Uncategorized

Top OSCP Resources

Top OSCP Resources: Links to Help You Prepare for Your Penetration Testing Journey

Useful OSCP Links   OSCP Syllabus:  https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/  Windows Privilege Escalation:  http://www.fuzzysecurity.com/tutorials/16.htmlhttps://pentest.blog/windows-privilege-escalation-methods-for-pentesters/http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.htmlhttps://toshellandback.com/2015/11/24/ms-priv-esc/  Windows Post Exploitation:  http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdfMubix: https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US  Linux Privilege Escalation:  https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shells  Linux Post Exploitation:  https://n0where.net/linux-post-exploitation/Mubix: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM- 1N-EWPRz2770K4/edit?hl=en_US   Metasploit  https://www.offensive-security.com/metasploit-unleashed/http://www.securitytube.net/groups?operation=view&groupId=8Postex: https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekq  Pivoting:  https://pentest.blog/explore-hidden-networks-with-double-pivoting/http://nerderati.com/2011/03/17/simplify-your-life-with-an-ssh-config-file/  OSCP Reviews:  https://localhost.exposed/path-to-oscp/http://www.en-lightn.com/?p=941http://www.securitysift.com/offsec-pwb-oscp/https://blog.g0tmi1k.com/2011/07/pentesting-with-backtrack-pwb/http://www.jasonbernier.com/oscp-review/https://n3ko1.github.io/certification/2015/05/27/oscp—offensive-security-certified-professional/  Precompiled Exploits:  https://github.com/offensive-security/exploit-database-bin-sploits  Some of best courses recommended by us to boost your career … Unleashing the Power of Linux …

Top OSCP Resources: Links to Help You Prepare for Your Penetration Testing Journey Read More »

Learn how SSH works

Securely Connecting to Your Server: A Beginner’s Guide on How SSH Works

Imagine that you wrote a letter to your girlfriend and And now you want to send it. And now what if your girlfriend’s father intercepts and reads your message. Now it is the time for SSH. SSH (Secure Socket Shell) is a network protocol that allows us to access and communicate with remote computers over …

Securely Connecting to Your Server: A Beginner’s Guide on How SSH Works Read More »

Top tools for SOC analysts

Boost Your SOC Analyst Skills with the Best Tools for the Job

Best Tools For SOC Analysts In this blog we are going to see Best tools for SOC analysts, Top tools for SOC analysts. You can also see SOC analyst interview questions and answers. 1. Investigation Tools 1. Process Hacker A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. …

Boost Your SOC Analyst Skills with the Best Tools for the Job Read More »

Network Communication Protocols Map free download

NETWORK COMMUNICATION PROTOCOLS MAP DOWNLOAD

NETWORK COMMUNICATION PROTOCOLS MAP FREE DOWNLOAD Network communication protocal map free cheat sheet download, OSI model cheat sheet download, Application Layer, Presentation Layer, Session Layer, Transport Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer, TCP/IP Microsoft Novell IBM ISO VolP VPN/Security Click on the download button and wait for 15 seconds… Free Download …

NETWORK COMMUNICATION PROTOCOLS MAP DOWNLOAD Read More »

Penetration tester Vs SOC analyst

SOC Analyst vs. Penetration Tester: Understanding the Differences and Choosing the Right Career Path

SOC analyst Vs. Penetration tester Candidates who want to pursue a career in cyber security should have knowledge of the sub-branch of cyber security that they want to specialize in. In this article, we discuss penetration tester and SOC analyst, two important professions in the industry and explain what employees in both professions do, their …

SOC Analyst vs. Penetration Tester: Understanding the Differences and Choosing the Right Career Path Read More »

What is cryptography and its terminlogies

Unleashing the Power of Cryptography: Understanding the Basics and Terminologies

What is cryptography ? Cryptography is an art of converting the plain text into unintelligible format (Cipher text ). On the receiver side that cipher text is converted into plain text. Cryptography mainly aims at privacy and integrity. Cryptography is not latest technique, it has formed thousand of years ago. But they uses some symbols …

Unleashing the Power of Cryptography: Understanding the Basics and Terminologies Read More »

ADVANCE GITHUB

Advance Github dorking

Github dorks to find files filename:manifest.xmlfilename:travis.ymlfilename:vim_settings.xmlfilename:databasefilename:prod.exsfilename:prod.secret.exsfilename:.npmrc_authfilename:.dockercfgfilename:WebServers.xmlfilename:.bash_historyfilename:sftp-config.jsonfilename:sftp.jsonfilename:secrets.ymlfilename:.esmtprcfilename:passwdfilename:LocalSettings.php filename:.sqlitefilename:.psafe3 filename:secret_token.rbfilename:carrierwave.rbfilename:database.ymlfilename:.keychainfilename:.kwalletfilename:.exportsfilename:config.yamlfilename:settings.pyfilename:credentials.xml filename:config.phpfilename:config.inc.phpfilename:prod.secret.exsfilename:configuration.phpfilename:.sh_historyfilename:shadowfilename:proftpdpasswdfilename:.pgpassfilename:idea14.keyfilename:hubfilename:.bash_profilefilename:.envfilename:wp-config.phpfilename:credentialsfilename:id_rsafilename:id_dsa filename:.ovpnfilename:.cscfgfilename:.rdpfilename:.mdffilename:.sdf GiHub Dorks for Finding API Keys, Tokens and Passwords api_keyoauthauthauthorization_bearer:authenticationclient_secretapi_token:client_id OTP HOMEBREW GITHUB_API_TOKENSF_USERNAMEHEROKU_API_KEY JEKYLL GITHUB TOKENshodan_api_key api.forecast.io passworduser_passworduser_passpasscodeclient_secretsecretpassword hash GiHub Dorks Automation Tools https://github.com/dxa4481/truffleHog https://github.com/techgaun/github-dorks https://github.com/BishopFox/GitGot https://github.com/michenriksen/gitrob https://github.com/tillson/git-hound https://github.com/kootenpv/gittyleaks https://github.com/awslabs/git-secrets https://github.com/Talkaboutcybersecurity/GitMonitor https://radar.nightfall.ai

Scroll to Top
www.thecyberblogs.com