How To Become a Super Hacker

# Something You Should Know

- Hackers Classifications

# English

Before you Start

- Lessons
- Books

# Math

Before you Start

- Mathematical logic
- Boolean algebra
- Numeral system
- Books

# Basic concepts in Computer Science

Before you Start

- Data structure
- Data Type
- Associative array and Hash table
- Array
- List or Sequence
- Tree
- String
- Matrix
- Abstraction
- Big O notation
- Closure
- Compiler
- Interpreter

# Algorithms

Before you Start

- Lessons
  • Algorithms, Part I - This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
  • Algorithms, Part II - This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
- Books

# Computer architecture

Before you Start

- Lessons
- Books

# Operating Systems

Before you Start

- Unix

Before you Start

- Linux

Before you Start

- Distributions
- Mac OS

Before you Start

- Windows

Before you Start

# Databases

# Network

Before you Start

- Protocols

Before you Start

- Internet
- Firewalls
- Books

# Programming

- Programming paradigms

  • Imperative programming
  • Procedural programming
  • Functional programming
  • Logic programming
  • Object oriented programming
    • Class
    • Inheritance
    • Object

- Languages

- Assembly Language

Basic Prerequisites

  • Computer Architecture Basis
  • Numeral system
  • CPU Modes and Memory Adressing

Tools

  • IDE or Text Editor
  • Nasm
  • Ld
  • Objdump
  • Ndiasm

Manual

- Lessons
- Books

- C

Basic Prerequisites

  • Computer Architecture Basis
  • Numeral system

Tools

  • IDE or Text Editor
  • GCC or Clang

Manual

- Lessons
- Books

- C++
- Books

- JAVA
- Books
- PYTHON

- RUBY

- PERL

- LISP

- PHP
  • Language

  • Frameworks

    • Zend Frameworks
    • Symfony
    • Codeigniter
    • Laravel
  • CMS

    • Wordpress
    • Drupal
    • Joomla
JAVASCRIPT

HTML

CSS

- Software development methodologies

Methodologies

# Cryptography

# Attacks

- Abuse of Functionality
  • Account lockout attack
  • Cache Poisoning
  • Cross-User Defacement
  • Mobile code: invoking untrusted mobile code
  • Mobile code: non-final public field
  • Mobile code: object hijack
  • Path Traversal
- Data Structure Attacks
  • Buffer overflow attack
  • Buffer Overflow via Environment Variables
  • Overflow Binary Resource File
- Embedded Malicious Code
  • Cross-Site Request Forgery (CSRF)
  • Logic/time bomb
  • Replicating (virus)
  • Trojan Horse
- Exploitation of Authentication
  • Account lockout attack
  • Cross-Site Request Forgery (CSRF)
  • Execution After Redirect (EAR)
  • One-Click Attack
  • Session fixation
  • Session hijacking attack
  • Session Prediction
  • XSRF
- Injection
  • Blind SQL Injection
  • Blind XPath Injection
  • Code Injection
  • Command Injection
  • Comment Injection Attack
  • Content Security Policy
  • Content Spoofing
  • CORS RequestPreflighScrutiny
  • Cross-site Scripting (XSS)
  • Custom Special Character Injection
  • Direct Dynamic Code Evaluation ('Eval Injection')
  • Direct Static Code Injection
  • Format string attack
  • Full Path Disclosure
  • LDAP injection
  • Parameter Delimiter
  • PHP Object Injection
  • Regular expression Denial of Service - ReDoS
  • Resource Injection
  • Server-Side Includes (SSI) Injection
  • Special Element Injection
  • SQL Injection
  • Web Parameter Tampering
  • XPATH Injection
- Path Traversal Attack
- Probabilistic Techniques
  • Brute force attack
  • Cash Overflow
  • Cryptanalysis
  • Denial of Service
- Protocol Manipulation
  • HTTP Request Smuggling
  • HTTP Response Splitting
  • Traffic flood
- Resource Depletion
  • Asymmetric resource consumption (amplification)
  • Cash Overflow
  • Denial of Service
- Resource Manipulation
  • Comment Injection Attack
  • Custom Special Character Injection
  • Double Encoding
  • Forced browsing
  • Path Traversal
  • Relative Path Traversal
  • Repudiation Attack
  • Setting Manipulation
  • Spyware
  • Unicode Encoding
- Sniffing Attacks
  • MAC Attacks
  • DHCP Attacks
  • DNS Poisoning
  • ARP Poisoning Attacks
- Spoofing
  • Cash Overflow
  • Cross-Site Request Forgery (CSRF)
  • Denial of Service
  • Man-in-the-middle attack
- Social Engineering

# Hacking Tools

- Penetration Testing Linux Distributions

- Information gathering: DNS Analysis

Before you Start

- Tools

- Integrated Development Environment (IDE)

# Weekly & Daily Resources

Operating Systems
Programming & Markup Languages
CMS
Frameworks
Misc

# Internet Relay Chat (IRC)

# Blogs

# Forums

Information Security
Programming
Unix & Linux

# Jobs & Hiring

# Challenges

# Certifications

Before you Start

  • CEH - Certified Ethical Hacker
  • CHFI - Computer Hacking Forensic Investigator
  • CCISO - Certified Chief Inofrmation Security Officer
  • LPT - Licensed Penetration Tester
  • ECSA - EC-Council Certified Security Analyst
  • ENSA - EC-Council Network Security Administrator
  • ECIH - EC-Council Certified Incident Handler
  • EDRP - EC-Council Disaster Recovery Professional
  • CSCU - Certified Secure Computer User
  • CNDA - Certified Network Defense Architect
  • ECSS - EC-Council Certified Security Specialist
  • ECSP - EC-Council Certified Secure Programmer
  • ECVP - EC-Council Certified VoIP Professional
  • ECES - EC-Council Certified Encryption Specialist
  • ECE - EC-Council Continuing Education

# Magazines

# Podcasts

# Conferences

# Most Influential People In Programming

# Famous Hackers

The List includes both Black Hat and White Hat Hackers.

# Documentaries