mirror of
https://github.com/sundowndev/hacker-roadmap.git
synced 2024-11-24 12:13:11 +00:00
142 lines
8.4 KiB
Markdown
142 lines
8.4 KiB
Markdown
# Hacker Roadmap
|
||
|
||
This repository is a guide for amateurs pen testers and a summary of hacking tools to practice ethical hacking, pen testing and web security. Most of these tools are UNIX compatible and MIT licensed. *Note that Linux is the best operating system to practice ethical hacking.*
|
||
|
||
## What is prenetration testing ?
|
||
|
||
Penetration testing is a type of security testing that is used to test the insecurity of an application. It is conducted to find the security risk which might be present in the system.
|
||
|
||
If a system is not secured, then any attacker can disrupt or take authorized access to that system. Security risk is normally an accidental error that occurs while developing and implementing the software. For example, configuration errors, design errors, and software bugs, etc. [Learn more](https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm)
|
||
|
||
## Want to become a penetration tester ?
|
||
|
||
Know about risks on the internet and how they can be prevented is very useful. Especially as a developer. Web hacking and penetration testing is the v2.0 of self-defense! But does know about tools and how to use them is really all you need to become a pen tester? Surely not. A real penetration tester must be able to proceed rigorously and detect the weaknesses of an application. He must be able to identify the technology behind and test every single door that might be open to hackers.
|
||
|
||
This repository aim first to establish a reflection method on penetration testing and explain how to proceed to secure an application. And secondly, to regroup all kind of tools or resources pen testers need. **Be sure to know basics of programming languages and Internet security before learning pen testing.**
|
||
|
||
## Some vocabulary
|
||
|
||
**Black/grey/white hat hacker** : Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if he's a black, grey or white hat hacker.
|
||
|
||
**Penetration tester** : Most likely a white hacker who test applications and systems to secure them or find vulnerabilities.
|
||
|
||
**Security researcher** : Someone who practice pen testing and browse the web everyday to find phishing/fake websites, infected servers, bugs or vulnerabilities. He can work for a company so he's responsible for the security of systems.
|
||
|
||
## Languages
|
||
|
||
- Python
|
||
- Ruby
|
||
- C / C++ / C#
|
||
- Perl
|
||
- Go
|
||
- Java
|
||
|
||
## Content Management Systems
|
||
|
||
- Wordpress
|
||
- Joomla
|
||
- Drupal
|
||
- SPIP
|
||
|
||
## Categories and attacks
|
||
|
||
##### [Information Gathering](#male_detective-information-gathering)
|
||
##### [Password Attacks](#lock-password-attacks) : Brute Force ...
|
||
##### [Wireless Testing](#globe_with_meridians-wireless-testing)
|
||
##### [Exploitation Tools](#wrench-exploitation-tools) : XSS, SQL injection, CSRF ...
|
||
##### [Sniffing & Spoofing](#busts_in_silhouette-sniffing--spoofing) : MITM ...
|
||
##### [Web Hacking](#rocket-web-hacking)
|
||
##### [Private Web Hacking](#zap-private-web-hacking)
|
||
##### [Post Exploitation](#tada-post-exploitation)
|
||
##### [Frameworks](#package-frameworks)
|
||
|
||
## Basic steps of pen testing
|
||
|
||
<p align="center"><img src="https://www.tutorialspoint.com/penetration_testing/images/penetration_testing_method.jpg"></p>
|
||
|
||
## Tools by category
|
||
|
||
#### :male_detective: Information Gathering
|
||
|
||
Information Gathering tools allows you to collect host metadata about services and users. Check informations about a domain, IP address, phone number or an email address.
|
||
|
||
- [Th3inspector](https://github.com/Moham3dRiahi/Th3inspector) **Perl** | `Linux/Windows/macOS` | All in one tool for Information Gathering written in Perl.
|
||
- [Crips](https://github.com/Manisso/Crips) **Python** | `Linux/Android` | IP Tools To quickly get information about IP Address's, Web Pages and DNS records.
|
||
- [theHarvester](https://github.com/laramies/theHarvester) **Python** | `Linux/macOS` | E-mails, subdomains and names Harvester.
|
||
- [Scanless](https://github.com/vesche/scanless) **Python** | `Linux/macOS` | Online port scan scraper.
|
||
|
||
#### :lock: Password Attacks
|
||
|
||
Crack passwords and create wordlists.
|
||
|
||
- [John the Ripper](https://github.com/magnumripper/JohnTheRipper) **C** | `Linux/Windows/macOS` | John the Ripper is a fast password cracker.
|
||
- [hashcat](https://github.com/hashcat/hashcat) **C** | `Linux/Windows/macOS` | World's fastest and most advanced password recovery utility.
|
||
- [Hydra](https://github.com/vanhauser-thc/thc-hydra) **C** | `Linux/Windows/macOS` | Parallelized login cracker which supports numerous protocols to attack.
