Saturday, November 2, 2019

Web applications pen testing

https://www.veracode.com/security/arp-spoofing ( web application flaws and vulnerabilities tutorials)
https://www.apriorit.com/dev-blog/622-qa-web-application-pen-testing-owasp-checklist
https://www.hacker101.com/ (free video lessons on ethical hacking and bug bounty )
https://hackademy.aetherlab.net/p/burp-suite ( for manual testing with Burp suite for free video lecture)
https://www.guru99.com/complete-web-application-testing-checklist.html
https://www.instart.com/blog/4-common-web-application-security-attacks-and-what-you-can-do-prevent-them
https://www.blackhat.com/trainings/ (Training of Black hat)
https://www.whitehatsec.com/glossary/ (various vulnerable attacks and analysis)
https://portswigger.net/blog/null-byte-attacks-are-alive-and-well
https://www.veracode.com/blog/secure-development/top-five-web-application-authentication-vulnerabilities-we-find
https://www.exploit-db.com/docs/english/44319-web-application-security-testing.pdf


Interview questions -Pen Testing
https://www.janbasktraining.com/blog/security-testing-interview-questions/ (15 questions and answers)
https://resources.infosecinstitute.com/category/certifications-training/pentesting-certifications/pentesting-interview-questions/ (10 Common Interview Questions For Penetration Testers )
https://resources.infosecinstitute.com/category/certifications-training/pentesting-certifications/pentesting-interview-questions/
https://www.wisdomjobs.com/e-university/malware-interview-questions.html     (250+ MALWARE INTERVIEW QUESTIONS & ANSWERS)
https://www.wisdomjobs.com/e-university/malware-interview-questions.html (50+ interview questions on Cyber security)
https://www.edureka.co/blog/interview-questions/cybersecurity-interview-questions/
APPROACHES, TOOLS AND TECHNIQUES FOR SECURITY TESTING
https://www.3pillarglobal.com/insights/approaches-tools-techniques-for-security-testing

Attacking Types, Methadology, Counter measures
https://www.greycampus.com/opencampus/ethical-hacking/web-server-and-its-types-of-attacks
(Web Server and its Types of Attacks)

Tips for securing Web-based applications
https://searchsecurity.techtarget.com/tip/Tips-for-securing-Web-based-applications?bucket=ETA
webpage programming from KHAN Academy

https://www.khanacademy.org/computing 

Thursday, October 31, 2019

web applications pen Testing and samurai framework for web applications testing

https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm (step by step procedure on manual testing and automated pen testing)
 Penetration testers knowledge and expertise: 
Black hat attack methodologies (e.g., remote access attacks, SQL injection)
Internal and external testing (i.e., perspective of someone within the network, perspective of hacker over Internet)
Web front-end technologies (e.g.,Javascript, HTML)
Web application programming languages (e.g., Python, PHP)
Web APIs (e.g., restful, SOAP)
Network technologies (e.g, firewalls, IDS)
Networking protocols (e.g., TCP/UDP, SSL)
Operating systems (e.g., Linux, Windows)
Scripting languages (e.g., python, pearl)
Testing tools (e.g., Nessus, Metasploit)
In short, penetration testers provide a deep look into the data security of an organization.
https://www.netsparker.com/blog/web-security/getting-started-web-application-security/
https://searchsecurity.techtarget.com/tip/5-step-checklist-for-web-application-security-testing
https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm
https://www.guru99.com/web-application-testing.html
http://www.internet-computer-security.com/VPN-Guide/SSL-VPN.html
https://sectools.org/tool/samurai/
https://www.apriorit.com/dev-blog/622-qa-web-application-pen-testing-owasp-checklist

What are the Skill-Sets of Ethical Hackers?
Expert ethical hackers have the following skill-sets to hack the system ethically

What do Ethical Hackers do?
Ethical hackers (while performing penetration testing) basically try to find the answers to the following questions −


Moreover, an ethical hacker is required to address adequately the vulnerabilities and risks, which he found to exist in the target system(s). He needs to explain and suggest the avoidance procedures. Finally, prepare a final report of his all ethical activities that he did and observed while performing penetration testing.

