146 lines
9.0 KiB
Markdown
146 lines
9.0 KiB
Markdown
# Project: Knowledge
|
||
|
||
### Overview
|
||
**Knowledge** is a curated collection of resources for learning and exploring various topics in cybersecurity, hacking, and technology. This repository serves as a guide to help you dive into key concepts, frameworks, and methodologies across several domains.
|
||
|
||
Many resources are inspired by and built upon the foundation of [Awesome Cyber Security](https://theredteam.tech/ch0ic3/awesome-cyber-security).
|
||
|
||
---
|
||
|
||
## Table of Contents
|
||
1. [Web Hacking](#web-hacking)
|
||
2. [Android Security](#android-security)
|
||
3. [Malware Analysis](#malware-analysis)
|
||
4. [Bug Bounty](#bug-bounty)
|
||
5. [Social Engineering](#social-engineering)
|
||
6. [Reverse Engineering](#reverse-engineering)
|
||
|
||
---
|
||
|
||
## Web Hacking
|
||
Web hacking focuses on exploiting vulnerabilities in web applications, websites, IoT devices, and other web-hosted systems. This field is an essential starting point for aspiring cybersecurity professionals.
|
||
|
||
### **Getting Started**
|
||
1. **Learn the basics**: Familiarize yourself with core web technologies like HTML, CSS, and JavaScript.
|
||
2. **Build and break**: Create a simple website using technologies like Node.js, Express.js, Prisma (with SQLite), and EJS rendering. Test its security as your first project.
|
||
|
||
### **Recommended Topics**
|
||
- Begin with **XSS (Cross-Site Scripting)** and **SQL Injection**.
|
||
- Progress to **CSRF**, **RCE**, **XXE**, and **SSRF**.
|
||
- Study browser security concepts like **CORS** and **CSP headers**.
|
||
|
||
### **Hands-On Practice**
|
||
- Labs: [PortSwigger Academy](https://portswigger.net/web-security)
|
||
- Challenges: Test your skills with web challenges on [CTFtime](https://ctftime.org).
|
||
|
||
### **Additional Resources**
|
||
- [Awesome Web Security](https://theredteam.tech/ch0ic3/awesome-web-security)
|
||
- [Bug Bounty References](https://theredteam.tech/ch0ic3/bug-bounty-reference) for real-world case studies and tools.
|
||
|
||
### **Books for Beginners**
|
||
1. [RTFM: Red Team Field Manual v2](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Red%20team%20field%20manual%20v2.pdf)
|
||
2. [The Web Application Hacker's Handbook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/The%20web%20application%20hacker%27s%20handbook.pdf)
|
||
3. [The Hacker Playbook 3](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/The%20Hacker%20Playbook%203%20Practical%20Guide%20to%20Penetration%20Testing%20%28Peter%20Kim%29.pdf)
|
||
4. [Bug Bounty Bootcamp](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Bug%20Bounty%20Bootcamp%20The%20Guide%20to%20Finding%20and%20Reporting%20Web%20Vulnerabilities%20%28Vickie%20Li%29.pdf)
|
||
|
||
---
|
||
|
||
## Android Security
|
||
With the rise of smartphones and IoT devices, Android security has become a critical area of study. Understanding the Android ecosystem and common vulnerabilities can help you secure mobile applications and devices.
|
||
|
||
### **Resources**
|
||
- [Mobile Security](https://theredteam.tech/ch0ic3/awesome-mobile-security)
|
||
|
||
---
|
||
|
||
### **Malware Analysis**
|
||
Malware analysis is a vital skill in the fight against cyber threats. It involves dissecting malicious software to understand its behavior, purpose, and impact. Whether you’re detecting ransomware, analyzing advanced persistent threats (APTs), or studying botnets, malware analysis is an essential discipline for cybersecurity professionals.
|
||
|
||
#### **Steps in Malware Analysis**
|
||
1. **Static Analysis**: Examine the malware without running it. This includes inspecting file metadata, strings, and disassembling code.
|
||
2. **Dynamic Analysis**: Observe the malware in action by running it in a controlled sandbox or virtual environment.
|
||
3. **Behavioral Analysis**: Identify the changes the malware makes, such as file creation, registry modification, or network connections.
|
||
4. **Reverse Engineering**: Use tools like IDA Pro, Ghidra, or Radare2 to decompile and understand the malware's inner workings.
|
||
|
||
#### **Recommended Tools**
|
||
- **Sandboxing**: [Cuckoo Sandbox](https://cuckoosandbox.org), [Any.Run](https://any.run)
|
||
- **Reverse Engineering**: [IDA Pro](https://hex-rays.com/ida-pro/), [Ghidra](https://ghidra-sre.org/)
|
||
- **Network Analysis**: [Wireshark](https://www.wireshark.org/)
|
||
- **Static Analysis**: [PEStudio](https://www.winitor.com/), [Binwalk](https://github.com/ReFirmLabs/binwalk)
|
||
|
||
#### **Essential Resources**
|
||
0. [Awesome malware analysis](https://theredteam.tech/ch0ic3/awesome-malware-analysis) - git list like this one but only with malware resources
|
||
1. [Malware Unicorn’s Training](https://malwareunicorn.org/#/workshops) - Excellent workshops and guides for malware analysis.
