Skip to content

Commit

Permalink
Merge pull request #1 from abhishekkr/abkml_to_md
Browse files Browse the repository at this point in the history
Converted part0 chapter0 to part1 chapter3 into Markdown
  • Loading branch information
abhishekkr committed Aug 17, 2013
2 parents f5e1fcb + 1f3312c commit b3e1dd8
Show file tree
Hide file tree
Showing 38 changed files with 1,064 additions and 1,226 deletions.
194 changes: 194 additions & 0 deletions EdenGuide_to_Hacking.md
@@ -0,0 +1,194 @@
```Shell

.oPYo. 8 .oPYo. o 8 ooooo
8. 8 8 8 8 8
`boo .oPYo8 .oPYo. odYo. 8 o o o8 .oPYo8 .oPYo. 8 .oPYo.
.P 8 8 8oooo8 8' `8 8 oo 8 8 8 8 8 8oooo8 8 8 8
8 8 8 8. 8 8 8 8 8 8 8 8 8 8. 8 8 8
`YooP' `YooP' `Yooo' 8 8 `YooP8 `YooP' 8 `YooP' `Yooo' 8 `YooP'
:.....::.....::.....:..::..:::....8 :.....::..:.....::.....:::::..:::.....:
::::::::::::::::::::::::::::::::::8 :::::::::::::::::::::::::::::::::::::::
::::::::::::::::::::::::::::::::::..:::::::::::::::::::::::::::::::::::::::
o o 8 o [[ Eden Guide To Hacking ]]
8 8 8
o8oooo8 .oPYo. .oPYo. 8 .o o8 odYo. .oPYo. a Bootstrap Guide to Hacking
8 8 .oooo8 8 ' 8oP' 8 8' `8 8 8 Practices in a major & short
8 8 8 8 8 . 8 `b. 8 8 8 8 8 to read style...
8 8 `YooP8 `YooP' 8 `o. 8 8 8 `YooP8 the way you don't get bored
:..:::..:.....::.....:..::...:....::..:....8 instead infer major concepts
::::::::::::::::::::::::::::::::::::::::ooP'. and practical usability.
::::::::::::::::::::::::::::::::::::::::...::
~=ABK=~ (AbhishekKr) aBionic
http://www.twitter.com/aBionic
```

# Eden Guide to Hacking

## part.0* Fundamentals

### chapter.0* Defining

* article.0* Hacking, Hacker and Security
* article.1* Hacking and Hacker's Class
* article.2* Hacking and Ethical Hacking
* article.3* Hacking, Crime and Law
* article.4* Hacking and Hacker's Aim


### chapter.1* Skills Required

* article.0* Computer Skills
* article.1* Social Skill
* article.2* Mental Skills


### chapter.2* Hacking Philosophy

* article.0* Circle of Hacking
* article.1* Art of Hacking

***


## part.1* Hacking Cycle

### chapter.3* Acquire Target

* article.0* Pre-Contract
* article.1* Post-Contract


### chapter.4* Reconnaissance

### Chap.4 section.0* Passive-Recon

* article.0* Open Intelligence Gathering
* article.1* Meta Information Filtering

### Chap.4 section.1* Active-Recon

* article.2* Social Engineering
* article.3* Eavesdropping
* article.4* Shoulder Surfing
* article.5* Dumpster Diving

### Chap.4 section.2* Information

* article.6* Network-Level
* article.7* Application-Level
* article.8* User-Level
* article.9* Required To Be Social


### chapter.5* Scanning

### Chap.5 section.0* Network Scanners

* article.0* General
* article.1* Service-Specific

### Chap.5 section.1* Application Scanners

* article.2* Web Scanners
* article.3* Database Scanners


### chapter.6* Vulnerabilities Profiling

* article.0* Vulnerable Devices
* article.1* User References
* article.2* Processing Vulnerability Profile


### chapter.7* Exploitation

* article.0* Own it like a Romeo
* article.1* The Sherlock Holmes Way
* article.2* Psychiatric Analysis
* article.3* Trap to Trip
* article.4* Bot-Blood-Bath


### chapter.8* System Puppet-izing

* article.0* Tame The Rate
* article.1* Erase Finger-prints
* article.2* Suicide Bomber
* article.3* Moody Mobster


### chapter.9* Reporting

* article.0* WTTW ~ Whom To Tell What
* article.1* How To Tell
* article.2* Make Sure of it.

***


## part.2* Hacking Toolset

### chapter.10* Software Armour

* article.0* O.S. Distros
* article.1* Recon-tools
* article.2* Scanners
* article.3* Attack Tools
* article.4* Forensic Tools
* article.5* More on it


### chapter.11* Software Target

* article.0* Network Emulations
* article.1* Weak Web Application
* article.2* Test Anything

***


## part.3* Attack Case Studies

### chapter.12* SSL Defeating Attacks


### chapter.13* WiFi Attack


### chapter.14* VoIP Attack


### chapter.15* Web Javascript-Based Attack


### chapter.16* Web SQL-Injection Attack


### chapter.17* SMB Attack


### chapter.18* Phishing Attack

***


## part.4* Being A Hacker

### chapter.19* How to Remain A Hacker?

* article.0* Being Aware
* article.0* Being Curious
* article.0* Being Secured
* article.0* Being Contributor
* article.0* Being Human

***


## part.5* Appendix

### chapter.20* Cyber Security Links
### chapter.21* Terminology

***
183 changes: 0 additions & 183 deletions EdenGuide_to_Hacking.txt

This file was deleted.

0 comments on commit b3e1dd8

Please sign in to comment.