super-hacker
super-hacker copied to clipboard
How To Become a Super Hacker
# Something You Should Know
- What is Hacking?
- How To becom a Hacker
- Hacker Etic
- Hacker Lifestyle: How I Feel Satisfied with Every Day
- What is open source ?
- What does Hacker Jargon mean?
- Timeline of computer security Hacker history
- Hackers Classifications
- White hat
- Black hat
- Grey hat
- Blue hat
- Elite hacker
- Script kiddie
- Neophyte
- Hacktivist
- Samurai
# English
Before you Start
- Lessons
- 101 Ways to Learn English - Here are 101 things (in no particular order) you can do to improve your English.
- What to read when you’re a beginner?
- engVid - Learn English for free with 656 video lessons by experienced native-speaker teachers for all levels (Beginner, Intermediate and Advanced).
- lingq - Learning Languages, Simply.
- Books
# Math
Before you Start
- Mathematical logic
- Boolean algebra
- Numeral system
- What does numeration system mean
- Computer Numbering Formats
- [Binary, Decimal and Hexadecimal Number Systems] (https://www.youtube.com/watch?v=_97OwCkjh3c)
- Books
# Basic concepts in Computer Science
Before you Start
- Data structure
- Data Type
- Associative array and Hash table
- Array
- List or Sequence
- Tree
- String
- Matrix
- Abstraction
- Big O notation
- Closure
- Compiler
- Interpreter
# Algorithms
Before you Start
- Lessons
- Algorithms, Part I - This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
- Algorithms, Part II - This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
- Books
- The Algorithm Design Manual
- Introduction to Algorithms, Second Edition
- Algorithms + Data Structures = Programs
# Computer architecture
Before you Start
- Lessons
- coursera: Computer Architecture - In this course, you will learn to design the computer architecture of complex modern microprocessors.
- Computer Architecture Tutorial
- See How the CPU Works In One Lesson
- Books
# Operating Systems
Before you Start
- Unix
Before you Start
- Linux
Before you Start
- Distributions
-
Debian
- Debian Installation Guide
- Debian Dcoumentation
- Ubuntu
- Knoppix
-
Fedora
- Red Hat Enterprise Linux
- CentOS
- Oracle Linux
- Mandriva
- Red Hat Enterprise Linux
- Gentoo
- openSUSE
- Arch Linux
- Manjaro Linux
- Chromium OS
- Chrome OS
- Mac OS
Before you Start
- Windows
Before you Start
# Databases
# Network
Before you Start
- Protocols
Before you Start
-
Bluetooth
-
Fibre Channel network protocols
-
Internet Protocol Suite or TCP/IP model or TCP/IP stack
-
What does Transmission Control Protocol/Internet Protocol (TCP/IP) mean?
-
User Datagram Protocol (UDP)
-
OSI protocols
-
Routing protocols
-
List of IP protocol numbers
-
Yahoo! Messenger
-
RTPS protocol
-
SSH
-
FTP
-
SMTP
-
Telnet
-
HTTP
-
HTTPs
-
SFTP
-
SSL
-
TLS
-
POP
-
E6
-
NTP
-
PPP
-
NNTP
-
IMAP
- Internet
- Firewalls
- Books
# Programming
- Programming paradigms
- Imperative programming
- Procedural programming
- Functional programming
- Logic programming
- Object oriented programming
- Class
- Inheritance
- Object
- Languages
- Assembly Language
Basic Prerequisites
- Computer Architecture Basis
- Numeral system
- CPU Modes and Memory Adressing
Tools
- IDE or Text Editor
- Nasm
- Ld
- Objdump
- Ndiasm
Manual
- Lessons
- x86 Assembly Language Programming
- The Art of Assembly Language Programming
- Assembly Language and Shellcoding on Linux
- Assembly Language Megaprimer for Linux
- Assembly Language Programming Course
- Books
- Assembly Language for x86 Processors
- The Art of Assembly Language
- Assembly Language Step-by-step: Programming with DOS and Linux
- C
Basic Prerequisites
- Computer Architecture Basis
- Numeral system
Tools
- IDE or Text Editor
- GCC or Clang
Manual
- Lessons
- C Programming Notes
- Programming in C
- C Lesson by Chris Sawtell
- comp.lang.c Frequently Asked Questions
- The C Programming Language Standard
- High and Low-Level C
- Books
- C++
-
Language
-
Libraries
- MFC
- .Net
- WxWidgets
- Qt
- KDE
- GNOME
- TurboVision
- Boost
- Books
- Modern C++ Design: Generic Programming and Design Patterns Applied
- The C++ Programming Language: Special Edition (3rd Edition)
- Effective C++
- JAVA
- Books
- PYTHON
- RUBY
- PERL
- LISP
- PHP
-
Language
-
Frameworks
- Zend Frameworks
- Symfony
- Codeigniter
- Laravel
-
CMS
- Wordpress
- Drupal
- Joomla
JAVASCRIPT
HTML
CSS
- Software development methodologies
Methodologies
- Agile
- Waterfal
- Prototype model
- Incremental
- Iterative
- V-model
- Spiral
- Scrum
