Offensive Security#
Table of Contents#
Resources#
Tools & Technologies
online
Texts#
- Clark, Ben. (2014). RTFM Red Team Field Manual. 
- Kim, Peter. (2018). The Hacker Playbook 3: Practical Guide to Penetration Testing. 
- Kim, Peter. (2015). The Hacker Playbook 2: Practical Guide to Penetration Testing. 
- Kim, Peter. (2014). The Hacker Playbook: Practical Guide to Penetration Testing. 
- OccupyTheWeb. (2018). Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali. No Starch Press. 
- Wylie, Phillip & Kim Crawley. (2020). The Pentester Blueprint: Starting a Career as an Ethical Hacker. Wiley. 
Terms#
- [ w ] Backdoor 
- [ w ] Black Box 
- [ w ] Black Hat 
- [ w ] Capture the Flag (CTF) 
- [ w ] Device Fingerprint 
- [ w ] Exploit 
- [ w ] Gray Box 
- [ w ] Gray Hat 
- [ w ] Hacker 
- [ w ] Offensive Security (OffSec) 
- [ w ] Packet Analysis 
- [ w ] Password Cracking 
- [ w ] Penetration Test 
- [ w ] Port Scanner 
- [ w ] Privilege Escalation 
- [ w ] Script Kiddie 
- [ w ] Security Hacker 
- [ w ] Semantic URL Attack 
- [ w ] Shellcode 
- [ w ] SQL Injection 
- [ w ] TCP/IP Stack Fingerprint 
- [ w ] Vulnerability 
- [ w ] Vulnerability Database 
- [ w ] Vulnerability Scanner 
- [ w ] White Box 
- [ w ] White Hat