Skip to content

Instantly share code, notes, and snippets.

View numberwhun's full-sized avatar

Jefferson Kirkland numberwhun

View GitHub Profile
@numberwhun
numberwhun / 22 Hacking Sites To Practice Your Hacking Skills
Created July 14, 2016 00:36
22 Hacking Sites To Practice Your Hacking Skills
Taken from: https://hackerlists.com/hacking-sites/
22 Hacking Sites, CTFs and Wargames To Practice Your Hacking Skills
InfoSec skills are in such high demand right now. As the world continues to turn everything into an app and connect even the most basic devices to the internet, the demand is only going to grow, so it’s no surprise everyone wants to learn hacking these days.
However, almost every day I come across a forum post where someone is asking where they should begin to learn hacking or how to practice hacking. I’ve compiled this list of some of the best hacking sites to hopefully be a valuable resource for those wondering how they can build and practice their hacking skill set. I hope you find this list helpful, and if you know of any other quality hacking sites, please let me know in the comments, so I can add them to the list.
1. CTF365 https://ctf365.com/
@numberwhun
numberwhun / Penetration testing sample test cases
Created July 2, 2016 03:21
Penetration testing sample test cases
Penetration testing sample test cases (test scenarios):
Remember this is not functional testing. In Pentest your goal is to find security holes in the system. Below are some generic test cases and not necessarily applicable for all applications.
1) Check if web application is able to identify spam attacks on contact forms used in the website.
2) Proxy server – Check if network traffic is monitored by proxy appliances. Proxy server make it difficult for hackers to get internal details of the network thus protecting the system from external attacks.
3) Spam email filters – Verify if incoming and outgoing email traffic is filtered and unsolicited emails are blocked. Many email clients come with in-build spam filters which needs to be configured as per your needs. These configuration rules can be applied on email headers, subject or body.
4) Firewall – Make sure entire network or computers are protected with Firewall. Firewall can be a software or hardware to block unauthorized access to system. Firewall can p
@numberwhun
numberwhun / Malware Analysis Tips and other Pentesting Links
Last active April 15, 2024 04:38
Malware Analysis Tips and other Pentesting Links
Borrowed from: http://www.labnol.org/software/wget-command-examples/28750/
Wget is extremely powerful, but like with most other command line programs, the plethora of options it supports can be intimidating to new users. Thus what we have here are a collection of wget commands that you can use to accomplish common tasks from downloading single files to mirroring entire websites. It will help if you can read through the wget manual but for the busy souls, these commands are ready to execute.
1. Download a single file from the Internet
wget http://example.com/file.iso
2. Download a file but save it locally under a different name
wget ‐‐output-document=filename.html example.com
@numberwhun
numberwhun / OpenSSH Config File Examples
Created October 17, 2016 00:40
OpenSSH Config File Examples
Taken from: http://www.cyberciti.biz/faq/create-ssh-config-file-on-linux-unix/
System-wide SSH client configuration files
/etc/ssh/ssh_config : This files set the default configuration for all users of OpenSSH clients on that desktop/laptop and it must be readable by all users on the system.
User-specific SSH client configuration files
~/.ssh/config or $HOME/.ssh/config : This is user’s own configuration file which, overrides the settings in the global client configuration file, /etc/ssh/ssh_config.
~/.ssh/config file rules
Borrowed from: http://stackoverflow.com/questions/2573135/python-progression-path-from-apprentice-to-guru
I've been learning, working, and playing with Python for a year and a half now. As a biologist slowly making the turn to bio-informatics, this language has been at the very core of all the major contributions I have made in the lab. I more or less fell in love with the way Python permits me to express beautiful solutions and also with the semantics of the language that allows such a natural flow from thoughts to workable code.
What I would like to know is your answer to a kind of question I have seldom seen in this or other forums. This question seems central to me for anyone on the path to Python improvement but who wonders what his next steps should be.
Let me sum up what I do NOT want to ask first ;)
I don't want to know how to QUICKLY learn Python
Nor do I want to find out the best way to get acquainted with the language
@numberwhun
numberwhun / PenTesting Tools
Created June 14, 2016 04:06
PenTesting Tools
Information Gathering:
arping
bing-ip2hosts-0.2
chaosreader
darkstat
dmitry
dnstracer
dnswalk
enum4linux
frox
@numberwhun
numberwhun / gist:de23f428ef2d88dbf216
Created October 14, 2015 01:04
PenTesting Recommended Reading
Taken from: http://www.dfir.org/?q=node/8
Recommended Reading
This page lists books that I have found to be highly relevant and useful for learning topics within computer security, digital forensics, incident response, malware analysis, and reverse engineering, and other related topics. These books range from introductory texts to advanced research works. While some of these books may seem dated, the information contained is still very useful to people learning today, and much of the information is essential to becoming proficient in the information security realm.
Please note that, in order to avoid ranking individual books, each category is listed in alphabetical order and each book is listed in alphabetical order within its category.
If you notice any errors with this page or have books that you think should be listed then please contact me. I will only list books that I have personally read and for which I am willing to vouch.
@numberwhun
numberwhun / 19 Tips For Everyday Git Use
Created April 20, 2016 18:34
19 Tips For Everyday Git Use
Taken from: http://www.alexkras.com/19-git-tips-for-everyday-use/
19 Tips For Everyday Git Use
September 8, 2015 by Alex Kras 31 Comments
TwitterHacker NewsRedditFacebookShare1,491
I’ve been using git full time for the past 4 years, and I wanted to share the most practical tips that I’ve learned along the way. Hopefully, it will be useful to somebody out there.
If you are completely new to git, I suggest reading Git Cheat Sheet first or checking out this free tutorial. This article is aimed at somebody who has been using git for three months or more.
I found this list by chance. It is located at: https://code.google.com/p/pentest-bookmarks/wiki/BookmarksList
Its a bit old (compiled in 2012), but links may still be valid.
------------------
Hacker Media
Blogs Worth It:
What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the actual day to day testing work.