATION:
Understand and analyze vulnerabilities in code

uncompyle2
https://github.com/Mysterie/uncompyle2

Machine code instructions
https://en.wikipedia.org/wiki/Machine_code

Assembly Language
https://en.wikipedia.org/wiki/Assembly_language

Buffer overflow attack
https://owasp.org/www-community/attacks/Buffer_overflow_attack

Symbols
https://en.wikipedia.org/wiki/Symbol_(programming)

Functions
https://en.wikipedia.org/wiki/Subroutine

The main function
https://en.wikipedia.org/wiki/Entry_point#C_and_C++