80 tools - python

7
80+ Best Free Hacking Tutorials | Resources to Become http://www.fromdev.com/2013/07/Hacking-Tutorials.html therefore you must keep learning new things with a really fast pace. If you are thinking about ethical hacking as a career option, you may need to be prepared for a will help you speed up on your learning. If you decide you pursue ethical hacking as a career op . A lot of people (including me before doing research for this article) think that they can become a web. Its true that some common types of hacking can be easily done with help of tools, howeve hacker is the one who can find a vulnerability and develop a tool to exploit and/or demonstrate i Hacking is not only about knowing "how things work", but its about knowing "why things work th Below are some really useful hacking tutorials and resources you may want to explore in your jo ethical hacking books FROMDEV

Upload: morgadojs

Post on 25-Nov-2015

46 views

Category:

Documents


9 download

DESCRIPTION

python

TRANSCRIPT

  • 80+ Best Free Hacking Tutorials | Resources to Become Pro Hackerhttp://www.fromdev.com/2013/07/Hacking-Tutorials.html

    therefore you must keep learning new things with a really fast pace.

    If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot ofwill help you speed up on your learning. If you decide you pursue ethical hacking as a career option,

    .

    A lot of people (including me before doing research for this article) think that they can become a hacweb. Its true that some common types of hacking can be easily done with help of tools, however doing ihacker is the one who can find a vulnerability and develop a tool to exploit and/or demonstrate it.

    Hacking is not only about knowing "how things work", but its about knowing "why things work that way"

    Below are some really useful hacking tutorials and resources you may want to explore in your journey o

    ethical hacking books

    FROMDEV

  • Hacking For Dummies - Beginners TutorialsThese tutorials are not really simple for anyone who is just starting to learn hacking techniques. Howyou. I am sure you have different opinion about complexity of each tutorial however advanced hacker arkiddie (beginner hacker). Even to acquire the skills of a script kiddie you need to have good understaprogramming.

    - By BreakTheSecurity.com1. Hacking Tutorials for Beginners - By Astalavista.com2. How to learn Ethical hacking

    - By Guru99.com3. Penetration Testing Tutorial4. Backtrack Penetration Testing Tutorial5. Introduction to Penetration Testing6. Information Gathering with Nmap

    By Open Web Application Security7. Simple How To Articles8. The Six Dumbest Ideas in Computer Security9. Secure Design Principles

    10. 10 steps to secure software

    Cryptography Related TutorialsCryptography is must know topic for any aspiring security professional or a ethical hacker. You must udone. You must understand why some of the old encryption techniques do not work in modern computing wo

    This is a important area and a lot of software programmers and professional do not understand it very good understanding of mathematics, this means you also need to have good fundamentals on discrete math

    1. Introduction to Public Key Cryptography2. Crypto Tutorial3. Introduction to Cryptography4. An Overview of Cryptography

    - Herong's Tutorial Examples5. Cryptography Tutorials - Learn How to Keep Secret Secret6. The Crypto Tutorial

    7. Introduction to cryptology, Part 1: Basic Cryptology Concepts

  • Websites For Security Related Articles And NewsThese are some websites, that you may find useful to find hacking related resources and articles. A loexperimenting through these sites for improving yourself to become advanced hacker.

    In recent years, many people are aspiring to learn how to hack. With growing interest in this area, a evolving. With popularity of social networks many people have inclined towards vulnerability in varioumyspace etc.

    Continuous learning about latest security issues, news and vulnerability reports are really important of the sites that keep publishing informative articles and news are listed here.

    1. http://www.astalavista.com/2. http://packetstormsecurity.com/3. http://www.blackhat.com/4. http://www.metasploit.com/5. http://sectools.org/6. http://www.2600.com/7. DEF CON - Hacking conference8. http://www.breakthesecurity.com/9. http://www.hacking-tutorial.com/

    10. http://www.evilzone.org/11. http://hackaday.com/12. http://www.hitb.org/13. http://www.hackthissite.org/14. http://pentestmag.com15. http://www.securitytube.net/16. https://www.ssllabs.com/

    EBooks And WhitepapersSome of the research papers by security experts and gurus can provide you a lot of information and insto read and understand therefore you may need to read them multiple times. Once you understand the topand you will be able to skim through a lot content in less time.

