Suggested resources for understanding Information Assurance (IA) and Cyber Security
Penetration Testing, Exploiting and Vulnerability Assessment
Fast and Easy Hacking with Armitage for Metasploit: A demonstration of the software used in scanning for targets, attacking hosts with client side attacks or remote exploits, and working the network using pass-the-hash techniques.
Hacking using Nmap, Nessus and Metasploit: A tutorial on how to use Nmap, Nessus, and Metasploit to launch and attack on a vulnerable system.
Understanding and Using SQL Injection Attack
Man-in-the-Middle Attack (MitM) using Secure Socket Layer (SSL) Stripping
Real World Pen Testing – Client Side and Pivot Attacks on Fully-Patched Systems: A demonstration of common risks found that he sees whilst carrying out penetration tests.
|Cain & Abel||Password Cracking Application for Windows|
|Dsniff||Network Auditing Suite|
|Hping3||Network Probing Tool|
|John the Ripper||Password Cracking Application|
|Metasploit Framework||Security Testing Framework (see Documentation below)|
|Nessus||Vulnerability Accessment Tool|
|Netcat / Cryptcat||The Network “Swiss Army Knife”|
|Ophcrack||Password Cracking Application for Windows based on Rainbow Tables|
|PuTTY||Secure Shell Client|
|Snort||Intrusion Detection System|
|THC Hydra||Network Authentication (SSH) Cracking Application|
|Wireshark||Network Sniffer and Packet Analyzer|
|WhosThere||Tool to List Logon Sessions with NTLM Credentials on Windows Domains|
|winAUTOPWN||Auto hacking shell gaining tool|
|Threat Level (Wired)||html|
|Homeland Security Newswire||html|