Gonzalez Posted October 25, 2009 Report Posted October 25, 2009 First things first, communication: Understanding TCPIPMy recommendations: after you read each section, fire up ethereal and packet capture, start sending and rcving packets, to understand really whats going on!tcp-ip illustrated:http://la.gg/upl/TCP-IP_Illustrated.rarethereal traffic analyzer:http://www.ethereal.com/distribution/win32/ethereal-setup-0.99.0.exeThen start studing on ARP/MITM based attacks.INTRO to DNS/ Zone TransferI need to add more to this one but this should get you covered, most of the other books on hacking I list here for other things, go over this above and beyond anyway, but enjoy!http://technet.microsoft.com/en-us/library/cc781340.aspxUnderstanding Scanningncluded: James messer: Secrets of network cartographyFyodor (nmap author) TCP IP OS Fingerprinting Phrack ArticleAnd a Firewall Ruleset mapping intro (Stateful or Packet filteringevasion)http://la.gg/upl/Nmap.rarheres some links for video presentations of scanning:http://irongeek.com/i.php?page=videos/nmap1http://irongeek.com/i.php?page=videos/nmap2http://irongeek.com/i.php?page=videos/droops1FYODOR(NMAP AUTHORS) Video... must watch!http://media.defcon.org/dc-13/video/2005_Defcon_V3-Fyodor-Hacking_Nmap.mp4Consult Insecure.org for more!http://la.gg/upl/Nmap.rarCCNA, CISCO CERTIFIED NETWORK ASSOCIATECisco pretty much defines routing and networking these days, skim over this at least.http://www.filestube.com/ec96176785a0f49b03ea/details.htmlWIRELESS HACKINGIncluded are a few various PDF's and the amazing book WIFOO, most definatly check it out.http://la.gg/upl/Wireless_haxing.rarLAYER 2 OWNAGELittle collection of ARP/MITM attack papers. This is more than fun, so be sure to read it. it accounts for 90% of internal hacking.http://la.gg/upl/LAYER_2_ownage.rarGoogle hacking for penetration testers, most definatly read this.what it will provide:Skills to pretty much understand advanced operators, and Google's SOAP API for finding anything you want (remember google is the oracle, and accounts for about 90% of the information you glean during reconnassaince in a pen-test)http://la.gg/upl/Google_Hacking_For_Penetration_Testers_%282005%29.rarJohnns longs live presentation video at defcon, MUST SEE!http://media.defcon.org/dc-13/video/2005_Defcon_V65-Johnny_Long-Google_Hacking_for_Pen_Test.mp4Info GatheringMost important stage of pen-test, this is just a little bit.Info gathering - by Aelphaeis Mangarae included.http://la.gg/upl/Passive_Info_Gathering.rarHACK IT SEC: through pen-testingdecent for understanding pen-testing fundamentals.http://la.gg/upl/Hack_IT__Security_Through_Penetration_Testing_%28Addison_Wesley-2002%29.chmCEH (Certified Ethical Hackers exam)Covers the more conventional pen-testing methodology... its a real certification, and its great.Go through all the modules at least once (if some of the tools seem outdated or you think you can improve the methods in some of the phases, then do it, remember it is a pen-test.)http://www.megaupload.com/?d=PIITMEATalso check out Cisco Press Penetration Testing and Network Defensehttp://www.megaupload.com/?d=IMHY2W50CISSP: Security Specialist Cert.This is important too, try to go over most of this, and especially if you're interested in the certhttp://la.gg/upl/Wiley.The.CISSP.Prep.Guide.Gold.Edition.rarZEN and the ART OF INFORMATION SECURITY by SYNGRESSGood book to get you started on the infoSec mindset.http://la.gg/upl/Syngress.Zen.and.the.Art.of.Information.Security.