Hashes.com is a hash lookup service. This allows you to input an MD5, SHA-1, Vbulletin, Invision Power Board, MyBB, Bcrypt, WordPress, SHA-256, SHA-512, MYSQL5 etc hash and search for its corresponding plaintext (“found”) in our database of already-cracked hashes. It’s like having your own massive hash-cracking cluster – but with immediate results!
Hack The Box Forums https://forum.hackthebox.eu/ 0x00sec https://0x00sec.org The Ethical Hacker Network https://www.ethicalhacker.net/forums/ Hack This Site https://www.hackthissite.org/forums
There are many courses on ethical hacking. I chose four courses that I participated in myself and where I really like the content. All courses are by Muharrem Aydin. I like the way he teaches and explains the content. In addition, he works in the cyber security domain for over 20 years. When you choose […]
CDP and LLDP reconnaissance VTY Lines Attacks MAC based attacks: Mac flooding/CAM table overflow Spoofing attacks (ARP, DHCP, Server …) STP attacks VLAN hopping: Switch spoofing / 802.1q Double tagging
Hack The Box CTF365 OverTheWire Hack.me
Certified Ethical Hacker (CEH) Licensed Penetration Tester (LPT) Master Preparation Offensive Security Certified Professional (OSCP) Preparation https://github.com/OlivierLaflamme/Cheatsheet-God https://github.com/rewardone/OSCPRepo https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques https://github.com/ihack4falafel/OSCP https://github.com/skavngr/rapidscan https://github.com/0x4D31/awesome-oscp https://github.com/frizb/Windows-Privilege-Escalation https://github.com/AnasAboureada/Penetration-Testing-Study-Notes https://github.com/six2dez/OSCP-Human-Guide https://github.com/mvdan/xurls https://github.com/tasooshi/pentesting-cookbook https://github.com/sinfulz/JustTryHarder https://github.com/m0nad/awesome-privilege-escalation https://github.com/diego-treitos/linux-smart-enumeration Difference Between OSCP and LPT Master Both certifications are challenging, but they differ greatly in what they attempt to teach and to measure. The OSCP […]
Surface Web (Clear, Visible, Open) Deep Web (Hidden, Invisible) Darknet
Denial of Service (DOS) Packet Mistreating Attacks (PMA) Routing Table Poisoning (RTP) Hit and Run (HAR) Persistent Attacks (PA)