Skip to content

Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to Infosec community.

License

Notifications You must be signed in to change notification settings

RESETHACKER-COMMUNITY/Pentesting-Bugbounty

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Let's crowdsource our infosec learning with ResetHacker Community

Resources

Hey folks! ResetHacker community is open for contributers and Everyone is welcome to contribute here.

Contributing - Must Read me :)

As of writing, there are no code contributors to the main project. However, You can contribute to learning purpose resources that includes Conference, jobs, Writeups, Tutorials, Bugbounty helpdesk, pentesting helpdesk, How to get started, Review on courses etc. or modifing the README.md or any other repository.

We're inviting community contributers for early stage cybersecurity HELPDESK. This project is not limited to bugbounty or pentesting. Anyone is welcome to contribute.

Rules are simple to crowdsource our learning.

  • Pick a topic from your domain or ADD domain or choose new topics that you find helpful for community.

  • If you still have question feel free to create an issue on github or want to contribute to this project as a member of Team. DM me on telegram @Attr1b or mail me to [email protected]


Index Topics
0 Weekly InfoSec update
1 CVE Poc and Exploit That matter
1 BugBounty-Helpdesk
2 Cybersecurity Jobs-Helpdesk
3 CyberSecurity Conferences
4 Pentesting pre-engagement, NDA form, Report samples, timeline etc
5 Pentesting for Researchers
  • Contributors πŸ’ͺ😎

    Thanks a lot for spending your time helping! Keep rocking 🍻

Note: Contents inside the **RESETHACKER** is to help the community and all the content belongs to respective Authors and RESETHACKER.

Catalog for Enterprises

Index Topics (Updating Soon)
1. [Who conducts VAPT?]
2. [Benefit of VAPT?]
3. [Purpose of VAPT?]
4. [Vulnerability serverity & impact analysis.]
5. [Difference between VA & PT?]

OWASP top 10 (2017 - 2021)

OWASP top 10 mapping

Table of Contents for Community πŸ“š

(TOC made with nGitHubTOC)

Introduction

What is penetration testing?

Penetration testing is a type of security testing that is used to test the security of an application. It is conducted to find a security risk which might be present in a system.

If a system is not secure, then an attacker may be able to disrupt or take unauthorized control of that system. A security risk is normally an accidental error that occurs while developing and implementing software. For example, configuration errors, design errors, and software bugs, etc. Learn more

Want to become a penetration tester?

Knowing about risks on the internet and how they can be prevented is very useful, especially as a developer. Web hacking and penetration testing is the v2.0 of self-defense! But is knowing about tools and how to use them really all you need to become a pen tester? Surely not. A real penetration tester must be able to proceed rigorously and detect the weaknesses of an application. They must be able to identify the technology behind and test every single door that might be open to hackers.

This repository aims first to establish a reflection method on penetration testing and explain how to proceed to secure an application. And secondly, to regroup all kind of tools or resources pen testers need. Be sure to know basics of programming languages and internet security before learning pen testing.

Also, this is important to inform yourself about the law and what you are allowed to do or not. According to your country, the computer laws are not the same. First, check laws about privacy and surveillance: Nine eyes countries, Five eyes and Fourteen Eyes. Always check if what you're doing is legal. Even when it's not offensive, information gathering can also be illegal!

(Table of Contents)

Some popular domains in cybersecurity

Infosec: Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Infosec can also be a person who practices ethical security. Wikipedia

Opsec: Operations security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. Wikipedia

Black/grey/white hat hacker: Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if they're a black, grey or white hat hacker. A black hat is just someone malicious that does not wait permission to break into a system or application. A white hat is usually a security researcher who practice ethical hacking. A grey hat is just in the middle of these two kind of hackers, they might want to be malicious if it can be benefit (data breach, money, whistleblowing ...).

Red team: According to Wikipedia, a red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective in organizations with strong cultures and fixed ways of approaching problems. The United States intelligence community (military and civilian) has red teams that explore alternative futures and write articles as if they were foreign world leaders. Little formal doctrine or publications about Red Teaming in the military exist. In infosec exercises, Red teamers are playing the role of attackers. Wikipedia

Blue team: A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation. As a result, blue teams were developed to design defensive measures against red team activities. In infosec exercises, Blue teamers are playing the role of defenders. Wikipedia

Penetration tester: An ethical hacker who practices security, tests applications and systems to prevent intrusions or find vulnerabilities.

Security researcher: Someone who practices pen testing and browses the web to find phishing/fake websites, infected servers, bugs or vulnerabilities. They can work for a company as a security consultant and are most likely a Blue teamer.

Reverse engineering: Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object. Similar to scientific research, the only difference being that scientific research is about a natural phenomenon. Wikipedia

Social engineering: In the context of information security, it refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught on among computer and information security professionals. Wikipedia

Threat analyst: A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems. Threat hunters aim to uncover incidents that an enterprise would otherwise not find out about, providing chief information security officers (CISOs) and chief information officers (CIOs) with an additional line of defense against advanced persistent threats (APTs). SearchCIO

site reliability engineer (SRE):

Pipeline:

CI/CD pipeline:

DevOps:

DevSecOps:

(Table of Contents)

Difference between practising penetration testing and ethical hacking

A black hat is practicing penetration testing, but unlike a white hat, this is not ethical hacking. Ethical hacking is about finding vulnerabilities and improve and security of a system. An ethical hacker is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems, jusTheycious hacker (a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get try to break in. An ethical hacker is basically a white hat hacker.