|
||
|
||
- [ophcrack](https://gitlab.com/objectifsecurite/ophcrack) **C++** | `Linux/Windows/macOS` | Windows password cracker based on rainbow tables.
|
||
- [Ncrack](https://github.com/nmap/ncrack) **C** | `Linux/Windows/macOS` | High-speed network authentication cracking tool.
|
||
|
||
###### :memo: Wordlists
|
||
|
||
- [Probable Worlist](https://github.com/berzerk0/Probable-Wordlists) | Wordlists sorted by probability originally created for password generation and testing.
|
||
|
||
#### :globe_with_meridians: Wireless Testing
|
||
|
||
Used for intrusion detection and wifi attacks.
|
||
|
||
- [Aircrack](https://github.com/aircrack-ng/aircrack-ng) **C** | `Linux/Windows/macOS` | WiFi security auditing tools suite.
|
||
- [bettercap](https://github.com/bettercap/bettercap) **Go** | `Linux/Windows/macOS/Android` | bettercap is the Swiss army knife for network attacks and monitoring.
|
||
- [WiFi Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) **Python** | `Linux/Windows/macOS/Android`| Framework for Rogue Wi-Fi Access Point Attack.
|
||
|
||
#### :wrench: Exploitation Tools
|
||
|
||
Acesss systems and data with service-oriented exploits.
|
||
|
||
- [SQLmap](https://github.com/sqlmapproject/sqlmap) **Python** | `Linux/Windows/macOS` | Automatic SQL injection and database takeover tool.
|
||
- [XSStrike](https://github.com/UltimateHackers/XSStrike) **Python** | `Linux/Windows/macOS` | Advanced XSS detection and exploitation suite.
|
||
|
||
#### :busts_in_silhouette: Sniffing & Spoofing
|
||
|
||
Listen to network traffic or fake a network entity.
|
||
|
||
- [Wireshark](https://www.wireshark.org) **C/C++** | `Linux/Windows/macOS` | Wireshark is a network protocol analyzer.
|
||
- [WiFi Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) **Python** | `Linux/Windows/macOS/Android`| Framework for Rogue Wi-Fi Access Point Attack.
|
||
|
||
#### :rocket: Web Hacking
|
||
|
||
Exploit popular CMSs that are hosted online.
|
||
|
||
- [WPScan](https://github.com/wpscanteam/wpscan) **Ruby** | `Linux/Windows/macOS` | WPScan is a black box WordPress vulnerability scanner.
|
||
- [Droopescan](https://github.com/droope/droopescan) **Python** | `Linux/Windows/macOS` | A plugin-based scanner to identify issues with several CMSs, mainly Drupal & Silverstripe.
|
||
- [Joomscan](https://github.com/rezasp/joomscan) **Perl** | `Linux/Windows/macOS` | Joomla Vulnerability Scanner.
|
||
- [Drupwn](https://github.com/immunIT/drupwn) **Python** | `Linux/Windows/macOS` | Drupal Security Scanner to perform enumerations on Drupal-based web applications.
|
||
|
||
#### :zap: Private Web Hacking
|
||
|
||
Access files and databases.
|
||
|
||
...
|
||
|
||
#### :tada: Post Exploitation
|
||
|
||
Exploits for after you have already gained access.
|
||
|
||
...
|
||
|
||
#### :package: Frameworks
|
||
|
||
Frameworks are packs of pen testing tools with custom shell navigation and documentation.
|
||
|
||
- [Metasploit](https://github.com/rapid7/metasploit-framework) **Ruby** | `Linux/Windows/macOS` | A penetration testing framework for ethical hackers.
|
||
- [fsociety](https://github.com/Manisso/fsociety) **Python** | `Linux/Windows/macOS` | fsociety Hacking Tools Pack – A Penetration Testing Framework.
|
||
- [cSploit](https://github.com/cSploit/android) **Java** | `Android` | The most complete and advanced IT security professional toolkit on Android.
|
||
- [radare2](https://github.com/radare/radare2) **C** | `Linux/Windows/macOS/Android` | Unix-like reverse engineering framework and commandline tools.
|
||
- [Social Engineer Toolkit](https://github.com/trustedsec/social-engineer-toolkit) **Python** | `Linux/macOS` | Penetration testing framework designed for social engineering.
|
||
- [hate_crack](https://github.com/trustedsec/hate_crack) **Python** | `Linux/macOS` | A tool for automating cracking methodologies through Hashcat.
|
||
- [Wifiphisher](https://github.com/wifiphisher/wifiphisher) **Python** | `Linux` | The Rogue Access Point Framework.
|
||
- [Kickthemout](https://github.com/k4m4/kickthemout) **Python** | `Linux/macOS` | Kick devices off your network by performing an ARP Spoof attack.
|
||
|
||
## Additional resources
|
||
|
||
- [The Life of a Security Researcher](https://www.alienvault.com/blogs/security-essentials/the-life-of-a-security-researcher)
|
||
- [Find an awesome hacking spots in your country](https://github.com/diasdavid/awesome-hacking-spots)
|