- How to Join the Infosec Community
- [ Hacker Night School ] :: Excellent, well-written hacking lessons: HackingTutorials.org
- Finding and Using Browser-saved Passwords: Another video from Starry Sky
- Hacking for a digital marketer
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]
- [ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]
- [ Hacker Night School ] Being Anonymous: VPNs
- [ Hacker Night School ] :: TOR Browser Search Engines
- [ Bug Bounty ] :: Hack Facebook for Fun and Profit!
- [ Hacker Night School ] :: Learn Python in 43 Minutes (if you’re a really fast learner)
- [ Hacker Night School ] :: Hacking Practice: the Command Injection ISO
- [ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.
- [ Hacker Night School ] :: [ Using Git ]
- [ Hacker Night School ] :: Tsuki CTF Pwns Access on HackTheBox
- [ Hacker Night School ] :: Exploiting sudo: Altering your PATH
- [ Hacker Night School ] :: WEP Cracking Basics in Kali
- [ Hacker Night School ] :: CSRF
- [ Hacker Night School ] :: A Memory Forensics with Volatility Writeup
- [ Hacker Night School ] :: Adding the Kali Tools to Ubuntu
- [ Hacker Night School ] :: Kali Linux Metapackages (All Tools or Subsets)
- [ Hacker Night School ] :: Commando VM: a Windows Hacking “Distro”
- [ Hacker Night School ] :: VulnHub Walk-Throughs: This is how you learn to pwn
- [ Hacker Night School ] :: Metasploitable 3: A Hackable Windows VM
- [ Hacker Night School ] :: Command VM: a Windows Red-Team VM from FireEye
- [ Hacker Night School ] :: WebGoat, An OWASP Hacking Practice Website
- School for Hackers :: Python for Malware Analysis
- [ Hacker Night School ] :: Encoding and Decoding: Base64, ASCII, etc.
- [ Hacker Night School ] :: Using the Greenbone Vulnerability Scanner
- The KNOB Attack: Does this exploit from 2018 still work?
- [ Hacker Night School ] :: The Holy Unblocker
- [ Hacker Night School ] :: the POODLE attack, featuring TLS Downgrade
- [ Hacker Night School ] :: The Illustrated TLS Connection
This is a non-optional skill for anyone who manages systems, runs networks, develops software or hacks on any of these to make them work or break them. 😉
Git (in case you’re a total newb; otherwise skip this) is a code repository, a site where coder teams can work together on projects and check out code like a library (so they don’t save over each others’ revisions).
It’s also a system for installing software. In Linux, you’ll use git a lot to install applications. You’ll learn to love it. But to start out you’ll need to learn it.
A lot of git tutorials are for software developers. Don’t even worry about that advanced stuff at this stage. Just know the basic syntax to install a program you want:
git clone <URL of the software you want>
Assignment 1: Set up git and learn to use it to install software. See the video linked below, but first read this. There are two useful sections for you at this stage.
a) Setup. Follow these instructions appropriate for your OS.
b) Check Out a Repository. How to install software.
Ready player one: http://rogerdudler.github.io/git-guide/
Assignment: Learn to use CodeAcademy by learning to use Git:
https://www.codecademy.com/learn/learn-git