- Cleanroom
- RAD
- DSDM
- RUP
- XP
- Lean
- Dual Vee
- Model
- TDD
- FDD
- DDD
# Cryptography
# Attacks
- Abuse of Functionality
- Account lockout attack
- Cache Poisoning
- Cross-User Defacement
- Mobile code: invoking untrusted mobile code
- Mobile code: non-final public field
- Mobile code: object hijack
- Path Traversal
- Data Structure Attacks
- Buffer overflow attack
- Buffer Overflow via Environment Variables
- Overflow Binary Resource File
- Embedded Malicious Code
- Cross-Site Request Forgery (CSRF)
- Logic/time bomb
- Replicating (virus)
- Trojan Horse
- Exploitation of Authentication
- Account lockout attack
- Cross-Site Request Forgery (CSRF)
- Execution After Redirect (EAR)
- One-Click Attack
- Session fixation
- Session hijacking attack
- Session Prediction
- XSRF
- Injection
- Blind SQL Injection
- Blind XPath Injection
- Code Injection
- Command Injection
- Comment Injection Attack
- Content Security Policy
- Content Spoofing
- CORS RequestPreflighScrutiny
- Cross-site Scripting (XSS)
- Custom Special Character Injection
- Direct Dynamic Code Evaluation ('Eval Injection')
- Direct Static Code Injection
- Format string attack
- Full Path Disclosure
- LDAP injection
- Parameter Delimiter
- PHP Object Injection
- Regular expression Denial of Service - ReDoS
- Resource Injection
- Server-Side Includes (SSI) Injection
- Special Element Injection
- SQL Injection
- Web Parameter Tampering
- XPATH Injection
- Path Traversal Attack
- Probabilistic Techniques
- Brute force attack
- Cash Overflow
- Cryptanalysis
- Denial of Service
- Protocol Manipulation
- HTTP Request Smuggling
- HTTP Response Splitting
- Traffic flood
- Resource Depletion
- Asymmetric resource consumption (amplification)
- Cash Overflow
- Denial of Service
- Resource Manipulation
- Comment Injection Attack
- Custom Special Character Injection
- Double Encoding
- Forced browsing
- Path Traversal
- Relative Path Traversal
- Repudiation Attack
- Setting Manipulation
- Spyware
- Unicode Encoding
- Sniffing Attacks
- MAC Attacks
- DHCP Attacks
- DNS Poisoning
- ARP Poisoning Attacks
- Spoofing
- Cash Overflow
- Cross-Site Request Forgery (CSRF)
- Denial of Service
- Man-in-the-middle attack
- Social Engineering
# Hacking Tools
- Penetration Testing Linux Distributions
- Kali Linux
- Knoppix
- BackBox
- Pentoo
- DEFT Linux
- CAINE
- Samurai Web Testing Framework
- Matriux
- Weakerth4n
- BugTraq
- NodeZero
- Information gathering: DNS Analysis
Before you Start
- Tools
-
dnsdict6
- Description: Dnsdict6 is part of THC IPv6 Attack Toolkit and is a parallized DNS IPv6 dictionary bruteforcer.
- Platforms: Linux, Unix
- How to install: Dnsdict6 installation
- How to use: How To Use Dnsdict6 To Enumerate Domain On Backtrack
-
dnsenum
- Website: github.com/fwaeytens/dnsenum
- Description: Pentesting tool that enumerates as much DNS information about domains as possible.
- Platforms: Linux, Unix
- How to install: Dnsenum installation
- How to use: DNS Information Gathering With dbsenum
-
dnsmap
- Website: github.com/makefu/dnsmap
- Description: Dnsmap is a passive network mapper and normally known as subdomain brute forcer
- Platforms: Linux, Unix
- How to install: Dnsmap installation
- How to use: Information Gathering Using dnsmap
-
dnsrecon
- Website: github.com/darkoperator/dnsrecon
- Description: It enables to gather DNS-oriented information on a given target.
- Platforms: Linux, Unix
- How to install: Dnsrecon installation
- How to use: Information Gathering Using dnsrecom tool
-
dnsrevenum6
-
dnstracer
- Website: mavetju.org/unix/dnstracer.php
- Description: Dnstracer enables to trace a chain of DNS servers to the source. It determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data.
- Platforms: Linux, Unix
- How to install: Dnstracer Installation
- How to use: Information Gathering Using dnstracer tool
-
dnswalk
- Website: github.com/davebarr/dnswalk
- Description: Dnswalk is a DNS database debugger. It performs zone transfers of specified domains, and checks the database in numerous ways for internal consistency, as well as for correctness according to accepted practices with the Domain Name System.
- Platforms: Linux, Unix
- How to install: Dnswalk installation
- How to use: How to use dnswalk
-
fierce
- Description: Fierce is a semi-lightweight enumeration scanner that helps penetration testers locate non-contiguous IP space and hostnames for a specified domains using things like DNS, Whois and ARIN.
