From be36460f3e19b6590a16aaf9806d8a79782dca94 Mon Sep 17 00:00:00 2001 From: Brandon Stewart Date: Mon, 23 Oct 2017 21:23:04 -0600 Subject: [PATCH] Update README.md Add Network / Recon section and a few vulnerable app/OS resources. --- README.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/README.md b/README.md index 1e4cadd..2bc93d8 100644 --- a/README.md +++ b/README.md @@ -22,6 +22,7 @@ We started a new [tools](https://github.com/vitalysim/Awesome-Hacking-Resources/ * [Sharpening Your Skills](#sharpening-your-skills) * [Reverse Engineering, Buffer Overflow and Exploit Development](#reverse-engineering-buffer-overflow-and-exploit-development) * [Privilege Escalation](#privilege-escalation) + * [Network Scanning / Reconnaissance](#network-Scanning-/-Reconnaissance) * [Malware Analysis](#malware-analysis) * [Vulnerable Web Application](#vulnerable-web-application) * [Vulnerable OS](#vulnerable-os) @@ -190,6 +191,12 @@ Privilege Escalation * [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623) * [4 Ways get linux privilege escalation](http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation/) +Network Scanning / Reconnaissance +-- +* [NMAP](https://nmap.org/) +* [Foot Printing with WhoIS/DNS records](https://www.sans.org/reading-room/whitepapers/hackers/fundamentals-computer-hacking-956) +* [Google Dorks/Google Hacking] (https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc/) + Malware Analysis -- * [Malware traffic analysis](http://www.malware-traffic-analysis.net/) @@ -206,11 +213,14 @@ Vulnerable Web Application * [OWASP Broken Web Applications Project](https://github.com/chuckfw/owaspbwa/) * [Damn Small Vulnerable Web](https://github.com/stamparm/DSVW) * [OWASP Juice Shop](https://github.com/bkimminich/juice-shop) +* [Google Gruyere](https://google-gruyere.appspot.com/) Vulnerable OS -- * [Metasploitable2 (Linux)](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/) * [Metasploitable3](https://github.com/rapid7/metasploitable3) \[[Installation](https://github.com/rapid7/metasploitable3/blob/master/README.md)\] +* [Vulnhub](https://www.vulnhub.com/) +* [General Test Environment Guidance](https://community.rapid7.com/docs/DOC-2196) Linux Penetration Testing OS --