%282007%29.rarAnd Vulnerability Enumeration for penetration testingBy Aelphaeis Mangaraehttp://la.gg/upl/Vulnerability_Enumerating_for_Penetration_Testing.rarQuick and indepth look into linux, administering and hardening itUnderstand at least the basics of linux are important for hacking, asmost web servers are running shit like LAMP (linux, apache, mysql,php)because its free, so read! get vmware and follow along if you dont want to make a linux partition.http://la.gg/upl/Understanding_and_hardening_linux_.rarWeb app security is a must, considering most of the attacks are through the HYPER TEXT TARGET PROTOCOLSo definatly read these two, along with SPIDYNAMICS SQL whitepapers, and use your newly found google crawling abilities to find even more filtype:pdf's about webapp security.http://la.gg/upl/Web_Hacking_-_Attacks_And_Defense_%282002%29.chmlittle more in depthhttp://la.gg/upl/1931769494.A-List_Publishing.Hacker_Web_Exploitation_Uncovered.chmw3schools.orgMake a quick run through:SQLPHPHTMLperuse CSSSmall collage of SQL/PHP/XSS papersfollow the links at the end of these, be sure to try the shit you're readinghttp://la.gg/upl/SQL_PHP_XSS.rarHACKnotes: a must for referencingSometimes you'll find yourself referencing shit over and over again, and these books are just that, peruse them, and use it during a pen-test.http://la.gg/upl/Hacknotes.rarHACKING EXPOSED; another major referencethis is 2nd edition, kinda old, feel free to crawl for more.http://la.gg/upl/Network_Security_Secrets_and_Solutions_%28MCGraw-Hill-2001%29.rarHACKING: ART of EXPLOITATIONMOST DEFINATLY read this until you understand the x86 stack, and its structure, and how differrent type of exploits work, also pay attention to the network exploitation chapters, as theyre really indepth as well.http://la.gg/upl/Hacking-The_Art_of_Exploitation%28No_Starch-2003%29.chmStealing the network & other must hacker reads2 books in one.... fucking amazing, you must read. i also have stealing the identity, and stealing the shadow, i'll post lat0r.http://la.gg/upl/STN.rarWindows internalsUnderstanding the inner mechanics and subsystems of the kernel(brain child of the os) will help you a long way if you are a developing a device driver with NTDDK or coder, understanding how memory is mapped and handles, and how objects are handled is important to, give this one a read, get your Sysinternals toolkit ready, cause you'll be following alonghttp://la.gg/upl/Microsoft_Windows_Internals_-_Microsoft_Windows_Server_2003%2C_Windows_XP%2C_and_Windows_2000%2C_4th_Edition_%282004%29.rarMORE WINDOWS KERNEL INTERNALSThis is a huuuuuge project by a korean Driver development team, its amazingly in-depth, give it a read.http://www.i.u-tokyo.ac.jp/edu/training/ss/lecture/new-documents/Lectures/00-WindowsKernelOverview/WindowsKernelOverview.pdfROOTKIT:Subverting The Windows KernelAfter perusing Windows internals give this a read if you're interested in furthering your gains while entrenching (maintaining access to your targets)http://la.gg/upl/Addison.Wesley.Professional.Rootkits.Subverting.the.Windows.Kernel.chmDISSASSEMBLYDisasm is very important as well. Also its fun for owning botnet kiddies, haha.http://la.gg/upl/A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.rarCRYPTOGRAPHYApplied crypto is important, its not important to be insanely versed in crypto, but knowin the fundamentals is important.VPN IPSEC book includedWiley.CRYPTO and comp Security includedand a few morehttp://www.megaupload.com/?d=B4MF1B4NOther shit you need to do:Read all of the important papers on milw0rm/ other infosec sites.Bookmark every decent infosec site and read it daily.read slashdot daily.read all of the phrack releases/h0no ezines/ el8 ezine/ PU ezine/ zf0read all of the RFC's in your spare time.Sign yourself up for mailing lists like vulnwatch,pentesting,infosec, etc...Check RSS feeds daily for w/eBe semi-active in IRC if possible to interact and share knowledge with othersSet up Vmware networks and test exploits yourself, make real situations out of it, where you gotta perform real black-box style hacks.Exercise 2-3 hours a day, eat healthy Quote