- Platforms: Linux, Unix
- How to install: Fierce installation
- How to use: Information Gathering Using Fierce Tool
-
maltego
- Website: github.com/allfro/sploitego
- Platforms: Linux, Unix, Mac OS X
- How to install: Maltego Installation
- How to use: Maltego Tool Demonstration
-
nmap
- Website: github.com/nmap/nmap
- Description: Nmap is certainly THE scanner to know. Thanks to its numerous parameters, it is a swiss army knife to all situations where network identification is needed. It enables among other things to list network hosts and scan their ports.
- Platforms: Linux, Unix, Mac OS X, Windows
- How to install: Nmap installation
- How to use: Nmap Usage Basics
-
urlcrazy
- Integrated Development Environment (IDE)
- Netbeans
- Sublime Text
- Vim like an IDE
# Weekly & Daily Resources
Operating Systems
Programming & Markup Languages
CMS
- wpMail - Wordpress Weekly
- The Weekly Drop - Drupal Weekly
Frameworks
Misc
# Internet Relay Chat (IRC)
# Blogs
# Forums
Information Security
Programming
Unix & Linux
# Jobs & Hiring
# Challenges
- Wechall
- Smashthestack
- Overthewire
- Try2hack
- Hack This Site - Hack This Site is a free, safe and legal training ground for hackers to test and expand their hacking skills
- Hacking Lab
- Honeynet Project Challenges
- Project Euler - Project Euler is a series of challenging mathematical/computer programming problems that will require more than just mathematical insights to solve
# Certifications
Before you Start
- EC-Council
- CEH - Certified Ethical Hacker
- CHFI - Computer Hacking Forensic Investigator
- CCISO - Certified Chief Inofrmation Security Officer
- LPT - Licensed Penetration Tester
- ECSA - EC-Council Certified Security Analyst
- ENSA - EC-Council Network Security Administrator
- ECIH - EC-Council Certified Incident Handler
- EDRP - EC-Council Disaster Recovery Professional
- CSCU - Certified Secure Computer User
- CNDA - Certified Network Defense Architect
- ECSS - EC-Council Certified Security Specialist
- ECSP - EC-Council Certified Secure Programmer
- ECVP - EC-Council Certified VoIP Professional
- ECES - EC-Council Certified Encryption Specialist
- ECE - EC-Council Continuing Education
- Cisco Career Certifications
# Magazines
# Podcasts
- OWASP Podcast
- ASIS Security Management Podcast
- Eurotrash Security Podcast
- Exotic Liability
- Network Seucrity Podcasts
- 2600: Off The Hook
- CyberSpeak's Podcast
- Crypto-Gram Security Podcast
- Speaking of Security
- PaulDotCom Security Weekly
- Risky Business
- SecuraBit Podcast
- Social Media Security Podcast
- Social-Engineering.org Podcast
- The Southern Fried Security Podcast
# Conferences
-
Black Hat - Black Hat is the most technical and relevant global information security event series in the world.
-
Athcon - AthCon is an annual, European two-day conference targeting particular areas of information security.
-
Chaos Communication Congress - Each BSides is a community-driven framework for building events for and by information security community members.
# Most Influential People In Programming
- Dennis Ritchie
- Ken Thompson
- Tim Berners-Lee
- Richard Stallman
- Linus Torvalds
- Brian Kernighan
- Rasmus Lerdorf
- James Gosling
- Matt Mullenweg
- Brendan Eich
- Carl Sassenrath
- Bjarne Stroustrup
- Bram Cohen
- Alan Cooper
- Larry Wall
- Kathy Sierr
- Edsger Wybe
- John Resig
- Guido van Rossum
- Douglas Crockford
- Jeff Atwood
- Miguel de Icaza
# Famous Hackers
The List includes both Black Hat and White Hat Hackers.
-
- Website: mitnicksecurity.com
- Twitter: @kevinmitnick
- Books: Ghost in the Wires, The Art Of Intrusion, The Art of Deception
-
- Website: kevinpoulsen.com
- Twitter: @kpoulsen
- Book: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
-
- Website: adrian.lamo.org)
- Twitter: @6
-
Robert Tappan Morris
-
John Draper
-
The Masters of Deception
-
Matthew Bevan
-
Richard Pryce
-
Jonathan James
-
Albert Gonzalez
-
Stephen Wozniak
-
Tim Berners-Lee
# Documentaries
- Hackers The History Of Hacking
- Revolution OS Linux Documentary 2001
- Freedom Downtime
- The Code Linux (2001)
- Hackers Are People Too 2008
- Triumph Of The Nerds Part 1
- Triumph Of The Nerds Part 2
- Hack, Hacking & Hackers - In the Realm of the Hackers
- Web Warriors ~ CBC Documentary
- Worth your time! Hackers Outlaws And Angels
- How Hackers Changed the World (BBC Documentary 2013)