Penetration Testing looks so cool! I also want to learn it!
INTRODUCTION
I am taking every effort to learn cyber security broader and deeper! Red team penetration testing looks so cool! I'm making progress little step by little step.
RESOURCES
Some resources only SFU students can use them. But real practical resources, I may not use SFU links.
-
Penetration Testing Execution Standard (PTES): http://www.pentest-standard.org/index.php/Main_Page
- It provides detailed suggestions that feel like you are running a consultant company. Although I'm wondering how many companies will really provide so much details to a group, even it's an internal group...
-
Metasploit: The Penetration Tester's Guide
- This maybe the best penetration testing book I have read so far. It's an old book, published in 2011, but it teaches you the fundamentals about how Metasploit works, so that no matter how fast this tool is updating, you can ramp up quickly
-
Python Penetration Testing Essentials
- Foot printing web server & application
- Denial of Service
- SQL Injection
-
Python Penetration Testing Essentials
- Network, Scanning, Sniffing
- Others are similar to the above one
-
Python: Penetration Testing for Developers
- Analyzing network traffic
- Application fingerprinting
- Attack Scripting
- Fuzzing & brute force
- Reverse engineering
- Hash
- Screen grabing
- Attack automation
-
- Assessment & Attacks are good to check
- Exploits are done in Linux
-
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
- As you can see, it's advanced!
-
- It focuses on hacking Windows
-
- The author said Emmanuel was among those who aspired him. Then, I'm sure, he got very good aspirations.
- More document: https://docs.microsoft.com/en-us/azure/security/azure-security-pen-testing
Power Tools
-
Vulnerabilities Search: https://www.cvedetails.com
-
HashCat - Cracking Passwords
- Github
- All Details
- How to use HashCat
- HashGan Paper - It says it's better than HashCat. At this moment, I didn't find the tool online or open source
-
Metasploit - Penetrating Testing Framework
- Official Site: https://metasploit.com/
- Get Started: https://metasploit.com/get-started
- GitHub
- Metasploitable3 - A VM that contains large amount of security vulnerabilities
- Official Site: https://metasploit.com/
-
Thc-Hydra - Gain unauthorized access from remote to system
- GitHub
- It is proof of concept code, for leagal use only
- In Metasploit, by default, account
msfadmin
has the same password as this username- Type
hydra -l msfadmin -p msfadmin -f -V 192.168.195.145 ssh
, to launch hydra to against ssh service
- Type
Professional Resources
- Reverse Engineering malware analysis resources: https://www.sans.org/course/reverse-engineering-malware-malware-analysis-tools-techniques
- I means the free resources at it bottom
How To
- Using Free Windows XP Mode as a VMware Virtual Machine: https://zeltser.com/windows-xp-mode-for-vmware-virtualization/
- How to Get a Windows XP Mode Virtual Machine on Windows 8.1: https://zeltser.com/how-to-get-a-windows-xp-mode-virtual-machine-on-windows/