TryHackMe: Best for beginners, this platform offers a range of free/paid labs and guides you through hacking techniques, explaining each step. Hack The Box: An alternative to, and often more challenging than, TryHackMe, this platform offers a variety of vulnerable machines for intermediate users...
Chief Information Security Officer (CISO) Workshop Training - The Chief Information Security Office (CISO) workshop contains a collection of security learnings, principles, and recommendations for modernizing security in your organization. This training workshop is a combination of experiences from Micros...
TryHackMe HackTheBox Active Directory Security Great eCPPTv2 External Resources DFIR Madness HackerStop Cisco's Skillsforall LeanPub (You can get many books) Name The Hash (Usefull for finding the hash type and hashcat/john mode) IPPSEC Blogs, Videos and Walkthroughs NetCat Use...
For this step, we are going to look at performing a password spray against a vulnerable web application that is hosted on Try Hack Me, known as Mr. Robot CTF, which has a theme related to the TV show of the same name. While this will not serve as a full CTF walkthrough, the conce...
Principles of secure cloud computing – covering roles and responsibilities, design principles and Identity and Access Management (IAM).Design requirements – covering requirements analysis, functional requirements, inventory, valuation and more. Cloud model boundaries were also covered as well as the ...
TryHackMe. Breaking Into the Kenobi Machine. PwnDoc: PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report. This is how you can deliver true value through your pentest reports Offensive Security Exam Report Template in...
Principles of security- Principles of security. Red Team Engagements- Intro to red team engagements. Hip Flask- An in-depth walkthrough covering pentest methodology against a vulnerable server. Introductory CTFs to get your feet wet Google Dorking- Explaining how Search Engines work and leveraging ...
API Security Testing Spherical Defence Principles of API Security Testing and how to perform a Security Test on an API. Finding and Exploiting Web App APIs Bend Theory Finding and Exploiting Unintended Functionality in Main Web App APIs How to Hack an API and Get Away with It SmartBear How to...
BookstoresidchnTryHackMe room - A Beginner level box with basic web enumeration and REST API Fuzzing. crAPIOWASPcompletely ridiculous API (crAPI) Damn Vulnerable GraphQL ApplicationdolevfDamn Vulnerable GraphQL Application is intentionally vulnerable implementation of Facebook's GraphQL technology to le...