A book that every hackers must read for it will teach all of the basic foundation in ethical hacking.
"...the Filipino version of Kevin Mitnick's GHOST IN THE WIRES and Kevin Poulsen's KINGPIN...
- Mars Cacacho, Founder of HackTheNorth
"The book is focused on a hacker's mindset that gives you a basic idea on how to think like a hacker and it will also inspire you to become one. It will also teach you that having a mentor will create a big impact on how you choose and decide in every step of your life."
-Meric Mara, Chairman of 8layer Technologies, Inc., Director of Maralabs, The man behind the KahelOS (The First Linux Distro in the Philippines)
This is the first mobile app in the world that not jut block but also track the hackers within the network. This app won several international awards such as a Quality Award in Gold Category in BID Stars Switzerland and Best App of the Day in US.
Features:
"Top Mobile Security app in 2020..."
- Business Mirror
Holders of the Red Team Operator badge have demonstrated their knowledge of adversary simulation, command & control, engagement planning and time management. They can perform each stage of an attack lifecycle from initial compromise, to full domain takeover, data hunting, and exfiltration; whilst being aware of OPSEC concerns and bypassing defences.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).
OSWP holders must complete the Offensive Security Wireless Attacks (WiFu) course with Offensive Security and pass a 4-hour practical exam.
OSWPs are able to identify existing encryptions and vulnerabilities in 802.11 networks, circumvent network security restrictions and recover the encryption keys in use, implement attacks against WEP & WPA encrypted networks, execute advanced attacks such as PRGA key extraction & one-way packet injection, use alternate WEP/WPA cracking techniques and understand how to implement different rogue access point attacks.
The eCPPT designation stands for eLearnSecurity Certified Professional Penetration Tester. eCPPT is a 100% practical and highly respected Ethical Hacking and Penetration Testing Professional certification counting certified professional in all the seven continents.
The eLearnSecurity Certified Digital Forensics Professional (eCDFP) is an advanced digital forensics exam meant for senior-level cyber security professionals. A successful certification allows digital forensics investigators to prove their technical digital forensics expertise.
The eLearnSecurity Web Application Penetration Tester certification requires you to literally hack a website HANDS-ON and submit a commercial-grade VAPT report just like in a real-life Web VAPT assessment.
The web attacks conducted in this certification are related to SQLi, XSS, CSRF, IDOR, SOAP, WSDL, XXE, LFI, RCE and many more
Earners of the CompTIA PenTest+ certification have the knowledge and skills necessary to perform hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. CompTIA PenTest+ professionals have demonstrated the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
Earners of the CompTIA CySA+ certification have the skills, knowledge, and ability to address security analytics, intrusion detection and response.
CompTIA CySA+ analysts have demonstrated the ability to perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization and the skills to secure and protect the systems.
I love teaching so I created a YouTube Channel for my Hacker Academy Masterclass with 155,000+ subscribers:
I compile here in my Medium blog all of the writeups I made. Most of the basic tools and techniques in OSINT are written here and a lot of things about red team / offensive security. I also added some touch of stories and experiences I had in penetration testing and OSINT investigations.