Merge pull request #19 from CallumBaston/master

fixing some spelling and grammar
pull/20/head
Raphael 2019-05-15 13:24:16 +02:00 committed by GitHub
commit 6518913215
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 19 additions and 19 deletions

View File

@ -4,37 +4,37 @@
----
This repository is a overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX compatible, free and open source.
This repository is an overview of what you need to learn penetration testing and a collection of hacking tools, resources and references to practice ethical hacking. Most of the tools are UNIX compatible, free and open source.
## Before you start
- If you're new to information security, forget everything you know about hacking.
- Don't start using tools without reading about pen testing and how it works (see [Additional resources](#additional-resources) section).
- Don't download and use tools that you don't audited the code.
- Don't download or use tools you haven't audited the code.
- Don't use these tools to do stupid things like investigating/hacking without consent on your friends, or worst, your recruiter.
- Read books, manuals, articles, be curious and not just a [scritpt kiddie](https://www.wikihow.com/Avoid-Becoming-a-Script-Kiddie).
- I wish you don't use these tools for illegal purposes, but if you do, I sure hope you know what you do.
- I wish you don't use these tools for illegal purposes, but if you do, I sure hope you know what you're doing.
# Table of Contents
- [Introduction](#introduction)
- [What is penetration testing ?](#what-is-penetration-testing-)
- [Want to become a penetration tester ?](#want-to-become-a-penetration-tester-)
- [What is penetration testing?](#what-is-penetration-testing)
- [Want to become a penetration tester?](#want-to-become-a-penetration-tester)
- [Some vocabulary](#some-vocabulary)
- [Difference between hacking and ethical hacking](#difference-between-hacking-and-ethical-hacking)
- [Languages](#languages)
- [Content Management Systems](#content-management-systems)
- [Basic steps of pen testing](#basic-steps-of-pen-testing)
- [Tools by category](#tools-by-category)
- [:male_detective: Information Gathering](#male_detective-information-gathering)
- [:lock: Password Attacks](#lock-password-attacks)
- [:memo: Wordlists](#memo-wordlists)
- [:globe_with_meridians: Wireless Testing](#globe_with_meridians-wireless-testing)
- [:wrench: Exploitation Tools](#wrench-exploitation-tools)
- [:busts_in_silhouette: Sniffing & Spoofing](#busts_in_silhouette-sniffing--spoofing)
- [:rocket: Web Hacking](#rocket-web-hacking)
- [:tada: Post Exploitation](#tada-post-exploitation)
- [:package: Frameworks](#package-frameworks)
- [:male_detective: Information Gathering](#male_detective-information-gathering)
- [:lock: Password Attacks](#lock-password-attacks)
- [:memo: Wordlists](#memo-wordlists)
- [:globe_with_meridians: Wireless Testing](#globe_with_meridians-wireless-testing)
- [:wrench: Exploitation Tools](#wrench-exploitation-tools)
- [:busts_in_silhouette: Sniffing & Spoofing](#busts_in_silhouette-sniffing--spoofing)
- [:rocket: Web Hacking](#rocket-web-hacking)
- [:tada: Post Exploitation](#tada-post-exploitation)
- [:package: Frameworks](#package-frameworks)
- [Additional resources](#additional-resources)
- [Books / Manuals](#books--manuals)
- [Discussions](#discussions)
@ -46,25 +46,25 @@ This repository is a overview of what you need to learn penetration testing and
# Introduction
## What is penetration testing ?
## What is penetration testing?
Penetration testing is a type of security testing that is used to test the insecurity of an application. It is conducted to find the security risk which might be present in the system.
If a system is not secured, then any attacker can disrupt or take authorized access to that system. Security risk is normally an accidental error that occurs while developing and implementing the software. For example, configuration errors, design errors, and software bugs, etc. [Learn more](https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm)
## Want to become a penetration tester ?
## Want to become a penetration tester?
Know about risks on the internet and how they can be prevented is very useful. Especially as a developer. Web hacking and penetration testing is the v2.0 of self-defense! But does know about tools and how to use them is really all you need to become a pen tester? Surely not. A real penetration tester must be able to proceed rigorously and detect the weaknesses of an application. He must be able to identify the technology behind and test every single door that might be open to hackers.
This repository aim first to establish a reflection method on penetration testing and explain how to proceed to secure an application. And secondly, to regroup all kind of tools or resources pen testers need. **Be sure to know basics of programming languages and Internet security before learning pen testing.**
Also, this is important to inform yourself about the law and what you are allowed to do or not. According to your country, the computer laws are not the same. First, check laws about privacy and surveillance : [Nine eyes countries](https://en.wikipedia.org/wiki/Five_Eyes#Other_international_cooperatives), [Five eyes](https://en.wikipedia.org/wiki/Five_Eyes) and Fourteen Eyes. Always check if what you're doing is legal. Even when it's not offensive, information gathering can also be illegal !
Also, this is important to inform yourself about the law and what you are allowed to do or not. According to your country, the computer laws are not the same. First, check laws about privacy and surveillance : [Nine eyes countries](https://en.wikipedia.org/wiki/Five_Eyes#Other_international_cooperatives), [Five eyes](https://en.wikipedia.org/wiki/Five_Eyes) and Fourteen Eyes. Always check if what you're doing is legal. Even when it's not offensive, information gathering can also be illegal!
([Table of Contents](#table-of-contents))
# Some vocabulary
**Infosec** : Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. An infosec can also be a person who practice ethical security. [Wikipedia](https://en.wikipedia.org/wiki/Information_security)
**Infosec** : Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Infosec can also be a person who practices ethical security. [Wikipedia](https://en.wikipedia.org/wiki/Information_security)
**Opsec** : Operations security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. [Wikipedia](https://en.wikipedia.org/wiki/Operations_security)
@ -263,7 +263,7 @@ Frameworks are packs of pen testing tools with custom shell navigation and docum
## Books / Manuals
**Warning :** I haven't read them all so do not consider I am recommanding as I liked them. They just seems to provide useful resources.
**Warning :** I haven't read them all so do not consider I am recommanding as I liked them. They just seem to provide useful resources.
- [Penetration Testing: A Hands-On Introduction to Hacking](https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641) (2014)
- [Kali Linux Revealed](https://www.amazon.com/Kali-Linux-Revealed-Penetration-Distribution/dp/0997615605) - [PDF](https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf) (2017)