Practice
I'm just going to paste a bunch of sites. I'll fix it up and make it look nice some time next week.
Stay up to date with the world of linux:
https://www.linux.com/
Learn about current cyber security news.
https://www.reuters.com/news/archive/cybersecurity
Learn hands on cyber security techinques. The virtual machines for this site are already in the Virtual Machine directory with the directions on how to install them. Yeah I know, I'm awesome.
https://seedsecuritylabs.org/index.html
The following is a link to a website in which you can buy some great courses and learn a whole lot. Don't EVER pay full price for a course. Just put it in your wishlist, wait a few days, and then check again; there will be a sale.
https://www.udemy.com/
Practice your cyber security skills.
https://0x00sec.org/
Core hacking course on YouTube
https://www.youtube.com/playlist?list=PLMGUdaTHpFQLmSAk5_cTM8Y502hhVpeNf
Linux Commands
https://www.mediacollege.com/linux/command/linux-command.html
Web hacking
https://www.pentesterlab.com/
Over the wire wargames
https://overthewire.org/wargames/
Tools to download
Read
https://trailofbits.github.io/ctf/
https://trailofbits.github.io/ctf/exploits/binary1.html
FORENSICS:
Volatility
https://github.com/volatilityfoundation/volatility/wiki/Command-Reference
Autopsy
An easy to use, GUI-based program that allows you to efficiently analyze hard drives and smart phones.
It has a plug-in architecture that allows you to find add-on modules or develop custom modules in Java or Python.
https://www.autopsy.com/
The Sleuth Kit
A collection of command line tools and a C library that allows you to analyze disk images and recover files from them.
It is used behind the scenes in Autopsy and many other open source and commercial forensics tools.
https://www.sleuthkit.org/
FTK Imager
https://accessdata.com/product-download/ftk-imager-version-4-2-0
Git Version Control
Learn git
https://en.wikipedia.org/wiki/Git
https://try.github.io/
binwalk
https://github.com/ReFirmLabs/binwalk
BINARY EXPLOITATION:
GDB
https://www.gnu.org/software/gdb/
pwntools
https://github.com/Gallopsled/pwntools#readme
gdb enhanced features
https://gef.readthedocs.io/en/latest/config/
binary ninja
https://binary.ninja/
DATA:
Quickly parsing data, patching data or looking for hidden metadata
Hex editor GHex
https://wiki.gnome.org/Apps/Ghex
Online tool hexed
https://hexed.it/
Bless is a binary (hex) editor, a program that enables you to edit files as a sequence of bytes. It is written in C# and uses the Gtk# bindings for the GTK+ toolkit.
https://github.com/bwrsandman/Bless
The following commands are going to be helpful:
strings, file, exiftool
As always, you can use Python to help.
NETWORK TRAFFIC ANALYSIS:
Wireshark
It is probably already installed.
https://www.wireshark.org/
The Telnet protocol is an old, insecure protocol used to remotely login to and administer computers.
tshark
network protocol analyzer.
It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing a decoded form of those packets to the standard output or writing the packets to a file.
https://www.wireshark.org/docs/man-pages/tshark.html
Scapy
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.
https://scapy.net/
Get familiar with:
netcat
https://linux.die.net/man/1/nc
nmap
https://nmap.org/
WEB APPLICATION EXPLOITATION:
modify XHR requests, tinker with POST data, adjust query string parameters and get confident with header or cookie manipulation, so research on those.
Burp Suite
https://portswigger.net/bur
OWASP ZAP
https://www.zaproxy.org/
Ensure you're familiar with your browser's dev tools - get used to the Console, Network and Application tabs.
InspectElement by right-clicking on the site or F12
exploit trusted client input
manipulate cookie data
SQL Injection
https://owasp.org/www-community/attacks/SQL_Injection
OPEN SOURCE INTELLIGENCE:
exif online image viewer
http://exif.regex.info/exif.cgi
DNS record types, which is defined initially in RFC 1035 by the Internet Engineering Task Force (IETF) in November 1987, the portion of the RFC detailing DNS TYPE values is available via
https://tools.ietf.org/html/rfc1035#page-12
There will be questions in that you can just google
SSL certificates help to secure the communication between a client and a server. Most modern browsers should have an interface to view the certificates in a SSL certificate chain.
Online barcode reader
https://online-barcode-reader.inliteresearch.com/
CRYPTOGRAPHY:
Intro to number systems and binary
https://www.khanacademy.org/math/algebra-home/alg-intro-to-algebra/algebra-alternate-number-bases/v/number-systems-introduction
or
https://www.purplemath.com/modules/numbbase.htm
or
https://betterexplained.com/articles/numbers-and-bases/
Conversion tools
https://www.rapidtables.com/convert/number/hex-to-ascii.html
The 0x is used to indicate that the value is hexadecimal and should not be converted.
https://www.binaryhexconverter.com/binary-to-ascii-text-converter
ROT13
https://rot13.com/
http://rumkin.com/tools/cipher/atbash.php
Morse code translator
https://morsecode.world/international/translator.html
Commands:
strings
PASSWORD CRACKING:
Hashcat
https://hashcat.net/wiki/doku.php?id=dictionary_attack
Rockyou wordlist download link
downloads.skullsecurity.org/passwords/rockyou.txt.bz2
CeWL
https://tools.kali.org/password-attacks/cewl
ophcrack
https://ophcrack.sourceforge.io/download.php?type=ophcrack
XP Special wordlists
https://ophcrack.sourceforge.io/tables.php
LOG ANALYSIS:
Commands that will be helpful
cat | cut | sort | uniq | wc | awk | grep
DB browser for SQLite on ParrotOS
Epoch Converter
https://www.epochconverter.com/
WIRELESS ACCESS EXPLOITATION:
aircrack-ng
https://www.aircrack-ng.org/
Rockyou wordlist
Wireshark
use aircrack after finding the beacon bssid and use -b argument Select the target network based on the access point MAC address.
aircrack-ng -w /usr/share/wordlists/rockyou.txt -b C0:4A:00:80:76:E4 PCAP3.cap
ENUMERATION AND EXPLOITATION:
Understand and analyze vulnerabilities in code
uncompyle2
https://github.com/Mysterie/uncompyle2
Machine code instructions
https://en.wikipedia.org/wiki/Machine_code
Assembly Language
https://en.wikipedia.org/wiki/Assembly_language
Buffer overflow attack
https://owasp.org/www-community/attacks/Buffer_overflow_attack
Symbols
https://en.wikipedia.org/wiki/Symbol_(programming)
Functions
https://en.wikipedia.org/wiki/Subroutine
The main function
https://en.wikipedia.org/wiki/Entry_point#C_and_C++