- What is Hacking?
- How To becom a Hacker
- Hacker Etic
- Hacker Lifestyle: How I Feel Satisfied with Every Day
- What is open source ?
- What does Hacker Jargon mean?
- Timeline of computer security Hacker history
- White hat
- Black hat
- Grey hat
- Blue hat
- Elite hacker
- Script kiddie
- Neophyte
- Hacktivist
- Samurai
Before you Start
- 101 Ways to Learn English - Here are 101 things (in no particular order) you can do to improve your English.
- What to read when you’re a beginner?
- engVid - Learn English for free with 656 video lessons by experienced native-speaker teachers for all levels (Beginner, Intermediate and Advanced).
- lingq - Learning Languages, Simply.
Before you Start
- What does numeration system mean
- Computer Numbering Formats
- [Binary, Decimal and Hexadecimal Number Systems] (https://www.youtube.com/watch?v=_97OwCkjh3c)
Before you Start
Before you Start
- Algorithms, Part I - This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
- Algorithms, Part II - This course covers the essential information that every serious programmer needs to know about algorithms and data structures, with emphasis on applications and scientific performance analysis of Java implementations.
- The Algorithm Design Manual
- Introduction to Algorithms, Second Edition
- Algorithms + Data Structures = Programs
Before you Start
- coursera: Computer Architecture - In this course, you will learn to design the computer architecture of complex modern microprocessors.
- Computer Architecture Tutorial
- See How the CPU Works In One Lesson
Before you Start
Before you Start
Before you Start
- Debian
- Debian Installation Guide
- Debian Dcoumentation
- Ubuntu
- Knoppix
- Fedora
- Red Hat Enterprise Linux
- CentOS
- Oracle Linux
- Mandriva
- Red Hat Enterprise Linux
- Gentoo
- openSUSE
- Arch Linux
- Manjaro Linux
- Chromium OS
- Chrome OS
Before you Start
Before you Start
Before you Start
Before you Start
-
Bluetooth
-
Fibre Channel network protocols
-
Internet Protocol Suite or TCP/IP model or TCP/IP stack
-
What does Transmission Control Protocol/Internet Protocol (TCP/IP) mean?
-
User Datagram Protocol (UDP)
-
OSI protocols
-
Routing protocols
-
List of IP protocol numbers
-
Yahoo! Messenger
-
RTPS protocol
-
SSH
-
FTP
-
SMTP
-
Telnet
-
HTTP
-
HTTPs
-
SFTP
-
SSL
-
TLS
-
POP
-
E6
-
NTP
-
PPP
-
NNTP
-
IMAP
- Imperative programming
- Procedural programming
- Functional programming
- Logic programming
- Object oriented programming
- Class
- Inheritance
- Object
Basic Prerequisites
- Computer Architecture Basis
- Numeral system
- CPU Modes and Memory Adressing
Tools
- IDE or Text Editor
- Nasm
- Ld
- Objdump
- Ndiasm
Manual
- x86 Assembly Language Programming
- The Art of Assembly Language Programming
- Assembly Language and Shellcoding on Linux
- Assembly Language Megaprimer for Linux
- Assembly Language Programming Course
- Assembly Language for x86 Processors
- The Art of Assembly Language
- Assembly Language Step-by-step: Programming with DOS and Linux
Basic Prerequisites
- Computer Architecture Basis
- Numeral system
Tools
- IDE or Text Editor
- GCC or Clang
Manual
- C Programming Notes
- Programming in C
- C Lesson by Chris Sawtell
- comp.lang.c Frequently Asked Questions
- The C Programming Language Standard
- High and Low-Level C
-
Language
-
Libraries
- MFC
- .Net
- WxWidgets
- Qt
- KDE
- GNOME
- TurboVision
- Boost
- Modern C++ Design: Generic Programming and Design Patterns Applied
- The C++ Programming Language: Special Edition (3rd Edition)
- Effective C++
-
Language
-
Frameworks
- Zend Frameworks
- Symfony
- Codeigniter
- Laravel
-
CMS
- Wordpress
- Drupal
- Joomla
- Agile
- Waterfal
- Prototype model
- Incremental
- Iterative
- V-model
- Spiral
- Scrum
- Cleanroom
- RAD
- DSDM
- RUP
- XP
- Lean
- Dual Vee
- Model
- TDD
- FDD
- DDD
- Account lockout attack
- Cache Poisoning
- Cross-User Defacement
