Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP

its quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker

branch: master

Fetching latest commit…

Octocat-spinner-32-eaf2f5

Cannot retrieve the latest commit at this time

Octocat-spinner-32 part0_Fundamentals
Octocat-spinner-32 part1_Hacking_Cycle
Octocat-spinner-32 .gitignore
Octocat-spinner-32 EdenGuide_to_Hacking.md
Octocat-spinner-32 README.md
Octocat-spinner-32 masterCopy_EdenGuideToHacking.odt
README.md

Read it as eBook @ URL: <<SOON TO BE ADDED>>

.oPYo.      8                .oPYo.         o      8          ooooo        
8.          8                8    8                8            8          
`boo   .oPYo8 .oPYo. odYo.   8      o    o o8 .oPYo8 .oPYo.     8   .oPYo. 
.P     8    8 8oooo8 8' `8   8   oo 8    8  8 8    8 8oooo8     8   8    8 
8      8    8 8.     8   8   8    8 8    8  8 8    8 8.         8   8    8 
`YooP' `YooP' `Yooo' 8   8   `YooP8 `YooP'  8 `YooP' `Yooo'     8   `YooP' 
:.....::.....::.....:..::..:::....8 :.....::..:.....::.....:::::..:::.....:
::::::::::::::::::::::::::::::::::8 :::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::..:::::::::::::::::::::::::::::::::::::::

o    o               8       o                 [[ Eden Guide To Hacking ]]
8    8               8                         
o8oooo8 .oPYo. .oPYo. 8  .o  o8 odYo. .oPYo.   a Bootstrap Guide to Hacking
8    8 .oooo8 8    ' 8oP'    8 8' `8 8    8    Practices in a major & short
8    8 8    8 8    . 8 `b.   8 8   8 8    8    to read style...
8    8 `YooP8 `YooP' 8  `o.  8 8   8 `YooP8    the way you don't get bored
:..:::..:.....::.....:..::...:....::..:....8   instead infer major concepts
::::::::::::::::::::::::::::::::::::::::ooP'.  and practical usability.
::::::::::::::::::::::::::::::::::::::::...::
                                               ~=ABK=~ (AbhishekKr) aBionic
                                             http://www.twitter.com/aBionic


Eden Guide to Hacking

part.0* Fundamentals

chapter.0* Defining

  • article.0* Hacking, Hacker and Security
  • article.1* Hacking and Hacker's Class
  • article.2* Hacking and Ethical Hacking
  • article.3* Hacking, Crime and Law
  • article.4* Hacking and Hacker's Aim

chapter.1* Skills Required

  • article.0* Computer Skills
  • article.1* Social Skill
  • article.2* Mental Skills

chapter.2* Hacking Philosophy

  • article.0* Circle of Hacking
  • article.1* Art of Hacking

part.1* Hacking Cycle

chapter.3* Acquire Target

  • article.0* Pre-Contract
  • article.1* Post-Contract

chapter.4* Reconnaissance

section.0* Passive-Recon
  • article.0* Open Intelligence Gathering
  • article.1* Meta Information Filtering
section.1* Active-Recon
  • article.2* Social Engineering
  • article.3* Eavesdropping
  • article.4* Shoulder Surfing
  • article.5* Dumpster Diving
section.2* Information
  • article.6* Network-Level
  • article.7* Application-Level
  • article.8* User-Level
  • article.9* Required To Be Social

chapter.5* Scanning

section.0* Network Scanners
  • article.0* General
  • article.1* Service-Specific
section.1* Application Scanners
  • article.2* Web Scanners
  • article.3* Database Scanners

chapter.6* Vulnerabilities Profiling

  • article.0* Vulnerable Devices
  • article.1* User References
  • article.2* Processing Vulnerability Profile

chapter.7* Exploitation

  • article.0* Own it like a Romeo
  • article.1* The Sherlock Holmes Way
  • article.2* Psychiatric Analysis
  • article.3* Trap to Trip
  • article.4* Bot-Blood-Bath

chapter.8* System Puppet-izing

  • article.0* Tame The Rate
  • article.1* Erase Finger-prints
  • article.2* Suicide Bomber
  • article.3* Moody Mobster

chapter.9* Reporting

  • article.0* WTTW ~ Whom To Tell What
  • article.1* How To Tell
  • article.2* Make Sure of it.

part.2* Hacking Toolset

chapter.10* Software Armour

  • article.0* O.S. Distros
  • article.1* Recon-tools
  • article.2* Scanners
  • article.3* Attack Tools
  • article.4* Forensic Tools
  • article.5* More on it

chapter.11* Software Target

  • article.0* Network Emulations
  • article.1* Weak Web Application
  • article.2* Test Anything

part.3* Attack Case Studies

chapter.12* SSL Defeating Attacks

chapter.13* WiFi Attack

chapter.14* VoIP Attack

chapter.15* Web Javascript-Based Attack

chapter.16* Web SQL-Injection Attack

chapter.17* SMB Attack

chapter.18* Phishing Attack


part.4* Being A Hacker

chapter.19* How to Remain A Hacker?

  • article.0* Being Aware
  • article.0* Being Curious
  • article.0* Being Secured
  • article.0* Being Contributor
  • article.0* Being Human

part.5* Appendix

chapter.20* Cyber Security Links

chapter.21* Terminology


Something went wrong with that request. Please try again.