/hmg/ Hackerman General

In /hmg/ we discuss pentesting, ctfs, exploits, and general being a hackerman.

Resources:
VM/CTFs:
overthewire.org/wargames/bandit/
>easy beginner bullshit
vulnhub.com/
>prebroken images to work on.
hackthebox.eu/
>super secret club
ctf.hacker101.com
>part of hackerone, a bug bounty program. Find flags, get private invitations to bug bounty programs

Tools:
kali.org/
>meme dragon distro but it just werks
metasploit.com/
>scriptkiddie starting point and swiss army knife

Tutorials/Guides:
abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
>From zero to OSCP-hero rough outline
youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA
>IppSec, video guides for retired HTB VMs.

Certs:
eccouncil.org/programs/certified-ethical-hacker-ceh/
>CEH, only looks good a resume to non-technical in HR
offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
>OSCP, the big dick swinging exam, 24 hours to own 5 machines and a further 24 hours to write up a report detailing your methods.

Attached: hmg.jpg (250x250, 9K)

Other urls found in this thread:

sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
youtube.com/watch?v=NArwG6yaWJ8
ctf.hacker101.com
shodan.io/search?query=Android debug bridge
overthewire.org/wargames/bandit/
t.me/Sw0rdD0g[/spoiler]
certification.comptia.org/certifications/network
virtualhackinglabs.com/
twitter.com/NSFWRedditImage

Holy shit /hmg/ is revived again? I tried to keep it going for like a week but it eventually died, glad to see it back I suppose. Haven't touched pentesting for a whiiiile, should really get back into it.

Yeah, previous thread(from yesterday): Some interesting discussion in there. I post it every so often, but I'll never stay consistent. Hopefully others will carry it out as well.

bump

any military cyberwarfare boys ITT? just started jcac and had some questions

I want to be a hackerman.
Seriously, what's the best method for learning how to discover and writing programs for exploits?

>best method for learning how to discover and writing programs for exploits
much reverse engineering binaries

Run them through a debugger or disassembler?
What about binaries that obfuscate from debuggers like on mobile apps?

I've played most games on overthewire and left it halfway through vortex because it got repetitive, where can I learn new stuff with other people and shit? I'm an aspie with anxiety who cant talk to people.

Attached: welcome.jpg (800x800, 169K)

But 90% of vulns are bad configuration or faulty logic.