1. Learn TCP/IP, Basic Information
gathering, Proxies, Socks, SSL, VPN, VPS, RDP,
FTP, POP3, SMTP, Telnet, SSH. 2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
utility. #CybersecurityAwarenessMonth
3. Learn a programming language that's
compatible with all OS - Perl, Python, C, ASM 4. Learn HTML, PHP, Javascript, ASP, XML, SQL,
XSS, SQLI, RFI, LFI 5. Learn Reverse engineering and crack
some programs for serials easy ones like
mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols - ftp,
pop3, 80, 8080 - Pick some free software
like ftp server, mail server, apache or iis
webserver or a webserver all-in-one pack,
or teamspeak, ventrilo, mumble.
7. Code a tool that uses grep to sort out
unique code in source codes. 8. Make a custom IPtable, IPsec firewall that
blocks all incoming traffic and out going
traffic and add filters to accept certain ports
that your software or scripts use.
9. Pick a kernel in linux or unix, also pick a
Microsoft OS version lets say Winxp pro sp2
put them on the virtual desktops (vmware)
and find and code a new local exploit in
those versions, then install a Apache
webserver on the Linux/Unix and a IIS
webserver on the winxp pro and attempt to
find and code a new local reverse_tcp_shell
exploit.
13. Pick a person in you phonebook for the
area code you live in or city then ring the
person on a anonymous line like skype or a
payphone or a carded sim and attempt to
social engineer the person for his name,
address, data of birth, city
born, country
born, ISP connected with, Phone company
connected with, What bank he/she uses
and anything else you can get. Then
Attempt to ring using a spoof caller ID
software with the person's phone number -
call the ISP and try reset the password to
his/her internet connection/web-mail, get
access to bank account or ask them to send
out a new *** to a new address (drop)
with a new pin, reset of phone company
passwords.
14. Use your information gathering skills to
get all the information off a website like a
shop then use the spoof caller-id software
or hack your phone to show a new number
of the Webserver's Tech Support number
then ring the shop owner and try get the
shop site password.
15. Do the same thing but attempt to use a
web attack against a site or shop to gain
admin access.
16. Once got access upload a shell and
attempt to exploit the server to gain root
using a exploit you coded not someone else
s exploit. 17. Make your own Linux Distro
18. Use your own Linux Distro or use a
vanilla Linux gnome (not kde) keep itwith
not much graphics so you can learn how to
depend on the terminal and start from
scratch install applications that you will only
need for a blackbox (Security test box),
own scripts and other tools ( By this stage
you shouldn't need to depend on other
peoples scripts). 19. Learn macosx and attempt to gain
access to a Macosx box whether it be your
own or someone's else.
20. Create a secure home network and
secure your own systems with your own
Security policies and firewall settings.
Tools from this section focus on evaluating systems for vulnerabilities. Typically, these are run against systems found using the
Information Gathering Reconnaissance tools.
(2/n)
Web Applications
These are tools used to audit and exploit vulnerabilities in web servers. Many of the audit tools we will refer to in this book come
directly from this category.
#PTMExposed ...! (Thread)
So we finally uncovering the social media cells of so called parties.. we have honey trapped one of social media handle responsible for trending hashtags,viral videos, anti state ,anti government content .
Worked on him from Month .. #PTMBehindTerrorism
To gain his trust .he is from #PTM_QUETTA International relations student working with various political parties including #PTM ,#PPP#PMLN and some #PTI Minsters . He claims takes 100s of thousands of from them to make #Propaganda I also got his number from one of
High political person also paid him just 10,000 due to that references. as I'm attaching Screenshots below you can see how they work (sorry for hiding all info due to involvement of high profile political people to get him)