Learn to hack: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
No edit summary
Line 45: Line 45:
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/
* A good overview of different lateral movement techniques: https://hackmag.com/security/lateral-guide/


=== Tools ===
=== Tools ===

Revision as of 14:08, 16 January 2022

This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library

General Resources

Resources that assume little to no background knowledge:

Resources that assume minimal tech background:

  • (book) Penetration Testing: A Hands-On Introduction to Hacking

Resources that assume a tech or hacking background:

Practice labs:

General references:

Active Directory

Tools

Office 365 & Azure

Tools

GSuite

https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite

C2 Frameworks

Antivirus & EDR Evasion

VMWare

Initial Access

Phishing

Password spraying

Scanning and Recon

Opsec