I've been trying to get around to start posting on here for a while now, but can never quite come up with what I want to post.
So, I figure I'll just start off with some resources I've been sharing with the students of my sec560 mentor class.
Enjoy & I promise some original content soon (maybe) lol
Resources for sec560 week2:
First off a few Penetration Testing methodologies:
OSSTMM (Open Source Security Testing Methodology Manual) - http://www.isecom.org/osstmm/
Penetration Testing Framework - http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html (Super detailed)
OWASP Testing Guide (focused on web application testing) - http://www.owasp.org/index.php/Category:OWASP_Testing_Project
NIST Guide to Security Testing - http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf
Also, here is a great reference for computer crime related laws: http://www.cybercrime.gov/cclaws.html
One final item, here are a bunch of infosec related 'cheat sheets', the SANS one's pertaining to this course are at the bottom - http://zeltser.com/cheat-sheets/
Resources for sec560 week 3:
Reconnaissance tools & scripts:
Metagoofil: http://www.edge-security.com/metagoofil.php
Metagoofil is an information gathering tool designed for extracting metadata of
public documents (pdf,doc,xls,ppt,odp,ods) availables in the target/victim websites.
The Harvester: http://www.edge-security.com/theHarvester.php
theHarvester is a tool for gathering e-mail accounts, user names and hostnames/subdomains
from different public sources. It's a really simple tool, but very effective.
Subdomainer: http://www.edge-security.com/subdomainer.php
Subdomainer is an information gathering tool designed for obtaining subdomain names from public sources,
like Google, Msn search, Yahoo, PgP servers, etc.
gpscan: http://www.digininja.org/projects/gpscan.php
Scans google profiles for profiles of personnel from a target organization
CeWL: http://www.digininja.org/projects/cewl.php
Custom wordlist generator, scrapes a site & generates a list of words useful for pasword guessing.
Reconnoiter: http://www.jwnetworkconsulting.com/security/web-application-security/new-open-source-project-created-reconnoiter
Generates possible user names by scraping LinkedIn for the names of employees of the target organization
Recommended talks & presentations:
New School Information Gathering - Chris Gates
Audio: http://www.chicagocon.com/images/stories/library/media_lab/2008s/ChicagoCon2008s_CGates_NewSchoolInfoGathering.mp3
Slides: http://www.chicagocon.com/images/stories/library/media_lab/2008s/ChicagoCon2008s_CGates_NewSchoolInfoGathering.pdf
Tactical Exploitation - HD Moore & Valsmith:
Video (part 1): http://avondale.good.net/dl/bd/blackhat-2007-usa-video/2007_BlackHat_Vegas-V35-Moore-Valsmith-Tactical_Exploitation-PT1.mp4
Video (part 2): http://avondale.good.net/dl/bd/blackhat-2007-usa-video/2007_BlackHat_Vegas-V36-Moore-Valsmith-Tactical_Exploitation-PT2.mp4
Whitepaper v1: http://blog.attackresearch.com/publications/hdmoore_valsmith_tactical_paper.pdf
Whitepaper v2: http://blog.attackresearch.com/publications/hdmoore_valsmith_tactical_paper.pdf
No comments:
Post a Comment