Are you struggling to get good resources for getting into CyberSecurity?? dont worry many of us face this issue. Now the question is where will you find it. And talking frankly no-one can provide you with all buch of information right. SO i have compiled a bunch of different information or resources tha would help you get your way innnn.
So this is it, Get familiar with all and start you hacking journey from here. Everything is provided in step by step manner.
For you to get a good knowledge into cybersec you need to learn few things. The deeper you learn the better CyberSecurity expert you become. What do I have to learn?
- Programming
- Linux
- Networking
- Web Application Pentesting
- Network Pentesting
Ill Recommend Papperback Version Books Over Pdf, You can download books using the link below the amazon ones. The amazon links wont die, but the download ones may, so if you find any difficulties downloading the pdf contact me via the methods provided at the last.
(Note: If you are visiting from outside of India just change the url From: amazon.in To : amazon.com or your area domain.)
We will be using programming to automate our works. Also known as scripting.
Linux is an extremely popular operating system for hackers. There are two main reasons behind this. First off, Linux's source code is freely available because it is an open source operating system. This means that Linux is very easy to modify or customize. And top of that if you install distro's like Kali or Parrot OS you get a bunch of security tools pre installed. A hacker kit right.
Book Name | Amazon Link | Direct Download .pdf |
---|---|---|
The Linux Command Line – A Complete Introduction | Amazon Link | pdf Link |
How Linux Works – What Every Superuser Should Know Paperback | Amazon Link | pdf Link |
Studying the source code of such tools strongly benefits both attackers and defenders. A network hacker will certainly encounter the libnet library and its derivatives, which let programmers send custom Ethernet frames and IP packets.
Book Name | Amazon Link | Direct Download .pdf |
---|---|---|
Computer Networking: A Top-Down Approach | Amazon Link | pdf Link |
Network Warrior 2e | Amazon Link | pdf Link |
A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).
Book Name | Amazon Link | Direct Download .pdf |
---|---|---|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws | Amazon Link | pdf Link |
Real-World Bug Hunting: A Field Guide to Web Hacking | Amazon Link | pdf Link |
A network penetration test is the process of identifying security vulnerabilities in applications and systems by intentionally using various malicious techniques to evaluate the network's security, or lack of, responses.
Book Name | Amazon Link | Direct Download .pdf |
---|---|---|
Penetration Testing – A Hands–On Introduction to Hacking | Amazon Link | pdf Link |
The Hacker Playbook 3: Practical Guide to Penetration Testing | Amazon Link | pdf Link |
Hacking: The Art of Exploitation 2e Paperback | Amazon Link | pdf Link |
Apparently, the practice of reading books creates cognitive engagement that improves lots of things, including vocabulary, thinking skills, and concentration. It also can affect empathy, social perception, and emotional intelligence, the sum of which helps people stay on the planet longer.
Book Name | Amazon Link | Direct Download .pdf |
---|---|---|
Kali Linux Revealed | Amazon Link | pdf Link |
Owasp Testing Guide v4 | pdf Link |
TryHackMe (CTF) https://tryhackme.com/
HackTheBox (CTF) https://hackthebox.eu/
PortSwigger (web) https://portswigger.net/
BugCrowd (Bug Bounty) https://www.bugcrowd.com/
Hacker1 (Bug Bounty) https://hackerone.com/
Vulnhub(vulnerable machines) https://www.vulnhub.com/
GitHub (for resources and tools) https://github.com/
Medium (Blogs) search and read https://medium.com/
Youtube: https://youtube.com/ ippsec JackkTutorials LiveOverflow Hack5 Hackersploit
GOOGLE FOR SURE https://google.com
Resources for Beginner Bug Bounty Hunter by @nahamsec https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
YouTUBE: https://www.youtube.com/pwnedbyNavneet
twitter: https://twitter.com/n4vn337
Do share this with anyone you find might get help.
THANK YOU <3