- Build Infosec Forensics Roadmap
- Pentesterlabs:
https://pentesterlab.com/badges/unix
- https://www.udemy.com/course/cissp-domain-1-2/
- CTF101:
https://ctf101.org/web-exploitation/overview
- /home/n0kt/Dropbox/Docs/Infosec: /home/n0kt/Dropbox/Docs/Infosec/cpp-hackers-guide-steve-oualline.pdf
- Review videos:
https://www.youtube.com/@HackingBolivia404/streams
- Review todays cryptography roadmaps: DES, SHA256, SHA512, Blowfish
- Research initial: Cryptocurrency
- https://tryhackme.com/
- https://portswigger.net/web-security
- https://www.vulnhub.com/
- https://overthewire.org/wargames/
- https://www.cybrary.it/
- https://www.codebashing.com/
- https://www.hacker101.com/
- https://cryptohack.org/
- https://cryptopals.com/
- Smash the stack:
http://smashthestack.org/wargames.html
- Participate in CTFs:
https://ctftime.org/
- https://evilzone.org/index.php?page=challenges&sub=viewCategory&id=1
- Machines review by S4vitar:
https://docs.google.com/spreadsheets/d/1dzvaGlT_0xnT-PGO27Z_4prHgA8PHIpErmoWdlUrSoA/edit#gid=0
- http://reversing.kr/index.php
- https://microcorruption.com/login/
- This one is really cool:
https://wargames.ret2.systems/
- Review binary explotation techniques: bof, stackoverflow
- Learn debugging with gnu gdb
- Explore breaking wireless networks, bluetooth, RFID/NFC
- Review Malware: dll sideloading, ransomware
- Servers popular exploits (nginx, apache, mysql, etc)
- Edward Snowden disclosures
- Local Escalation of Privilege (win & lin)
- Botnets how they work
- The web aplication hackers handbook, dafydd stuttard
- Metasploit, david kennedy
- Hacking, jon erickson
- Applied cryptography, bruce schneier
- Network security assessment, chris mcnab
- Practical malware analysis, michael sikorski
- Ghost in the wires, kevin mitnick
- CISSP all-in-one exam guide, shon harris
- Threat modeling, adam shostack
- Black hat python, justin seitz
- Sql injection attacks and defenses syngress
- Metasploit penetration testing, Abhimav Singh
- The practice of network security monitoring,
- Cissp, official study guide
- Practical reverse engineering, dang gazel
- The art of memory forensics, hale ligh
- The shellcoders handbook, richarte
- Buffer overflows, foster
- Windows privilege escalation, Alan Wang
- Metasploit: The Penetration Tester’s Guide" by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
- Hacking: The Art of Exploitation, 2nd Edition" by Jon Erickson
- Black Hat Python: Python Programming for Hackers and Pentesters" by Justin Seitz
- Real-World Bug Hunting: A Field Guide to Web Hacking" by Peter Yaworski
- Penetration Testing: A Hands-On Introduction to Hacking" by Georgia Weidman
- “Mastering Modern Web Penetration Testing” by Prakhar Prasad
- Black Hat Python: Python Programming for Hackers and Pentesters
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- The IDA Pro Book: The Unofficial Guide to the World’s Most Popular Disassembler
- CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response
- CISSP All-in-One Exam Guide, Seventh Edition
- Risk Analysis and Security Countermeasure Selection, Second Edition
- Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)
- Defensive Security Handbook: Best Practices for Securing Infrastructure
- Hacking Exposed 7: Network Security Secrets and Solutions
- Cybersecurity for Beginners
- Professional Penetration Testing: Creating and Learning in a Hacking Lab
- Network Security Assessment: Know Your Network
- Metasploit: The Penetration Tester’s Guide
- Managed Code Rootkits: Hooking into Runtime Environments
- Network Forensics: Tracking Hackers through Cyberspace
- Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
- Nmap 6: Network exploration and security auditing Cookbook
- The Database Hacker’s Handbook: Defending Database Servers
- A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security
- Red Team: How to Succeed By Thinking Like the Enemy
- Hacking: The Art of Exploitation: The Art of Exploitation
- The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
- The Hacker Playbook 2: Practical Guide To Penetration Testing
- The Art of Deception: Controlling the Human Element of Security
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
- Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
- Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
- A Concise Introduction to DevSecOps
- DevSecOps A Complete Guide - 2019 Edition
- Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
- A Guide to Kernel Exploitation: Attacking the Core