Hacker Media

Hacker Media

Blogs Worth It:

What the title says. There are a LOT of pentesting blogs, these are the ones i monitor constantly and value in the actual day to day testing work.

Forums:

Created for forums that will help in both tool usage, syntax, attack techniques, and collection of scripts and tools. Needs some help. I don't really frequent too many underground forums but i actually find nice one-off scripts and info i can roll into my own code in these places. Would like to add more.

Magazines:

Video:


Methodologies:


OSINT

Presentations:

People and Organizational:

Infrastructure:


Exploits and Advisories:


Cheatsheets and Syntax:

Agile Hacking:

OS and Scripts:

Tools:


Distros:


Labs:

ISOs and VMs:

Vulnerable Software:

Test Sites:


Exploitation Intro:

If you'd like to get into exploit dev, these are really the guides and docs that will start you off in the right direction. Since Exploit dev is not my primary occupation this section could always use help.


Reverse Engineering & Malware:


Passwords and Hashes:

Wordlists:

Pass the Hash:


MiTM:


Tools:

OSINT:

Metadata:

Google Hacking:

Web:

Attack Strings:

Shells:

Scanners:

Proxies:

Burp:

Social Engineering:

Password:

Metasploit:

MSF Exploits or Easy:

NSE:

Net Scanners and Scripts:

Post Exploitation:

Netcat:

Source Inspection:

Firefox Addons:

Tool Listings:


Training/Classes:

Sec/Hacking:

Metasploit:

Programming:

Python:

Ruby:

Other Misc:


Web Vectors

SQLi:

Upload Tricks:

LFI/RFI:

XSS:

Coldfusion:

Sharepoint:

Lotus:

JBoss:

VMWare Web:

Oracle App Servers:

SAP:


Wireless:


Capture the Flag/Wargames:


Conferences:


Misc/Unsorted:

Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. I spend a great deal of my time penetration testing, and that requires rapid Python tool development, with a focus on execution and delivering results (not necessarily on prettiness, optimization, or even stability). Throughout this book you will learn that this is how I code, but I also feel as though it is part of what makes me a strong pentester. I hope that this philosophy and style helps you as well. As you progress through the book, you will also realize that I don’t take deep dives on any single topic. This is by design. I want to give you the bare minimum, with a little flavor, so that you have some foundational knowl- edge. With that in mind, I’ve sprinkled ideas and homework assignments throughout the book to kickstart you in your own direction. I encourage you to explore these ideas, and I would love to hear back any of your own implementations, tooling, or homework assignments that you have done. xviii Preface As with any technical book, readers at different skill levels with Python (or information security in general) will experience this book differently. Some of you may simply grab it and nab chapters that are pertinent to a consulting gig you are on, while others may read it cover to cover. I would recommend that if you are a novice to intermediate Python programmer that you start at the beginning of the book and read it straight through in order. You will pick up some good building blocks along the way. To start, I lay down some networking fundamentals in Chapter 2 and slowly work our way through raw sockets in Chapter 3 and using Scapy in Chapter 4 for some more interesting network tooling. The next section of the book deals with hacking web applications, starting with your own custom tooling in Chapter 5 and then extending the popular Burp Suite in Ch
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值