SSL VPN (Secure Socket Layer VPN)

Thursday, October 24, 2019

session tokens, cookies and networking

https://www.enisa.europa.eu/events
https://www.first.org/cvss/calculator/3.0 (CVSS calculator)
https://tools.cisco.com/security/center/cvssCalculator.x (online CVSS calculator - interactive)
https://www.first.org/cvss/specification-document#3-1-Exploit-Code-Maturity-E (CVSS 3.1 guide)
https://www.recordedfuture.com/cvss-scores-guide/ (CVSS score guides)
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator (CVSS score  calculation procedure)
https://rhinosecuritylabs.com/landing/network-penetration-test-report/ 
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-sticky-sessions.html
https://www.tecmint.com/tcpflow-analyze-debug-network-traffic-in-linux/
https://searchnetworking.techtarget.com/answer/How-to-interpret-test-scan-results-to-assess-network-vulnerability
https://www.us-cert.gov/ncas/analysis-reports/AR19-100A
https://security.berkeley.edu/faq/nessus-network-vulnerability-scanning
https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture29.pdf

Hackers club tools
https://hackersonlineclub.com/vapt-tools/
https://hacken.io/research/education/how-much-does-penetration-test-cost-or-price-of-your-security/ (cost of pen test analysis)
https://searchsecurity.techtarget.com/feature/Choose-the-best-vulnerability-assessment-tools
https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/vulnerabilities-and-exploits (Vulnerables repository)
https://www.exploit-db.com/ (oldest vulnerables repository)
https://snyk.io/vuln (existing vulnerabilities repository database)

Amazon Web Services(aws)
https://www.andreafortuna.org/2018/07/18/tcpdump-a-simple-cheatsheet/
https://virginia.service-now.com/its?id=itsweb_kb_article&sys_id=75e70054dbb553404f32fb671d9619d5 Plugin are similar to virus information

Nessus security centre (Tenable.sc) tool
https://www.tenable.com/sc-report-templates/tcp-metrics-report
https://gf.dev/website-audit  (website testing)
https://www.bonkersabouttech.com/security/40-plus-list-of-intentionally-vulnerable-websites-to-practice-your-hacking-skills/392 (vulnerable sites to practice)
(windows 10 64bit .iso iage to download) https://zillowtech.com/download-windows-10-iso.html
https://www.technewsworld.com/story/54411.html 

Monday, October 21, 2019

Monday, September 30, 2019

Cross Site Scripting, malware coding, Networking protocols INTERVIEW questions

https://compsecurityconcepts.wordpress.com/2013/11/02/cross-site-scripting/
https://www.infosec.gov.hk/english/virus/virus.html
https://www.softwaretestinghelp.com/cross-site-scripting-xss-attack-test/
https://www.veracode.com/security/xss  (video tutorials as well)
https://www.acunetix.com/websitesecurity/cross-site-scripting/
https://css-tricks.com/anatomy-of-a-malicious-script-how-a-website-can-take-over-your-browser/
https://medium.com/iocscan/dom-based-cross-site-scripting-dom-xss-3396453364fd

Web pen testing interview questions
https://compsecurityconcepts.wordpress.com/2015/03/29/web-penetration-testing-interview-questions-answers/
https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions
https://www.guru99.com/cyber-security-interview-questions.html
https://intellipaat.com/blog/interview-question/ethical-hacking-interview-questions/
malware

http://www.bluekaizen.org/writing-your-own-malware/
https://www.tutorialspoint.com/security_testing/malacious_software.htm
https://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.html
https://www.geeksforgeeks.org/malware-and-its-types/


Networking protocols
https://www.guru99.com/introduction-ccna.html
https://hub.packtpub.com/8-programming-languages-to-learn-in-2019/