- Mobile code: invoking untrusted mobile code
- Mobile code: non-final public field
- Mobile code: object hijack
- Path Traversal
- Buffer overflow attack
- Buffer Overflow via Environment Variables
- Overflow Binary Resource File
- Cross-Site Request Forgery (CSRF)
- Logic/time bomb
- Replicating (virus)
- Trojan Horse
- Account lockout attack
- Cross-Site Request Forgery (CSRF)
- Execution After Redirect (EAR)
- One-Click Attack
- Session fixation
- Session hijacking attack
- Session Prediction
- XSRF
- Blind SQL Injection
- Blind XPath Injection
- Code Injection
- Command Injection
- Comment Injection Attack
- Content Security Policy
- Content Spoofing
- CORS RequestPreflighScrutiny
- Cross-site Scripting (XSS)
- Custom Special Character Injection
- Direct Dynamic Code Evaluation ('Eval Injection')
- Direct Static Code Injection
- Format string attack
- Full Path Disclosure
- LDAP injection
- Parameter Delimiter
- PHP Object Injection
- Regular expression Denial of Service - ReDoS
- Resource Injection
- Server-Side Includes (SSI) Injection
- Special Element Injection
- SQL Injection
- Web Parameter Tampering
- XPATH Injection
- Brute force attack
- Cash Overflow
- Cryptanalysis
- Denial of Service
- HTTP Request Smuggling
- HTTP Response Splitting
- Traffic flood
- Asymmetric resource consumption (amplification)
- Cash Overflow
- Denial of Service
- Comment Injection Attack
- Custom Special Character Injection
- Double Encoding
- Forced browsing
- Path Traversal
- Relative Path Traversal
- Repudiation Attack
- Setting Manipulation
- Spyware
- Unicode Encoding
- MAC Attacks
- DHCP Attacks
- DNS Poisoning
- ARP Poisoning Attacks
- Cash Overflow
- Cross-Site Request Forgery (CSRF)
- Denial of Service
- Man-in-the-middle attack
- Kali Linux
- Knoppix
- BackBox
- Pentoo
- DEFT Linux
- CAINE
- Samurai Web Testing Framework
- Matriux
- Weakerth4n
- BugTraq
- NodeZero
Before you Start
-
dnsdict6
- Description: Dnsdict6 is part of THC IPv6 Attack Toolkit and is a parallized DNS IPv6 dictionary bruteforcer.
- Platforms: Linux, Unix
- How to install: Dnsdict6 installation
- How to use: How To Use Dnsdict6 To Enumerate Domain On Backtrack
-
dnsenum
- Website: github.com/fwaeytens/dnsenum
- Description: Pentesting tool that enumerates as much DNS information about domains as possible.
- Platforms: Linux, Unix
- How to install: Dnsenum installation
- How to use: DNS Information Gathering With dbsenum
-
dnsmap
- Website: github.com/makefu/dnsmap
- Description: Dnsmap is a passive network mapper and normally known as subdomain brute forcer
- Platforms: Linux, Unix
- How to install: Dnsmap installation
- How to use: Information Gathering Using dnsmap
-
dnsrecon
- Website: github.com/darkoperator/dnsrecon
- Description: It enables to gather DNS-oriented information on a given target.
- Platforms: Linux, Unix
- How to install: Dnsrecon installation
- How to use: Information Gathering Using dnsrecom tool
-
dnsrevenum6
-
dnstracer
- Website: mavetju.org/unix/dnstracer.php
- Description: Dnstracer enables to trace a chain of DNS servers to the source. It determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data.
- Platforms: Linux, Unix
- How to install: Dnstracer Installation
- How to use: Information Gathering Using dnstracer tool
-
dnswalk
- Website: github.com/davebarr/dnswalk
- Description: Dnswalk is a DNS database debugger. It performs zone transfers of specified domains, and checks the database in numerous ways for internal consistency, as well as for correctness according to accepted practices with the Domain Name System.
- Platforms: Linux, Unix
- How to install: Dnswalk installation
- How to use: How to use dnswalk
-
fierce
- Description: Fierce is a semi-lightweight enumeration scanner that helps penetration testers locate non-contiguous IP space and hostnames for a specified domains using things like DNS, Whois and ARIN.