  • - This ebook contains some free chapter from one of the popular cryptographalso available on amazon at .

    1. Handbook of Applied CryptographyCryptography Book

    2. Network Penetration testing Guide3. How to hack anything in Java4. Mcafee on iPhone and iPad Security

    - This site contains collection of white papers frsome of these white papers are really worth referring.

    5. A Good Collection of White papers on security and vulnerabilities

    6. Engineering Principles for Information Technology Security7. Basic Principles Of Information Protection

    - OWASP is one of the most popular sites that contains web application s8. Open Web Application Security Project

    Videos & Play ListsThose who like to watch video tutorials, here are few I liked. However there are many small video avaiand share with us if you like something.

    By Dan Boneh Stanford University1. Cryptography Course- Youtube Playlist of More than 90 hours. I have found this to be the biggest free training a

    topic.2. Open Security Training

    : Youtube Playlist containing compilation of OWASP conference highlight in 2011.3. OWASP AppSec USA 2011 - Defcon is one of the most popular hacker conference. The presenters in this

    inside the hacking industry.4. Defcon: How I Met your Girlfriend

    5. Defcon: What happens when you steal a hackers computer6. Defcon: Nmap: Scanning the Internet

    : Diffie-Hellman Key Exchange7. Public Key Cryptography8. Web application Pen testing9. Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit

    Forums For Hackers And Security ProfessionalsJust like any other area, forums are really great help for learning from other experts. Hundreds of seare willing to share their knowledge on forums for some reason. Please keep in mind to do enough reseato people who take time to answer your question.

  • 1. Stackoverflow for security professionals2. http://darksat.x47.net/3. http://forums.securityinfowatch.com/4. http://forums.cnet.com/spyware-viruses-security-forum/5. http://www.hackforums.net/forumdisplay.php?fid=47

    Vulnerability Databases And ResourcesVulnerability Databases are the first place to start your day as a security professional. Any new vulnthe public vulnerability databases. These databases are a big source of information for hackers to be vulnerability.

    1. http://www.exploit-db.com/2. http://1337day.com/3. http://securityvulns.com/4. http://www.securityfocus.com/5. http://www.osvdb.org/6. http://www.securiteam.com/7. http://secunia.com/advisories/8. http://insecure.org/sploits_all.html9. http://zerodayinitiative.com/advisories/published/

    10. http://nmrc.org/pub/index.html11. http://web.nvd.nist.gov12. http://www.vupen.com/english/security-advisories/13. http://www.vupen.com/blog/14. http://cvedetails.com/15. http://www.rapid7.com/vulndb/index.jsp16. http://oval.mitre.org/

    Product Specific Vulnerability InformationSome of the very popular products in the world require a special attention and therefore you may want directly from vendors. I have kept Linux. Microsoft and apache in this list, however it may apply to a

    1. Red Hat Security and other updates Site

  • 2. Microsoft Products Security Bulletin3. Apache Foundation Products Security Repository4. Ubunut Software Security Center5. Linux Security Repository

    Tools And Programs For Hacking / SecurityThere are dozens of tools available for doing different types of hacking and tests. Tools are really iwork. Some of the very common tools that are used by hackers are listed here. You may have different c

    1. nmap2. NSS3. Hping4. TCPDump5. Metasploit6. Wireshark7. Network Stuff8. Nikto

    SummaryI have tried to compile some of these resources for my own reference for the journey of learning I am level of becoming hacker but the knowledge of this field really fascinates me and keeps me motivated fable to become successful in this.

    A lot of people use their knowledge skills for breaking stuff and stealing. I personally think that donot have a good ending. I would recommend not to use your skills for any un-ethical endeavor. A singlecareer since most companies do a strict third party background check before they hire a ethical hacker

    There are dozens of companies looking for ethical hackers and security professionals. There are reallyand its really niche compensation segment. You will be easily able to get a decent job without even acpro hacker.

    POST A COMMENT

  • Java PaaScloudcontrol.com/java

    Supercharge development and instantly deploy Java apps.