Difference between SRE and Devops

Differnece B/w DAST, SAST And IAST

(Table of Contents)

Languages

Learning programming is the very first way to start learning about security. There's a lot of languages, most people start with Python, it's the easiest and the most popular one. PHP and Go are the less popular to write security-related stuff, but any of these can still be used in such context. Bash and Powershell are mostly about scripting and writing simple CLI applications.

Since not all languages work the same way, you need to look at how they work and what you want to learn. For example, C++ and Java compile, PHP and Pyththey are interpreted languages. This definitely changes what you ld use them for. Each language also has its own design patterns.

Scripting

  • Bash
  • Powershell

Software & mobile apps

  • JavaScript
  • Java
  • Swift
  • C / C++ / C#

General purpose

(Table of Contents)

Content Management Systems

image

These are the most used Content Management Systems (CMS). See a complete list here.

SERVER : A server is a central repository or the part of web hosting infrastructure that hosts websites.

1. Web Server:

Web server will receive all the requests from sent by visitors visiting your website and also forward only the business requests to application server.       

    The static assets (like CSS, JS components , Web components eg Common images, resources files and html components) will be served from your web server itself. 
    Web server runs on Microsoft IIS:ASP(.NET), Apache: Php/CGI, Apache Tomcat: Servlet, Nginx, HTTPD ,Jetty: Servlet
    or even Python's Simple HTTPServer etc.
    Web servers primarily respond to HTTP / HTTPS requests however isn't restricted to simply communications protocol. 
    It may be provided alternative protocol support like RMI/RPC.

Front End (Web UI) <-> BackEnd (API) <-> Web server (web page and graphics files) <-> Load Balancer <-> Application Server(Templete pages code & data) <-> DataBase (Couch DB + MySql + Elasstic DB + MongoDB + Firebase )

2. Application server:

 Application server is the server that works between Web server and database server and basically Generate (dynamic content/assets by executing server            
 side code eg JSP, servlet or EJB), manages(Transaction Support, Messaging support etc), processes the data(connection Pooling, object pooling etc) 
 and host application etc and application server will be responsible for only business requests (like Login, Fetching details and etc,. )
	
	β—‹ MTS: COM+
	β—‹ Email server
	β—‹ WAS: EJB
	β—‹ JBoss: EJB
	β—‹ WebLogic Application Server: EJB
	β—‹ Google maps servers
	β—‹ Google search servers
	β—‹ Google docs servers
	β—‹ Microsoft 365 servers
	β—‹ Microsoft computer vision servers for AI.
	
β€’ Application servers 
  Application Server can do whatever Web Server is capable and respond to any number of protocols depending on the application business logic.

3. Database Server:

  Database server handles database queries and It can only accessed by application server. It runs on MySQL, PostgreSQL, MariaDB, etc Database servers use          protocols ODBC, JDBC, etc.

Please note:

β€’ Web Server is designed to serve HTTP static Content like HTML, images etc. and for the dynamic content have plugins to support 
scripting languages like Perl, PHP, ASP, JSP etc

β€’ Web container is a part of Web Server and the Web Server is a part of Application Server.

β€’ A Web Server in java is also known as a web container or a servlet container which has a limited set of Java EE features like Servlets, JSP etc. 
Ex: Apache Tomcat.

β€’ An Application Server has a web container in it as well as full java EE features like Java Mail Service, JPA, JSF etc.
Ex:Glassfish, Apache TomEE, JBoss or Wildfly(new name ), IBM websphere etc.

β€’ If you have a Java application with just JSP and Servlet to generate dynamic content then you need web containers like Apache Tomcat or Jetty. 
While, if you have Java EE application using EJB, distributed transaction, messaging and other fancy features than 
you need a full fledged application server like JBoss, WebSphere or Oracle's WebLogic.

β€’ The use of Load Balancer is to distribute the load between multiple application servers. 

β€’ Application server can only accessed via web server, database server can only accessed by application server. 

β€’ If you want to solve web server and application server  purposes in one server, I would like to prefer you a 
VPS hosting servers and dedicated hosting servers.It is because they host volumes of web projects and applications with a higher uptime.

From https://www.quora.com/Whats-the-diference-between-an-application-server-and-a-web-server https://developer.mozilla.org/en-US/docs/Learn/Common_questions/Pages_sites_servers_and_search_engines

(Table of Contents)

cloud servers

cloud-provider

Basic steps of pen testing

Source: tutorialspoint

Read more about pen testing methodology

(Table of Contents)

Tools by category

A more complete list of tools can be found on Kali Linux official website.

πŸ•΅οΈβ€β™‚οΈ Information Gathering

Information Gathering tools allows you to collecinformationata about services and users. Check informations about a domain, IP address, phone number or an email address.