Best languages for malware analysis
https://www.malwaretech.com/2018/03/best-programming-languages-to-learn-for-malware-analysis.html
 pen tester 
https://www.concise-courses.com/how-to-become-a-penetration-tester/
https://developers.slashdot.org/story/19/03/25/0322202/which-programming-language-has-the-most-security-vulnerabilities

Saturday, September 28, 2019

database installations and commands

https://proprivacy.com/guides/ethical-hacking-guide
https://resources.infosecinstitute.com/website-hacking-101/#article
https://www.exploit-db.com/google-hacking-database
Cross Site Request Forgery https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
https://www.cyberciti.biz/tips/linux-security.html (important)
https://www.cyberhackingtips.com/ (tips)
https://www.sans.org/reading-room/whitepapers/awareness/paper/37825
https://www.softwaretestinghelp.com/penetration-testing-tools/
https://www.a2hosting.in/kb/developer-corner/mysql/connect-to-mysql-from-the-command-line
https://www.wikihow.com/Hack-a-Database
https://itsfoss.com/best-kali-linux-tools/
http://mstechgurus10.blogspot.com/2013/01/linux-file-system-diagram.html

questions
https://www.sanfoundry.com/cyber-security-questions-answers-types-hackers-security-professionals/
https://www.sanfoundry.com/cyber-security-questions-answers-hacking-security-skills/

https://www.wikihow.com/Hack
oracle 19c database tutorial
https://oracle-base.com/articles/vm/a-cure-for-virtual-insanity (Amazon Web Services-AWS and Cloud Database offering)
https://oracle-base.com/articles/vm/a-cure-for-virtual-insanity


cyber security questions and pen tester interview questions
https://www.synopsys.com/blogs/software-security/web-appsec-interview-questions/
https://www.wisdomjobs.com/e-university/penetration-testing-interview-questions.html
https://compsecurityconcepts.wordpress.com/2016/02/19/network-penetration-testing-interview-questions-answers/
https://allabouttesting.org/interview-questions-answers-penetration-testing/
https://www.glassdoor.ca/Interview/canada-penetration-tester-interview-questions-SRCH_IL.0,6_IN3_KO7,25.htm
https://www.softwaretestinghelp.com/interview-questions/security-testing-interview-questions-and-answers/
https://compsecurityconcepts.wordpress.com/2016/02/19/network-penetration-testing-interview-questions-answers/
https://resources.infosecinstitute.com/top-30-penetration-tester-pentester-interview-questions-and-answers-for-2019/#gref
https://www.sanfoundry.com/cyber-security-questions-answers-hacking-security-skills/
https://www.sanfoundry.com/cyber-security-questions-answers-types-hackers-security-professionals/
https://www.softwaretestinghelp.com/penetration-testing-tools/


https://www.synopsys.com/blogs/software-security/web-appsec-interview-questions/

Thursday, September 12, 2019

Information security fundamentals and cyber security interview questions

https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions
https://www.guru99.com/kali-linux-tutorial.html
https://resources.infosecinstitute.com/category/certifications-training/pentesting-certifications/pentesting-interview-questions/
https://resources.infosecinstitute.com/top-50-information-security-interview-questions/#gref
https://www.sanfoundry.com/computer-fundamentals-questions-answers-network-security/
https://www.educba.com/penetration-testing-interview-questions/
https://www.educba.com/category/software-development/software-development-blog/ethical-hacking-tutorial/
Penetration TestingEthical Hacking
A narrow term which focuses on performing cyber security assessment on IT systemsA comprehensive term in which penetration testing is only one feature
A tester needs to have a good knowledge and skills only in the specific area for which he conducts pen testingAn ethical hacker needs to possess a comprehensive knowledge of various programming and hardware techniques
Anyone who is familiar with penetration testing can perform pen testsUsually is required an obligatory certification of ethical hacking
Access is required only to those systems on which the pen testing will be conductedAccess is required to a wide range of computer systems throughout an IT infrastructure