More Than 80 Best Free Resources to Become Pro Hacker

Learning how to turn out to be hacker is not seeing that simple seeing that learning to become an application programmer. My spouse and i realized this as i started seeking learning sources pertaining to basic hacking men and women accomplish. Perhaps to start doing the best compromise about very own, any hacker calls for to obtain detailed information about a number of subjects. A lot of people advocate minimal information about number of selection dialects including C, Python, HTML having Unix os aspects and also networking knowledge is needed to start off learning hacking methods. Many men and women (including myself previous to doing exploration with this article) think that they become a hacker with a couple totally free hacking equipment on internet. Their accurate that a number of common sorts of hacking may be simply completed with assist regarding equipment, nonetheless doing it doesn’t truly make you any hacker. An accurate hacker would be the person who can buy any weaknesses and also produce an application to help use and/or show it.
Hacking it isn’t just with regards to knowing “how points work”, although it’s with regards to knowing “why points work that way” and also “how can easily most of us challenge it”.
Are a number of truly practical hacking training and also sources you really should discover in your trip regarding learning to compromise.

Beginners Tutorials(Hacking For Dummies)

These tutorials are not really simple for anyone who is just starting to learn hacking techniques. However, these should be simple starting point for you

  1. Hacking Tutorials for Beginners – By BreakTheSecurity.com
  2. How to learn Ethical hacking – By Astalavista.com
  3. Penetration Testing Tutorial – By Guru99.com
  4. Backtrack Penetration Testing Tutorial
  5. Introduction to Penetration Testing
  6. Information Gathering with Nmap
  7. Simple How To Articles By Open Web Application Security
  8. The Six Dumbest Ideas in Computer Security
  9. Secure Design Principles
  10. 10 steps to secure software
  11. How to be Anonymous?

 

Cryptography Related Tutorials

Cryptography is must know topic for any aspiring security professional or a ethical hacker. You must understand how encryption and decryption is done. You must understand why some of the old encryption techniques do not work in modern computing world.

  1. Introduction to Public Key Cryptography
  2. Crypto Tutorial
  3. Introduction to Cryptography
  4. An Overview of Cryptography
  5. Cryptography Tutorials – Herong’s Tutorial Examples
  6. The Crypto Tutorial – Learn How to Keep Secret Secret
  7. Introduction to cryptology, Part 1: Basic Cryptology Concepts

 

Websites For Security Related Articles

Continuous learning about latest security issues, news and vulnerability reports are really important for any hacker or a security professional. Some of the sites that keep publishing informative articles and news are listed here.

  1. http://www.astalavista.com/
  2. http://packetstormsecurity.com/
  3. http://www.blackhat.com/
  4. http://www.metasploit.com/
  5. http://sectools.org/
  6. http://www.2600.com/
  7. DEF CON – Hacking conference
  8. http://www.breakthesecurity.com/
  9. http://www.hacking-tutorial.com/
  10. http://www.evilzone.org/
  11. http://hackaday.com/
  12. http://www.hitb.org/
  13. http://www.hackthissite.org/
  14. http://pentestmag.com
  15. http://www.securitytube.net/
  16. https://www.ssllabs.com/

 

EBooks And Whitepapers

Some of the research papers by security experts and gurus can provide you a lot of information and inspiration. White papers can be really difficult to read and understand therefore you may need to read them multiple times. Once you understand the topic well, reading will become much faster and you will be able to skim through a lot content in less time.

  1. Handbook of Applied Cryptography – This ebook contains some free chapter from one of the popular cryptography books. The full book is also available on amazon at Cryptography Book.
  2. Network Penetration testing Guide
  3. How to hack anything in Java
  4. Mcafee on iPhone and iPad Security
  5. A Good Collection of White papers on security and vulnerabilities – This site contains collection of white papers from different sources and some of these white papers are really worth referring.
  6. Engineering Principles for Information Technology Security
  7. Basic Principles Of Information Protection
  8. Open Web Application Security Project – OWASP is one of the most popular sites that contains web application security related information .

Videos & Play Lists

Those who like to watch video tutorials, here are few I liked. However there are many small video available on youtube. Feel free to explore more and share with us if you like something.

  1. Cryptography Course By Dan Boneh Stanford University
  2. Open Security Training– Youtube Playlist of More than 90 hours. I have found this to be the biggest free training available for security related topic.
  3. OWASP AppSec USA 2011: Youtube Playlist containing compilation of OWASP conference highlight in 2011.
  4. Defcon: How I Met your Girlfriend – Defcon is one of the most popular hacker conference. The presenters in this conference are well know inside the hacking industry.
  5. Defcon: What happens when you steal a hackers computer
  6. Defcon: Nmap: Scanning the Internet
  7. Public Key Cryptography: Diffie-Hellman Key Exchange
  8. Web application Pen testing
  9. Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit

Forums For Hackers And Security Professionals

Just like any other area, forums are really great help for learning from other experts.

  1. Stackoverflow for security professionals
  2. http://darksat.x47.net/
  3. http://forums.securityinfowatch.com/
  4. http://forums.cnet.com/spyware-viruses-security-forum/
  5. http://www.hackforums.net/forumdisplay.php?fid=47

 

Vulnerability Databases And Resources

Vulnerability Databases are the first place to start your day as a security professional. Any new vulnerability detection is generally available through the public vulnerability databases. These databases are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability.

  1. http://www.exploit-db.com/
  2. http://1337day.com/
  3. http://securityvulns.com/
  4. http://www.securityfocus.com/
  5. http://www.osvdb.org/
  6. http://www.securiteam.com/
  7. http://secunia.com/advisories/
  8. http://insecure.org/sploits_all.html
  9. http://zerodayinitiative.com/advisories/published/
  10. http://nmrc.org/pub/index.html
  11. http://web.nvd.nist.gov
  12. http://www.vupen.com/english/security-advisories/
  13. http://www.vupen.com/blog/
  14. http://cvedetails.com/
  15. http://www.rapid7.com/vulndb/index.jsp
  16. http://oval.mitre.org/

 

Specific Product  Vulnerability Information

Some of the very popular products in the world require a special attention and therefore you may want to look at the specific security websites directly from vendors. I have kept Linux. Microsoft and apache in this list, however it may apply to any product you may be heavily using.

  1. Red Hat Security and other updates Site
  2. Microsoft Products Security Bulletin
  3. Apache Foundation Products Security Repository
  4. Ubuntu Software Security Center
  5. Linux Security Repository

 

Tools For Hacking / Security

Read Here About hacking tools in kali linux 

Read Here About hacking facebook e book

Also OSCP Penetration PDF Course

There are dozens of tools available for doing different types of hacking and tests. Tools are really important to become more productive at your work. Some of the very common tools that are used by hackers are listed here. You may have different choice of tools based on your own comfort.

  1. nmap
  2. NSS
  3. Hping
  4. TCPDump
  5. Metasploit
  6. Wireshark
  7. Network Stuff
  8. Nikto

Back to top button
Close