Sie sind auf Seite 1von 7

FROMDEV

80+ Best Free Hacking Tutorials | Resources to Become Pro H http://www.fromdev.com/2013/07/Hacking-Tutorials.html

therefore you must keep learning new things with a really fast pace. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of will help you speed up on your learning. If you decide you pursue ethical hacking as a career option, ethical hacking books. A lot of people (including me before doing research for this article) think that they can become a hac web. Its true that some common types of hacking can be easily done with help of tools, however doing i hacker is the one who can find a vulnerability and develop a tool to exploit and/or demonstrate it. Hacking is not only about knowing "how things work", but its about knowing "why things work that way" Below are some really useful hacking tutorials and resources you may want to explore in your journey o

Hacking For Dummies - Beginners Tutorials


These tutorials are not really simple for anyone who is just starting to learn hacking techniques. How you. I am sure you have different opinion about complexity of each tutorial however advanced hacker ar kiddie (beginner hacker). Even to acquire the skills of a script kiddie you need to have good understa programming. 1. Hacking Tutorials for Beginners - By BreakTheSecurity.com 2. How to learn Ethical hacking - By Astalavista.com 3. Penetration Testing Tutorial - By Guru99.com 4. Backtrack Penetration Testing Tutorial 5. Introduction to Penetration Testing 6. Information Gathering with Nmap 7. Simple How To Articles By Open Web Application Security 8. The Six Dumbest Ideas in Computer Security 9. Secure Design Principles 10. 10 steps to secure software

Cryptography Related Tutorials

Cryptography is must know topic for any aspiring security professional or a ethical hacker. You must u done. You must understand why some of the old encryption techniques do not work in modern computin

This is a important area and a lot of software programmers and professional do not understand it very good understanding of mathematics, this means you also need to have good fundamentals on discrete m 1. Introduction to Public Key Cryptography 2. Crypto Tutorial 3. Introduction to Cryptography 4. An Overview of Cryptography 5. Cryptography Tutorials - Herong's Tutorial Examples 6. The Crypto Tutorial - Learn How to Keep Secret Secret 7. Introduction to cryptology, Part 1: Basic Cryptology Concepts

Websites For Security Related Articles And News


These are some websites, that you may find useful to find hacking related resources and articles. A lo experimenting through these sites for improving yourself to become advanced hacker. In recent years, many people are aspiring to learn how to hack. With growing interest in this area, a evolving. With popularity of social networks many people have inclined towards vulnerability in variou myspace etc. Continuous learning about latest security issues, news and vulnerability reports are really important of the sites that keep publishing informative articles and news are listed here. 1. http://www.astalavista.com/ 2. http://packetstormsecurity.com/ 3. http://www.blackhat.com/ 4. http://www.metasploit.com/ 5. http://sectools.org/ 6. http://www.2600.com/ 7. DEF CON - Hacking conference 8. http://www.breakthesecurity.com/ 9. http://www.hacking-tutorial.com/ 10. http://www.evilzone.org/ 11. http://hackaday.com/ 12. http://www.hitb.org/ 13. http://www.hackthissite.org/ 14. http://pentestmag.com 15. http://www.securitytube.net/ 16. https://www.ssllabs.com/

EBooks And Whitepapers

Some of the research papers by security experts and gurus can provide you a lot of information and ins to read and understand therefore you may need to read them multiple times. Once you understand the to and you will be able to skim through a lot content in less time.

1. Handbook of Applied Cryptography - This ebook contains some free chapter from one of the popul also available on amazon at Cryptography Book. 2. Network Penetration testing Guide 3. How to hack anything in Java 4. Mcafee on iPhone and iPad Security

5. A Good Collection of White papers on security and vulnerabilities - This site contains collection of w some of these white papers are really worth referring. 6. Engineering Principles for Information Technology Security 7. Basic Principles Of Information Protection

8. Open Web Application Security Project - OWASP is one of the most popular sites that contains we

Videos & Play Lists


Those who like to watch video tutorials, here are few I liked. However there are many small video avai and share with us if you like something. 1. Cryptography Course By Dan Boneh Stanford University

2. Open Security Training- Youtube Playlist of More than 90 hours. I have found this to be the biggest topic.

3. OWASP AppSec USA 2011: Youtube Playlist containing compilation of OWASP conference highlig

4. Defcon: How I Met your Girlfriend - Defcon is one of the most popular hacker conference. The pres inside the hacking industry. 5. Defcon: What happens when you steal a hackers computer 6. Defcon: Nmap: Scanning the Internet 7. Public Key Cryptography: Diffie-Hellman Key Exchange 8. Web application Pen testing 9. Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit

Forums For Hackers And Security Professionals

Just like any other area, forums are really great help for learning from other experts. Hundreds of se are willing to share their knowledge on forums for some reason. Please keep in mind to do enough resea to people who take time to answer your question.

1. Stackoverflow for security professionals 2. http://darksat.x47.net/ 3. http://forums.securityinfowatch.com/ 4. http://forums.cnet.com/spyware-viruses-security-forum/ 5. http://www.hackforums.net/forumdisplay.php?fid=47

Vulnerability Databases And Resources


Vulnerability Databases are the first place to start your day as a security professional. Any new vuln the public vulnerability databases. These databases are a big source of information for hackers to be vulnerability. 1. http://www.exploit-db.com/ 2. http://1337day.com/ 3. http://securityvulns.com/ 4. http://www.securityfocus.com/ 5. http://www.osvdb.org/ 6. http://www.securiteam.com/ 7. http://secunia.com/advisories/ 8. http://insecure.org/sploits_all.html 9. http://zerodayinitiative.com/advisories/published/ 10. http://nmrc.org/pub/index.html 11. http://web.nvd.nist.gov 12. http://www.vupen.com/english/security-advisories/ 13. http://www.vupen.com/blog/ 14. http://cvedetails.com/ 15. http://www.rapid7.com/vulndb/index.jsp 16. http://oval.mitre.org/

Product Specific Vulnerability Information


Some of the very popular products in the world require a special attention and therefore you may want directly from vendors. I have kept Linux. Microsoft and apache in this list, however it may apply to a 1. Red Hat Security and other updates Site

2. Microsoft Products Security Bulletin 3. Apache Foundation Products Security Repository 4. Ubunut Software Security Center 5. Linux Security Repository

Tools And Programs For Hacking / Security

There are dozens of tools available for doing different types of hacking and tests. Tools are really i work. Some of the very common tools that are used by hackers are listed here. You may have different c 1. nmap 2. NSS 3. Hping 4. TCPDump 5. Metasploit 6. Wireshark 7. Network Stuff 8. Nikto

Summary
I have tried to compile some of these resources for my own reference for the journey of learning I am level of becoming hacker but the knowledge of this field really fascinates me and keeps me motivated f able to become successful in this. A lot of people use their knowledge skills for breaking stuff and stealing. I personally think that do not have a good ending. I would recommend not to use your skills for any un-ethical endeavor. A single career since most companies do a strict third party background check before they hire a ethical hacker There are dozens of companies looking for ethical hackers and security professionals. There are really and its really niche compensation segment. You will be easily able to get a decent job without even ac pro hacker.

POST A COMMENT

Java PaaS
cloudcontrol.com/java Supercharge development and instantly deploy Java apps.

Das könnte Ihnen auch gefallen