Clone of . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

156 lines
15 KiB

5 years ago
5 years ago
3 years ago
3 years ago
5 years ago
3 years ago
5 years ago
5 years ago
4 years ago
4 years ago
4 years ago
4 years ago
4 years ago
5 years ago
3 years ago
5 years ago
4 years ago
3 years ago
4 years ago
3 years ago
4 years ago
3 years ago
3 years ago
  1. # Basic Security Principles/Information
  2. ### How to Suck at InfoSec
  3. * [How to Suck at Information Security – A Cheat Sheet](
  4. * [How not to Infosec - Dan Tentler](
  5. *
  7. Cognitive Fallacies
  8. Intro to statistics
  9. intro to networking
  10. Intro to X
  11. * [Towards Improving CVSS - J.M. Spring, E. Hatleback, A. Householder, A. Manion, D. Shick - CMU](
  12. * [Designing Security for Billions - Facebook](
  13. * [Passwords in a file - erratasec](
  14. * [Keyboard shortcuts in Windows -](
  15. claude shannon
  16. * [MarkOfTheWeb: How a Forgetful Russian Agent Left a Trail of Breadcrumbs - Yonathan Klijnsma](
  17. * [Normalization of deviance - Dan Luu](
  18. * [One week of bugs - Dan Luu](
  19. * [Apache and Let's Encrypt Best Practices for Security -](
  20. * [Operation Luigi: How I hacked my friend without her noticing](
  21. * My friend gave me permission to "hack all her stuff" and this is my story. It's about what I tried, what worked, my many flubs, and how easy it is to compromise Non Paranoid People TM.
  22. * [Blogpost](
  23. * [Welcome to Infosec (Choose your own Adventure) - primarytyler](
  24. * [Choose Your Own Red Team Adventure - Tim Malcomvetter](
  26. * [When to Test and How to Test It - Bruce Potter - Derbycon7](
  27. * “I think we need a penetration test” This is one of the most misunderstood phrases in the security community. It can mean anything from “Someone should run a vulnerability scan against a box” to “I’d like nation-state capable actors to tell me everything that wrong with my enterprise” and everything in between. Security testing is a complex subject and it can be hard to understand what the best type of testing is for a given situation. This talk will examine the breadth of software security testing. From early phase unit and abuse testing to late phase penetration testing, this talk will provide details on the different tests that can be performed, what to expect from the testing, and how to select the right tests for your situation. Test coverage, work effort, attack simulation, and reporting results will be discussed. Also, this talk will provide a process for detailed product assessments, i.e.: if you’ve got a specific product you’re trying to break, how do you approach assessing the product in a way that maximizes your chance of breaking in as well as maximizing the coverage you will get from your testing activity.
  31. * [No Silver Bullet -](
  32. * [The Asshole Filter - Siderea](
  38. * [Structured Text Tools](
  39. * The following is a list of text-based file formats and command line tools for manipulating each.
  42. * [Bedford and the Normalization of Deviance - Ron Rapp](
  44. ### General Information
  45. * **101**
  46. * [Ten Simple Rules for Doing Your Best Research, According to Hamming](
  47. * [Learning the Ropes 101: Introduction -](
  48. * [InfoSec Newbie List by Mubix](
  49. * [infosec_getting_started](
  50. * A collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.
  51. * [Salted Hash Ep 34: Red Team vs. Vulnerability Assessments - CSO Online](
  52. * Words matter. This week on Salted Hash, we talk to Phil Grimes about the differences between full Red Team engagements and vulnerability assessments
  53. * [Encoding vs. Encryption vs. Hashing vs. Obfuscation - Daniel Messler](
  54. * **Careers in Information Security**
  55. * **Educational/Informational**
  56. * [Navigating Career Choices in InfoSec - Fernando Montenegro - BSides Detroit2017](
  57. * Making career choices can be intimidating and stressful. Perhaps this presentation can help. The tidal forces affecting technology impact our careers as well. If we're not actively managing them, we're leaving decisions to chance (or to others), and may not like the outcomes. This presentation describes a framework I've used over the past few years to evaluate both ongoing job satisfaction as well as new opportunities as they appear. I'm happy with the outcomes I've obtained with it, and have used this same framework when providing advice to others, and it has been well received. Hopefully it can help others as well.
  58. * [Infosec Tools of the Trade: Getting Your Hands Dirty](
  59. * In this presentation we'll will be going over introductions to the various focuses in information security and demoing the most common tools that are used in operational security, both offense and defense. You'll leave with an idea on how to freely obtain and use these tools so that you can have what you need for that first interview: experience and a passion for security. This is a green talk for people who don't have a clue on what offensive and defensive people do operationally, from a tool perspective.
