Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/abhishekkr/eden_guide_to_hacking
its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker
https://github.com/abhishekkr/eden_guide_to_hacking
gitbook guide hacking
Last synced: 3 months ago
JSON representation
its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker
- Host: GitHub
- URL: https://github.com/abhishekkr/eden_guide_to_hacking
- Owner: abhishekkr
- Created: 2011-07-14T07:08:02.000Z (over 13 years ago)
- Default Branch: master
- Last Pushed: 2017-12-27T14:40:11.000Z (almost 7 years ago)
- Last Synced: 2024-07-27T17:52:20.627Z (4 months ago)
- Topics: gitbook, guide, hacking
- Homepage: https://abhishekkr.github.io/eden_guide_to_hacking
- Size: 2.08 MB
- Stars: 27
- Watchers: 4
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
read as eBook @ [abhishekkr.github.io/eden_guide_to_hacking](https://abhishekkr.github.io/eden_guide_to_hacking)
```Shell
.oPYo. 8 .oPYo. o 8 ooooo
8. 8 8 8 8 8
`boo .oPYo8 .oPYo. odYo. 8 o o o8 .oPYo8 .oPYo. 8 .oPYo.
.P 8 8 8oooo8 8' `8 8 oo 8 8 8 8 8 8oooo8 8 8 8
8 8 8 8. 8 8 8 8 8 8 8 8 8 8. 8 8 8
`YooP' `YooP' `Yooo' 8 8 `YooP8 `YooP' 8 `YooP' `Yooo' 8 `YooP'
:.....::.....::.....:..::..:::....8 :.....::..:.....::.....:::::..:::.....:
::::::::::::::::::::::::::::::::::8 :::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::..:::::::::::::::::::::::::::::::::::::::o o 8 o [[ Eden Guide To Hacking ]]
8 8 8
o8oooo8 .oPYo. .oPYo. 8 .o o8 odYo. .oPYo. a Bootstrap Guide to Hacking
8 8 .oooo8 8 ' 8oP' 8 8' `8 8 8 Practices in a major & short
8 8 8 8 8 . 8 `b. 8 8 8 8 8 to read style...
8 8 `YooP8 `YooP' 8 `o. 8 8 8 `YooP8 the way you don't get bored
:..:::..:.....::.....:..::...:....::..:....8 instead infer major concepts
::::::::::::::::::::::::::::::::::::::::ooP'. and practical usability.
::::::::::::::::::::::::::::::::::::::::...::
~=ABK=~ (AbhishekKr) aBionic
http://www.twitter.com/aBionic```
***
# Eden Guide to Hacking
## part.0* Fundamentals
#### chapter.0* Defining
* article.0* Hacking, Hacker and Security
* article.1* Hacking and Hacker's Class
* article.2* Hacking and Ethical Hacking
* article.3* Hacking, Crime and Law
* article.4* Hacking and Hacker's Aim***
#### chapter.1* Skills Required
* article.0* Computer Skills
* article.1* Social Skill
* article.2* Mental Skills***
#### chapter.2* Hacking Philosophy
* article.0* Circle of Hacking
* article.1* Art of Hacking***
## part.1* Hacking Cycle
#### chapter.3* Acquire Target
* article.0* Pre-Contract
* article.1* Post-Contract***
#### chapter.4* Reconnaissance
##### section.0* Passive-Recon
* article.0* Open Intelligence Gathering
* article.1* Meta Information Filtering##### section.1* Active-Recon
* article.2* Social Engineering
* article.3* Eavesdropping
* article.4* Shoulder Surfing
* article.5* Dumpster Diving##### section.2* Information
* article.6* Network-Level
* article.7* Application-Level
* article.8* User-Level
* article.9* Required To Be Social***
#### chapter.5* Scanning
##### section.0* Network Scanners
* article.0* General
* article.1* Service-Specific##### section.1* Application Scanners
* article.2* Web Scanners
* article.3* Database Scanners***
#### chapter.6* Vulnerabilities Profiling
* article.0* Vulnerable Devices
* article.1* User References
* article.2* Processing Vulnerability Profile***
#### chapter.7* Exploitation
* article.0* Own it like a Romeo
* article.1* The Sherlock Holmes Way
* article.2* Psychiatric Analysis
* article.3* Trap to Trip
* article.4* Bot-Blood-Bath***
#### chapter.8* System Puppet-izing
* article.0* Tame The Rate
* article.1* Erase Finger-prints
* article.2* Suicide Bomber
* article.3* Moody Mobster***
#### chapter.9* Reporting
* article.0* WTTW ~ Whom To Tell What
* article.1* How To Tell
* article.2* Make Sure of it.***
## part.2* Hacking Toolset
#### chapter.10* Software Armour
* article.0* O.S. Distros
* article.1* Recon-tools
* article.2* Scanners
* article.3* Attack Tools
* article.4* Forensic Tools
* article.5* More on it***
#### chapter.11* Software Target
* article.0* Network Emulations
* article.1* Weak Web Application
* article.2* Test Anything***
## part.3* Attack Case Studies
#### chapter.12* SSL Defeating Attacks
#### chapter.13* WiFi Attack
#### chapter.14* VoIP Attack
#### chapter.15* Web Javascript-Based Attack
#### chapter.16* Web SQL-Injection Attack
#### chapter.17* SMB Attack
#### chapter.18* Phishing Attack***
## part.4* Being A Hacker
#### chapter.19* How to Remain A Hacker?
* article.0* Being Aware
* article.0* Being Curious
* article.0* Being Secured
* article.0* Being Contributor
* article.0* Being Human***
## part.5* Appendix
#### chapter.20* Cyber Security Links
#### chapter.21* Terminology***