Banana Headshot

Jason Schorr

Universal Public Hacker

Free resources to expand your #infosec and technical skill set.

Each is a career path in its own right, the rabbit hole goes down as far as you follow. Check these out and make 2020 count! ๐ŸŽŠ

0xbanana

2 minutes read

Stoked to share these free resources to expand your #infosec and technical skill set.

Each is a career path in its own right, the rabbit hole goes down as far as you follow.

Check these out and make 2020 count! ๐ŸŽŠ

#30DaysOfThreads #BlackTechTwitter #latinxintech

Begin your road into #pentesting with this staple book and free VM to practice hacking into ๐Ÿ’ป

Metasploit The Penetration Testers Guide https://archive.org/details/MetasploitThePenetrationTesterSGuide

We need to ensure our setup will meet or exceed the following system requirements by preparing our Metasploit Lab Environment.

https://www.offensive-security.com/metasploit-unleashed/requirements/

A requirement for all in #dfir is being able to read and understand network traffic. Itโ€™s how our systems communicate!

Practical packet analysis: using Wireshark to solve real-world network problems : Sanders, Chris

https://archive.org/details/PracticalPacketAnalysis2e

Learn to write #exploit and countermeasures code from this amazing book ๐Ÿ“š

Hacking: The Art Of Exploitation by Jon Erickson

The goal of this book is to share the art of hacking with everyone. https://archive.org/details/hacking-the-art-of-exploitation_201801

Web apps are used by billions of people daily. Learn how to attack web apps with this amazing resource!

The Web Application Hackers Handbook; Dafydd Stuttard, Marcus Pinto https://archive.org/details/TheWebApplicationHackersHandbook2ndEdition

A MUST for any serious technologist! For many the commmand line interface is the only interface. You will encounter it the rest of your career, learn it now!

The Linux Command Line: A Complete Introduction : William E. Shotts You've experienced the shiny, point-and-click surface of your Linux computerโ€”now dive below and explore its depths with the power of the command line. https://archive.org/details/2016TheLinuxCommandLine

A good defense starts with an understanding of the offense. Learn to dissect and understand the attacks and techniques of attacker software!

Practical Malware Analysis https://archive.org/details/PracticalMalwareAnalysis_201903

I hope this list gets you interested in something new and you can begin that journey.

Not sure whatโ€™s the next step you should be taking? Ask! If I donโ€™t know Iโ€™ll tag in a friend who does!

Your friend, Public Universal Hacker

Recent posts

See more

About

COO - Hacker | #infosec #DFIR #privacy | ๐Ÿ‡ฉ๐Ÿ‡ด๐Ÿ‡บ๐Ÿ‡ธ | Proud Dad | he/him | ex: @accenture @intel @mandiant @apple @cisco @nasdaqomx | #firespinner ๐Ÿ”ฅ