Skip to content

#IAmWhiteHat - An Ethical Hacking Series by Shobhit Sharma aka ScriptKKiddie officially on www.technical0812.com

License

Notifications You must be signed in to change notification settings

scriptkkiddie/IAmWhiteHat

Repository files navigation

#IAmWhiteHat

#IAmWhiteHat - An Ethical Hacking Series by Shobhit Sharma aka ScriptKKiddie officially on www.technical0812.com

Table of Contents

Resources

Tools

Module Number Module Name Tools
01 Footprint and Reconnaissance Google Hacking Techniques, YouTube DataViewer, NAPALM FTP indexer, shodain.io, netcraft.com, PeekYou, theHarvester, Tor Browser, Censys.io, Sherlock, Followerwonk, Ping, Website Informer, Web Data Extractor, HTTrack Web Site Copier, CeWL, eMailTrackerPro, Whois (DomainTools), nslookup, kloth.net, yougetsignal.com, arin.net, tracert, Path Analyzer Pro, Recon-ng, Maltgeo, OSRFramework, FOCA, BillCipher, osintframework.com
02 Scanning Networks Nmap & Zenmap GUI & Nmap Script Engine (NSE), Angry IP Scanner, MegaPing, NetScanTools Pro, Hping3, Wireshark, Unicornscan, Colasoft Packet Builder, Proxy Switcher, CyberGhost VPN, Solarwinds Network Topology Mapper, Metasploit
03 Enumeration nbtstat (Windows Command-Line Utilities), NetBIOS Enumerator, Nmap & Zenmap GUI & NSE, snmp-check, SoftPerfect Network Scanner, Active Directory Explorer (AD Explorer), RPCScan, SuperEnum, dig & nslookup (Zone Transfer), dnsrecon (DNSSEC Zone Walking), NetScanTools Pro, Global Network Inventory, Advanced IP Scanner, Enum4linux
04 Vulnerability Analysis Common Weakness Enumeration (CWE) - cwe.mitre.org, Common Vulnerabilities, and Exposures (CVE) - cve.mitre.org, National Vulnerability Database (NVD) - nvd.nist.gov, OpenVAS, Nessus, GFI LanGuard, CGI Scanner Nikto
05 System Hacking Responder, John The Ripper, L0phtCrack, exploit-db.com, securityfocus.com, Metasploit, Armitage, TheFatRat, vulnserver + Immunity Debugger, BeRoot, Meterpreter, Power Spy, Spytech SpyAgent, Snow (Whitespace Steganography Tool), OpenStego, auditpol
06 Malware Threats
07 Sniffing
08 Social Engineering
09 Denial-of-Service
10 Session Hijacking
11 Evading IDS, Firewalls, and Honeypots
12 Hacking Web Servers
13 Hacking Web Applications
14 SQL Injection
15 Hacking Wireless Networks
16 Hacking Mobile Platforms
17 IoT and OT Hacking
18 Cloud Computing
19 Cryptography

Lab Tasks