- Platforms: Linux, Unix
- How to install: Fierce installation
- How to use: Information Gathering Using Fierce Tool
-
maltego
- Website: github.com/allfro/sploitego
- Platforms: Linux, Unix, Mac OS X
- How to install: Maltego Installation
- How to use: Maltego Tool Demonstration
-
nmap
- Website: github.com/nmap/nmap
- Description: Nmap is certainly THE scanner to know. Thanks to its numerous parameters, it is a swiss army knife to all situations where network identification is needed. It enables among other things to list network hosts and scan their ports.
- Platforms: Linux, Unix, Mac OS X, Windows
- How to install: Nmap installation
- How to use: Nmap Usage Basics
-
urlcrazy
- Netbeans
- Sublime Text
- Vim like an IDE
- wpMail - Wordpress Weekly
- The Weekly Drop - Drupal Weekly
- Wechall
- Smashthestack
- Overthewire
- Try2hack
- Hack This Site - Hack This Site is a free, safe and legal training ground for hackers to test and expand their hacking skills
- Hacking Lab
- Honeynet Project Challenges
- Project Euler - Project Euler is a series of challenging mathematical/computer programming problems that will require more than just mathematical insights to solve
Before you Start
- CEH - Certified Ethical Hacker
- CHFI - Computer Hacking Forensic Investigator
- CCISO - Certified Chief Inofrmation Security Officer
- LPT - Licensed Penetration Tester
- ECSA - EC-Council Certified Security Analyst
- ENSA - EC-Council Network Security Administrator
- ECIH - EC-Council Certified Incident Handler
- EDRP - EC-Council Disaster Recovery Professional
- CSCU - Certified Secure Computer User
- CNDA - Certified Network Defense Architect
- ECSS - EC-Council Certified Security Specialist
- ECSP - EC-Council Certified Secure Programmer
- ECVP - EC-Council Certified VoIP Professional
- ECES - EC-Council Certified Encryption Specialist
- ECE - EC-Council Continuing Education
- OWASP Podcast
- ASIS Security Management Podcast
- Eurotrash Security Podcast
- Exotic Liability
- Network Seucrity Podcasts
- 2600: Off The Hook
- CyberSpeak's Podcast
- Crypto-Gram Security Podcast
- Speaking of Security
- PaulDotCom Security Weekly
- Risky Business
- SecuraBit Podcast
- Social Media Security Podcast
- Social-Engineering.org Podcast
- The Southern Fried Security Podcast
-
Black Hat - Black Hat is the most technical and relevant global information security event series in the world.
-
Athcon - AthCon is an annual, European two-day conference targeting particular areas of information security.
-
Chaos Communication Congress - Each BSides is a community-driven framework for building events for and by information security community members.
- Dennis Ritchie
- Ken Thompson
- Tim Berners-Lee
- Richard Stallman
- Linus Torvalds
- Brian Kernighan
- Rasmus Lerdorf
- James Gosling
- Matt Mullenweg
- Brendan Eich
- Carl Sassenrath
- Bjarne Stroustrup
- Bram Cohen
- Alan Cooper
- Larry Wall
- Kathy Sierr
- Edsger Wybe
- John Resig
- Guido van Rossum
- Douglas Crockford
- Jeff Atwood
- Miguel de Icaza
The List includes both Black Hat and White Hat Hackers.
-
- Website: mitnicksecurity.com
- Twitter: @kevinmitnick
- Books: Ghost in the Wires, The Art Of Intrusion, The Art of Deception
-
- Website: kevinpoulsen.com
- Twitter: @kpoulsen
- Book: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
-
- Website: adrian.lamo.org)
- Twitter: @6
-
Robert Tappan Morris
-
John Draper
-
The Masters of Deception
-
Matthew Bevan
-
Richard Pryce
-
Jonathan James
-
Albert Gonzalez
-
Stephen Wozniak
-
Tim Berners-Lee
- Hackers The History Of Hacking
- Revolution OS Linux Documentary 2001
- Freedom Downtime
- The Code Linux (2001)
- Hackers Are People Too 2008
- Triumph Of The Nerds Part 1
- Triumph Of The Nerds Part 2
- Hack, Hacking & Hackers - In the Realm of the Hackers
- Web Warriors ~ CBC Documentary
- Worth your time! Hackers Outlaws And Angels
- How Hackers Changed the World (BBC Documentary 2013)