Monday, September 30, 2019

Cross Site Scripting, malware coding, Networking protocols INTERVIEW questions

https://compsecurityconcepts.wordpress.com/2013/11/02/cross-site-scripting/
https://www.infosec.gov.hk/english/virus/virus.html
https://www.softwaretestinghelp.com/cross-site-scripting-xss-attack-test/
https://www.veracode.com/security/xss  (video tutorials as well)
https://www.acunetix.com/websitesecurity/cross-site-scripting/
https://css-tricks.com/anatomy-of-a-malicious-script-how-a-website-can-take-over-your-browser/
https://medium.com/iocscan/dom-based-cross-site-scripting-dom-xss-3396453364fd

Web pen testing interview questions
https://compsecurityconcepts.wordpress.com/2015/03/29/web-penetration-testing-interview-questions-answers/
https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions
https://www.guru99.com/cyber-security-interview-questions.html
https://intellipaat.com/blog/interview-question/ethical-hacking-interview-questions/
malware

http://www.bluekaizen.org/writing-your-own-malware/
https://www.tutorialspoint.com/security_testing/malacious_software.htm
https://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.html
https://www.geeksforgeeks.org/malware-and-its-types/


Networking protocols
https://www.guru99.com/introduction-ccna.html
https://hub.packtpub.com/8-programming-languages-to-learn-in-2019/

Best languages for malware analysis
https://www.malwaretech.com/2018/03/best-programming-languages-to-learn-for-malware-analysis.html
 pen tester 
https://www.concise-courses.com/how-to-become-a-penetration-tester/
https://developers.slashdot.org/story/19/03/25/0322202/which-programming-language-has-the-most-security-vulnerabilities

Saturday, September 28, 2019

database installations and commands

https://proprivacy.com/guides/ethical-hacking-guide
https://resources.infosecinstitute.com/website-hacking-101/#article
https://www.exploit-db.com/google-hacking-database
Cross Site Request Forgery https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
https://www.cyberciti.biz/tips/linux-security.html (important)
https://www.cyberhackingtips.com/ (tips)
https://www.sans.org/reading-room/whitepapers/awareness/paper/37825
https://www.softwaretestinghelp.com/penetration-testing-tools/
https://www.a2hosting.in/kb/developer-corner/mysql/connect-to-mysql-from-the-command-line
https://www.wikihow.com/Hack-a-Database
https://itsfoss.com/best-kali-linux-tools/
http://mstechgurus10.blogspot.com/2013/01/linux-file-system-diagram.html

questions
https://www.sanfoundry.com/cyber-security-questions-answers-types-hackers-security-professionals/
https://www.sanfoundry.com/cyber-security-questions-answers-hacking-security-skills/

https://www.wikihow.com/Hack
oracle 19c database tutorial
https://oracle-base.com/articles/vm/a-cure-for-virtual-insanity (Amazon Web Services-AWS and Cloud Database offering)
https://oracle-base.com/articles/vm/a-cure-for-virtual-insanity


cyber security questions and pen tester interview questions
https://www.synopsys.com/blogs/software-security/web-appsec-interview-questions/
https://www.wisdomjobs.com/e-university/penetration-testing-interview-questions.html
https://compsecurityconcepts.wordpress.com/2016/02/19/network-penetration-testing-interview-questions-answers/
https://allabouttesting.org/interview-questions-answers-penetration-testing/
https://www.glassdoor.ca/Interview/canada-penetration-tester-interview-questions-SRCH_IL.0,6_IN3_KO7,25.htm
https://www.softwaretestinghelp.com/interview-questions/security-testing-interview-questions-and-answers/
https://compsecurityconcepts.wordpress.com/2016/02/19/network-penetration-testing-interview-questions-answers/
https://resources.infosecinstitute.com/top-30-penetration-tester-pentester-interview-questions-and-answers-for-2019/#gref
https://www.sanfoundry.com/cyber-security-questions-answers-hacking-security-skills/
https://www.sanfoundry.com/cyber-security-questions-answers-types-hackers-security-professionals/
https://www.softwaretestinghelp.com/penetration-testing-tools/


https://www.synopsys.com/blogs/software-security/web-appsec-interview-questions/

Thursday, September 12, 2019

Information security fundamentals and cyber security interview questions

https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions
https://www.guru99.com/kali-linux-tutorial.html
https://resources.infosecinstitute.com/category/certifications-training/pentesting-certifications/pentesting-interview-questions/
https://resources.infosecinstitute.com/top-50-information-security-interview-questions/#gref
https://www.sanfoundry.com/computer-fundamentals-questions-answers-network-security/
https://www.educba.com/penetration-testing-interview-questions/
https://www.educba.com/category/software-development/software-development-blog/ethical-hacking-tutorial/
Penetration TestingEthical Hacking
A narrow term which focuses on performing cyber security assessment on IT systemsA comprehensive term in which penetration testing is only one feature
A tester needs to have a good knowledge and skills only in the specific area for which he conducts pen testingAn ethical hacker needs to possess a comprehensive knowledge of various programming and hardware techniques
Anyone who is familiar with penetration testing can perform pen testsUsually is required an obligatory certification of ethical hacking
Access is required only to those systems on which the pen testing will be conductedAccess is required to a wide range of computer systems throughout an IT infrastructure