Tool Language Support Description
theHarvester Python Linux/Windows/macOS E-mails, subdomains and names Harvester.
CTFR Python Linux/Windows/macOS Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Sn1per bash Linux/macOS Automated Pentest Recon Scanner.
RED Hawk PHP Linux/Windows/macOS All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers.
Infoga Python Linux/Windows/macOS Email Information Gathering.
KnockMail Python Linux/Windows/macOS Check if email address exists.
a2sv Python Linux/Windows/macOS Auto Scanning to SSL Vulnerability.
Wfuzz Python Linux/Windows/macOS Web application fuzzer.
Nmap C/C++ Linux/Windows/macOS A very common tool. Network host, vuln and port detector.
PhoneInfoga Go Linux/macOS An OSINT framework for phone numbers.

πŸ”’ Password Attacks

Crack passwords and create wordlists.

Tool Language Support Description
John the Ripper C Linux/Windows/macOS John the Ripper is a fast password cracker.
hashcat C Linux/Windows/macOS World's fastest and most advanced password recovery utility.
Hydra C Linux/Windows/macOS Parallelized login cracker which supports numerous protocols to attack.
ophcrack C++ Linux/Windows/macOS Windows password cracker based on rainbow tables.
Ncrack C Linux/Windows/macOS High-speed network authentication cracking tool.
WGen Python Linux/Windows/macOS Create awesome wordlists with Python.
SSH Auditor Go Linux/macOS The best way to scan for weak ssh passwords on your network.
πŸ“ Wordlists
Tool Description
All Wordlist at one place Wordlists sorted by probability originally created for password generation and testing.

🌐 Wireless Testing

Used for intrusion detection and wifi attacks.

Tool Language Support Description
Aircrack C Linux/Windows/macOS WiFi security auditing tools suite.
bettercap Go Linux/Windows/macOS/Android bettercap is the Swiss army knife for network attacks and monitoring.
WiFi Pumpkin Python Linux/Windows/macOS/Android Framework for Rogue Wi-Fi Access Point Attack.
Airgeddon Shell Linux/Windows/macOS This is a multi-use bash script for Linux systems to audit wireless networks.
Airbash C Linux/Windows/macOS A POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetratioAccessing.

πŸ”§ Exploitation Tools

Acesss systems and data with service-oriented exploits.

Tool Language Support Description
SQLmap Python Linux/Windows/macOS Automatic SQL injection and database takeover tool.
XSStrike Python Linux/Windows/macOS Advanced XSS detection and exploitation suite.
Commix Python Linux/Windows/macOS Automated All-in-One OS command injection and exploitation tool.οΏΌ

πŸ‘₯ Sniffing & Spoofing

Listen to network traffic or fake a network entity.

Tool Language Support Description
Wireshark C/C++ Linux/Windows/macOS Wireshark is a network protocol analyzer.
WiFi Pumpkin Python Linux/Windows/macOS/Android Framework for Rogue Wi-Fi Access Point Attack.
Zarp Python Linux/Windows/macOS A free network attack framework.

πŸš€ Web Hacking

Exploit popular CMSs that are hosted online.

Tool Language Support Description
WPScan Ruby Linux/Windows/macOS WPScan is a black box WordPress vulnerability scanner.
Droopescan Python Linux/Windows/macOS A plugin-based scanner to identify issues with several CMSs, mainly Drupal & Silverstripe.
Joomscan Perl Linux/Windows/macOS Joomla Vulnerability Scanner.
Drupwn Python Linux/Windows/macOS Drupal Security Scanner to perform enumerations on Drupal-based web applications.
CMSeek Python Linux/Windows/macOS CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and 130 other CMSs.

πŸŽ‰ Post Exploitation

Exploits for after you have already gained access.

Tool Language Support Description
TheFatRat C Linux/Windows/macOS Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack, dll.

pen-testing Frameworks

Frameworks are packs of pen testing tools with custom shell navigation and documentation.

Tool Language Support Description
Operative Framework Python Linux/Windows/macOS Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules.
Metasploit Ruby Linux/Windows/macOS A penetration testing framework for ethical hackers.
cSploit Java Android The most complete and advanced IT security professional toolkit on Android.
radare2 C Linux/Windows/macOS/Android Unix-like reverse engineering framework and commandline tools.
Wifiphisher Python Linux The Rogue Access Point Framework.
Beef Javascript Linux/Windows/macOS The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.
Mobile Security Framework (MobSF) Python Linux/Windows/macOS Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Burp Suite Java Linux/Windows/macOS Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research. This tool is not free and open source

(Table of Contents)

Books / Manuals

Discussions (Updating Soon)

  • Reddit/HowToHack and ask about hacking, security and pen testing.
  • Reddit/hacking Discuss about hacking and web security.
  • ax0nes Hacking, security, and software development forum.
  • 0Day.rocks on discord Discord server about the 0day.rocks blog for technical and general InfoSec/Cyber discussions & latest news.
  • Reddit/AskNetsec Discusadvice network security, ask professionals for advices about jobs and stuff.

Security Advisories

Must Checkout

(Table of Contents)

License

This repository is under MIT license.

(Table of Contents)