Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/abhishekkr/eden_guide_to_hacking

its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker
https://github.com/abhishekkr/eden_guide_to_hacking

gitbook guide hacking

Last synced: about 1 month ago
JSON representation

its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker

Awesome Lists containing this project

README

        

read as eBook @ [abhishekkr.github.io/eden_guide_to_hacking](https://abhishekkr.github.io/eden_guide_to_hacking)

```Shell

.oPYo. 8 .oPYo. o 8 ooooo
8. 8 8 8 8 8
`boo .oPYo8 .oPYo. odYo. 8 o o o8 .oPYo8 .oPYo. 8 .oPYo.
.P 8 8 8oooo8 8' `8 8 oo 8 8 8 8 8 8oooo8 8 8 8
8 8 8 8. 8 8 8 8 8 8 8 8 8 8. 8 8 8
`YooP' `YooP' `Yooo' 8 8 `YooP8 `YooP' 8 `YooP' `Yooo' 8 `YooP'
:.....::.....::.....:..::..:::....8 :.....::..:.....::.....:::::..:::.....:
::::::::::::::::::::::::::::::::::8 :::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::..:::::::::::::::::::::::::::::::::::::::

o o 8 o [[ Eden Guide To Hacking ]]
8 8 8
o8oooo8 .oPYo. .oPYo. 8 .o o8 odYo. .oPYo. a Bootstrap Guide to Hacking
8 8 .oooo8 8 ' 8oP' 8 8' `8 8 8 Practices in a major & short
8 8 8 8 8 . 8 `b. 8 8 8 8 8 to read style...
8 8 `YooP8 `YooP' 8 `o. 8 8 8 `YooP8 the way you don't get bored
:..:::..:.....::.....:..::...:....::..:....8 instead infer major concepts
::::::::::::::::::::::::::::::::::::::::ooP'. and practical usability.
::::::::::::::::::::::::::::::::::::::::...::
~=ABK=~ (AbhishekKr) aBionic
http://www.twitter.com/aBionic

```

***

# Eden Guide to Hacking

## part.0* Fundamentals

#### chapter.0* Defining

* article.0* Hacking, Hacker and Security
* article.1* Hacking and Hacker's Class
* article.2* Hacking and Ethical Hacking
* article.3* Hacking, Crime and Law
* article.4* Hacking and Hacker's Aim

***

#### chapter.1* Skills Required

* article.0* Computer Skills
* article.1* Social Skill
* article.2* Mental Skills

***

#### chapter.2* Hacking Philosophy

* article.0* Circle of Hacking
* article.1* Art of Hacking

***

## part.1* Hacking Cycle

#### chapter.3* Acquire Target

* article.0* Pre-Contract
* article.1* Post-Contract

***

#### chapter.4* Reconnaissance

##### section.0* Passive-Recon

* article.0* Open Intelligence Gathering
* article.1* Meta Information Filtering

##### section.1* Active-Recon

* article.2* Social Engineering
* article.3* Eavesdropping
* article.4* Shoulder Surfing
* article.5* Dumpster Diving

##### section.2* Information

* article.6* Network-Level
* article.7* Application-Level
* article.8* User-Level
* article.9* Required To Be Social

***

#### chapter.5* Scanning

##### section.0* Network Scanners

* article.0* General
* article.1* Service-Specific

##### section.1* Application Scanners

* article.2* Web Scanners
* article.3* Database Scanners

***

#### chapter.6* Vulnerabilities Profiling

* article.0* Vulnerable Devices
* article.1* User References
* article.2* Processing Vulnerability Profile

***

#### chapter.7* Exploitation

* article.0* Own it like a Romeo
* article.1* The Sherlock Holmes Way
* article.2* Psychiatric Analysis
* article.3* Trap to Trip
* article.4* Bot-Blood-Bath

***

#### chapter.8* System Puppet-izing

* article.0* Tame The Rate
* article.1* Erase Finger-prints
* article.2* Suicide Bomber
* article.3* Moody Mobster

***

#### chapter.9* Reporting

* article.0* WTTW ~ Whom To Tell What
* article.1* How To Tell
* article.2* Make Sure of it.

***

## part.2* Hacking Toolset

#### chapter.10* Software Armour

* article.0* O.S. Distros
* article.1* Recon-tools
* article.2* Scanners
* article.3* Attack Tools
* article.4* Forensic Tools
* article.5* More on it

***

#### chapter.11* Software Target

* article.0* Network Emulations
* article.1* Weak Web Application
* article.2* Test Anything

***

## part.3* Attack Case Studies

#### chapter.12* SSL Defeating Attacks
#### chapter.13* WiFi Attack
#### chapter.14* VoIP Attack
#### chapter.15* Web Javascript-Based Attack
#### chapter.16* Web SQL-Injection Attack
#### chapter.17* SMB Attack
#### chapter.18* Phishing Attack

***

## part.4* Being A Hacker

#### chapter.19* How to Remain A Hacker?

* article.0* Being Aware
* article.0* Being Curious
* article.0* Being Secured
* article.0* Being Contributor
* article.0* Being Human

***

## part.5* Appendix

#### chapter.20* Cyber Security Links
#### chapter.21* Terminology

***