Offensive Security#
Table of Contents#
Resources#
Tools & Technologies
online
Texts#
Clark, Ben. (2014). RTFM Red Team Field Manual.
Kim, Peter. (2018). The Hacker Playbook 3: Practical Guide to Penetration Testing.
Kim, Peter. (2015). The Hacker Playbook 2: Practical Guide to Penetration Testing.
Kim, Peter. (2014). The Hacker Playbook: Practical Guide to Penetration Testing.
OccupyTheWeb. (2018). Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali. No Starch Press.
Wylie, Phillip & Kim Crawley. (2020). The Pentester Blueprint: Starting a Career as an Ethical Hacker. Wiley.
Terms#
[ w ] Backdoor
[ w ] Black Box
[ w ] Black Hat
[ w ] Capture the Flag (CTF)
[ w ] Device Fingerprint
[ w ] Exploit
[ w ] Gray Box
[ w ] Gray Hat
[ w ] Hacker
[ w ] Offensive Security (OffSec)
[ w ] Packet Analysis
[ w ] Password Cracking
[ w ] Penetration Test
[ w ] Port Scanner
[ w ] Privilege Escalation
[ w ] Script Kiddie
[ w ] Security Hacker
[ w ] Semantic URL Attack
[ w ] Shellcode
[ w ] SQL Injection
[ w ] TCP/IP Stack Fingerprint
[ w ] Vulnerability
[ w ] Vulnerability Database
[ w ] Vulnerability Scanner
[ w ] White Box
[ w ] White Hat