This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.proxicity.io/ (Rotating proxy api) | |
https://blindspotsecurity.com/ | |
https://www.hackread.com/10-famous-bug-bounty-hunters-of-all-time/ | |
https://bitquark.co.uk/ | |
https://whitton.io/articles/bug-bounties-101-getting-started/ | |
http://www.newsweek.com/2016/02/12/white-hat-hackers-keep-bug-bounty-421357.html | |
https://pentestlab.wordpress.com/ | |
https://exploit-exercises.com/protostar/ | |
https://pentesterlab.com/ (Free and Pay versions) | |
http://www.p0wnlabs.com/free/vms |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
In order to beef up your pentesting lab, make sure you have a LAMP (Linux / Apache /MySQL, PHP / Perl / Python) server installed on your vulnerable system. Here are vulnerable web applications you can add to your system so that you have more challenges to your web application pawning experience: | |
Mutillidae – a free and open source web application for website penetration testing and hacking which was developed by Adrian “Irongeek” Crenshaw and Jeremy “webpwnized” Druin. It is designed to be exploitable and vulnerable and ideal for practicing your Web Fu skills like SQL injection, cross site scripting, HTML injection, Javascript injection, clickjacking, local file inclusion, authentication bypass methods, remote code execution and many more based on OWASP (Open Web Application Security) Top 10 Web Vulnerabilties. I also wrote an article on how to setup Mutillidae its SQL Injection cheat sheet which can be found here. | |
OWASP WebGoat – an OWASP project and a deliberately insecure J2EE web application designed to |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Information Gathering: | |
arping | |
bing-ip2hosts-0.2 | |
chaosreader | |
darkstat | |
dmitry | |
dnstracer | |
dnswalk | |
enum4linux | |
frox |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Topics Covered | |
Introduction to Ethical Hacking | |
Footprinting and Reconnaissance | |
Scanning Networks | |
Enumeration | |
System Hacking | |
Malware Threats | |
Sniffing |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://www.cyberdegrees.org/jobs/penetration-tester/ | |
https://danielmiessler.com/study/vulnerability-assessment-penetration-test/ (good article) | |
http://security.stackexchange.com/questions/33064/how-would-one-go-about-becoming-a-security-researcher | |
http://security.stackexchange.com/questions/48139/what-are-good-resources-to-do-hands-on-practice-on-network-penetration-testing?rq=1 (good info and links) | |
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project | |
https://www.owasp.org/index.php/Threat_Risk_Modeling | |
https://danielmiessler.com/podcast/ | |
https://www.owasp.org/index.php/OWASP_Mutillidae_2_Project | |
http://www.pentesticles.com/2014/05/what-you-need-to-know-to-become.html | |
http://www.hackarmoury.com/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Zero out a large file (useful for things like java *.out files: | |
# > /path/to/file | |
2. Record your screen session to file: | |
# script <filename> | |
- To stop recording, use "exit", "logout" or Ctrl-D | |
3. Copy a file into multiple directories: | |
# echo /usr/dir1 /var/dir2 /some/dir3 | xargs -n1 cp -v /path/to/file |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Delete a database | |
Format: drop {database|schema} [if exists] db_name; | |
- drops all tables in a database, then deletes the db | |
- need 'drop' privileges to do this | |
- as of mysql 5.0.2, "schema" is a synonym for database | |
2. Delete a table | |
Format: drop [temporary] table [if exists] table_name [, table_name] [restrict | cascade]; | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Borrowed from: https://icrunchdatanews.com/unstructured-data-mining-primer/ | |
-------------------------------------------------------------------------------------------------- | |
Though it has been practiced for some years, the mining of unstructured data has recently attracted quite a bit of attention. Most stored data is unstructured and contains a great deal of relevant information. Meanwhile, the available structured data is already being exploited; hence the rising interest in unstructured data. | |
Most often, what is meant by “unstructured data” is natural language text, but there are other types, such as link data, digital audio recordings, images and video. Each of these represents a very diverse set of potential data sources, such as: | |
Text: | |
internal company emails |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://ggc.sourceforge.net/ | |
http://electronics.stackexchange.com/questions/4335/reading-data-from-a-glucose-meter | |
http://www.diabetesnet.com/diabetes-technology/diabetes-software | |
https://itunes.apple.com/us/app/sugar-sense-diabetes-app-blood/id880725347?mt=8 | |
http://www.medpagetoday.com/Endocrinology/Diabetes/50158 | |
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2769885/ (Data Mining Techniques for BG and Diabetes Management) | |
https://twitter.com/sixuntilme | |
http://www.wsj.com/articles/tech-savvy-families-use-home-built-diabetes-device-1462728637 | |
https://www.diabeteseducator.org/docs/default-source/practice/practice-resources/white-papers_test/aade-health-information-technologies--final.pdf?sfvrsn=2 | |
http://www.axonlab.com/CH_eng/ch/Private-customers/Blood-glucose-meters/Data-analysis/SiDiary-Diabetes-Management-Software |