Offensive Security

Offensive Security#


Table of Contents#


Resources#

Tools & Technologies

  • [ h ][ g ][ w ] Aircrack-ng

  • [ h ][ g ][ w ] Armitage

  • [ h ][ g ][ w ] John the Ripper

  • [ h ][ g ][ w ] Kali Linux

  • [ h ][ g ][ w ] Metasploit

  • [ h ][ g ][ w ] Nmap

  • [ h ][ g ][ w ] Parrot Linux

  • [ h ][ g ][ w ] sqlmap

  • [ h ][ g ][ w ] Zed Attack Proxy (ZAP)

online


Texts#

  • Clark, Ben. (2014). RTFM Red Team Field Manual.

  • Kim, Peter. (2018). The Hacker Playbook 3: Practical Guide to Penetration Testing.

  • Kim, Peter. (2015). The Hacker Playbook 2: Practical Guide to Penetration Testing.

  • Kim, Peter. (2014). The Hacker Playbook: Practical Guide to Penetration Testing.

  • OccupyTheWeb. (2018). Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali. No Starch Press.

  • Wylie, Phillip & Kim Crawley. (2020). The Pentester Blueprint: Starting a Career as an Ethical Hacker. Wiley.


Terms#

  • [ w ] Backdoor

  • [ w ] Black Box

  • [ w ] Black Hat

  • [ w ] Capture the Flag (CTF)

  • [ w ] Device Fingerprint

  • [ w ] Exploit

  • [ w ] Gray Box

  • [ w ] Gray Hat

  • [ w ] Hacker

  • [ w ] Offensive Security (OffSec)

  • [ w ] Packet Analysis

  • [ w ] Password Cracking

  • [ w ] Penetration Test

  • [ w ] Port Scanner

  • [ w ] Privilege Escalation

  • [ w ] Script Kiddie

  • [ w ] Security Hacker

  • [ w ] Semantic URL Attack

  • [ w ] Shellcode

  • [ w ] SQL Injection

  • [ w ] TCP/IP Stack Fingerprint

  • [ w ] Vulnerability

  • [ w ] Vulnerability Database

  • [ w ] Vulnerability Scanner

  • [ w ] White Box

  • [ w ] White Hat