  60. * [So You Want To Be A H6x0r Getting Started in Cybersecurity Doug White and Russ Beauchemin ](
  61. * **Interview Preparation**
  62. * [How to prepare for an infosec interview - Timothy DeBlock](
  63. * **Relevant Standards**
  64. * [NICE Cybersecurity Workforce Framework](
  65. * The NICE Framework, NIST Special Publication 800-181, establishes taxonomy and common lexicon that is to be used to describe all cybersecurity work and workers irrespective of where or for whom the work is performed. The NICE Framework is intended to be applied in the public, private, and academic sectors. (USA Focused)
  66. * **Data Scientist**
  67. * [What Data Scientists Really Do, According to 35 Data Scientists - HBR](
  68. * **Penetration Tester**
  69. * **Articles & Writeups**
  70. * [How to become a pentester - Corelan](
  71. * [Attacking Big Business](
  72. * [10 common mistakes aspiring/new pentesters make - PentesterLab](
  73. * [So You Want To Be a Pentester? - Jack Halon](
  74. * [And THIS is Why Penetration Testing Sucks - Ronin Chang](
  75. * [So You Want To Be a Pentester? - Jack Halon](
  76. * [World's Worst Penetration Test Report - rant](
  77. * [Make It Count: Progressing through Pentesting - Bálint Varga-Perke -Silent Signal](
  78. * **Talks & Presentations**
  79. * [So you think you want to be a penetration tester - Defcon24](
  80. * So, you think you want to be a penetration tester, or you already are and don't understand what the difference between you and all the other "so called" penetration testers out there. Think you know the difference between a Red Team, Penetration Test and a Vulnerability assessment? Know how to write a report your clients will actually read and understand? Can you leverage the strengths of your team mates to get through tough roadblocks, migrate, pivot, pwn and pillage? No? well this talk is probably for you then! We will go through the fascinating, intense and often crazily boring on-site assessment process. Talk about planning and performing Red Teams, how they are different, and why they can be super effective and have some fun along the way. I'll tell you stories that will melt your face, brain and everything in between. Give you the answers to all of your questions you never knew you had, and probably make you question your life choices. By the end of this session you will be ready to take your next steps into the job you've always wanted, or know deep inside that you should probably look for something else. There will be no judgment or shame, only information, laughter and fun.
  81. * [Hold my Red Bull Undergraduate Red Teaming Jonathan Gaines](
  82. * **Cognitive Bias**
  83. * [List of cognitive biases - Wikipedia](
  84. * [58 cognitive biases that screw up everything we do - Business Insider](
  85. * **Critical Thinking**
  86. * [How to Apply Critical Thinking Using Paul-Elder Framework - designorate](
  87. * [Paul-Elder Critical Thinking Framework - University of Louisville](
  88. * **General**
  89. * [Mozilla Enterprise Information Security](
  90. * [Rating Infosec Relevant Masters Programs - netsecfocus](
  91. * **General Good Stuff**
  92. * [Words Have Meanings - Dan Tentler - CircleCityCon 2017]
  93. * [(Deliberate) practice makes perfect: how to become an expert in anything - Aytekin Tank](
  94. * **How to Ask Better Questions**
  95. * [How To Ask Questions The Smart Way - Eric Raymond](
  96. * [Socratic questioning - Wikipedia](
  97. * [The Six Types Of Socratic Questions -](
  98. * [Ask Good Questions: Deep Dive - Yousef Kazerooni](
  99. * [Relearning the Art of Asking Questions - HBR](
  100. * [How To Ask Questions The Smart Way -](
  101. * **Learning:**
  102. * **Excel**
  103. * [You Suck at Excel with Joel Spolsky(2015)](
  104. * The way you are using Excel causes errors, creates incomprehensible spaghetti spreadsheets, and makes me want to stab out my own eyes. Enough of the =VLOOKUPs with the C3:$F$38. You don't even know what that means.
  105. * [Notes](
  106. * **The Command Line**
  107. * [](
  108. * explainshell is a tool (with a web interface) capable of parsing man pages, extracting options and explain a given command-line by matching each argument to the relevant help text in the man page.
  109. * [A little collection of cool unix terminal/console/curses tools](
  110. * **New Skills**
  111. * [The Paradox of Choice: Learning new skills in InfoSec without getting overwhelmed - AzeriaLabs](
  112. * **Problem Solving**
  113. * [Software Problem Solving Cheat Sheet - Florian Roth](
  114. * [The XY Problem](
  115. * The XY problem is asking about your attempted solution rather than your actual problem. This leads to enormous amounts of wasted time and energy, both on the part of people asking for help, and on the part of those providing help.
  116. * [The AZ Problem](
  117. * This website introduces the AZ Problem: a generalization of the XY Problem. To wit, if we agree that the XY Problem is a problem, than the AZ Problem is a metaproblem. And while the XY Problem is often technical, the AZ Problem is procedural. The AZ Problem is when business requirements are misunderstood or decontextualized. These requirements end up being the root cause of brittle, ill-suited, or frivolous features. An AZ Problem will often give rise to several XY Problems.
  118. * **Security 101**
  119. * [Types of Authentication](
  120. * [Access control best practices](
  121. * **Skill-Testing/Question Prep**
  122. * [test-your-admin-skills](
  123. * A collection of \*nix Sysadmin Test Questions with Answers for Interview/Exam (2018 Edition).
  124. * **The Web**
  125. * [Web Architecture 101 - Jonathan Fulton](
  126. * **Tools you should probably know exist**
  127. * [Introduction To Metasploit – The Basics](
  128. * [Shodan](