|
||
2. [Practical Malware Analysis Labs](http://practicalmalwareanalysis.com/labs/) - Hands-on exercises to practice analysis.
|
||
3. [Remnux](https://remnux.org/) - A Linux distribution specifically tailored for malware analysis.
|
||
4. [Flare-On](https://www.fireeye.com/services/freeware/flare-on.html) - A reverse engineering CTF designed for malware analysts.
|
||
|
||
#### **Further Reading**
|
||
- [Real Digital Forensics](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Real%20Digital%20Forensics.pdf) - Incident response and forensic techniques.
|
||
- [Mastering Malware Analysis](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Mastering%20Malware%20Analysis.pdf) - A comprehensive guide to combating advanced threats.
|
||
- [The Art of Memory Forensics](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/The%20Art%20of%20Memory%20Forensics.pdf) - Detecting malware in memory.
|
||
|
||
#### **Hands-On Activities**
|
||
- Set up a virtual lab using VMware or VirtualBox with tools like [FLARE VM](https://github.com/mandiant/flare-vm).
|
||
- Use honeypots like [Dionaea](https://github.com/DinoTools/dionaea) to capture malware samples.
|
||
- Practice capturing network traffic from malicious executables using Wireshark.
|
||
|
||
|
||
---
|
||
|
||
## Bug Bounty
|
||
Bug bounty programs offer ethical hackers a chance to find and report vulnerabilities in return for rewards. It’s an excellent way to test your skills in real-world scenarios.
|
||
|
||
### **Resources**
|
||
- [Awesome Bug Bounty](https://theredteam.tech/ch0ic3/awesome-bug-bounty)
|
||
|
||
---
|
||
|
||
### **Social Engineering**
|
||
Social engineering exploits human psychology to gain unauthorized access or gather sensitive information. It remains one of the most effective attack vectors in cybersecurity.
|
||
|
||
#### **Types of Social Engineering Attacks**
|
||
1. **Phishing**: Sending fake emails to trick users into revealing sensitive information.
|
||
2. **Spear Phishing**: Highly targeted phishing aimed at specific individuals or organizations.
|
||
3. **Pretexting**: Creating a fabricated scenario to manipulate victims into divulging information.
|
||
4. **Baiting**: Using physical or digital bait, like infected USB drives, to trick users.
|
||
5. **Tailgating**: Gaining access to secure areas by following authorized personnel.
|
||
|
||
#### **Recommended Tools**
|
||
- **Phishing Simulations**: [Gophish](https://getgophish.com/) - Test your organization's resilience to phishing.
|
||
- **OSINT Gathering**: [Maltego](https://www.maltego.com/), [SpiderFoot](https://www.spiderfoot.net/)
|
||
- **Human Risk Assessment**: [Social-Engineer Toolkit (SET)](https://github.com/trustedsec/social-engineer-toolkit)
|
||
|
||
#### **Practical Tips to Avoid Social Engineering**
|
||
1. Train employees to recognize phishing attempts.
|
||
2. Verify the identity of individuals before sharing sensitive information.
|
||
3. Use multifactor authentication to secure accounts.
|
||
4. Monitor for unusual activity, such as unauthorized login attempts.
|
||
|
||
#### **Further Reading**
|
||
1. [Social Engineering: The Science of Human Hacking by Christopher Hadnagy MISSING]()
|
||
2. [Social Engineering Framework](https://www.social-engineer.org/framework/) - Comprehensive resource for understanding social engineering tactics.
|
||
3. [The Psychology of Information Security MISSING]() - Learn about human factors in cybersecurity.
|
||
|
||
#### **Hands-On Activities**
|
||
- Conduct phishing campaigns in a controlled environment using [Gophish](https://getgophish.com/).
|
||
- Practice OSINT techniques with tools like [Sherlock](https://github.com/sherlock-project/sherlock).
|
||
- Participate in social engineering CTFs to test your skills.
|
||
|
||
## Reverse Engineering
|
||
Reverse engineering involves analyzing software or hardware to understand its design and behavior. This skill is essential for malware analysis, vulnerability research, and exploit development.
|
||
|
||
### **Recommended Books**
|
||
1. [Practical Reverse Engineering](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/Practical%20Reverse%20Engineering%20x86%2C%20x64%2C%20ARM%2C%20Windows%20Kernel%2C%20Reversing%20Tools%2C%20and%20Obfuscation%20%28Bruce%20Dang%2C%20Alexandre%20Gazet%2C%20Elias%20Bachaalany%29.pdf)
|
||
2. [The IDA Pro Book MISSING]()
|
||
3. [GhidraBook](https://theredteam.tech/ch0ic3/My-Books/src/branch/main/theghidrabook.pdf)
|
||
---
|
||
|
||
## Contributions
|
||
Contributions are welcome! Feel free to open issues or submit pull requests to add valuable resources or enhance existing content.
|
||
|
||
---
|
||
|
||
### Final Thoughts
|
||
This repository is a starting point for exploring diverse fields in cybersecurity. Use the recommended resources to build your skills, and don’t hesitate to seek help or clarification. Good luck on your journey!
|