parent
238245431b
commit
1a3265295c
65 changed files with 4119 additions and 2856 deletions
File diff suppressed because it is too large
Load Diff
@ -0,0 +1 @@ |
||||
# Malware and types |
@ -0,0 +1 @@ |
||||
# Owasp top 10 |
@ -0,0 +1 @@ |
||||
# Privilege escalation attacks |
@ -0,0 +1 @@ |
||||
# Cia triad |
@ -0,0 +1 @@ |
||||
# Handshakes |
@ -0,0 +1 @@ |
||||
# Threat intel osint |
@ -0,0 +1 @@ |
||||
# False true negative positive |
@ -0,0 +1 @@ |
||||
# Blue team read team purple team |
@ -0,0 +1 @@ |
||||
# Authentication vs authorization |
@ -0,0 +1 @@ |
||||
# Basics of ids ips |
@ -0,0 +1 @@ |
||||
# Honeypots |
@ -0,0 +1 @@ |
||||
# Concept of isolation |
@ -0,0 +1 @@ |
||||
# Os hardening |
@ -0,0 +1 @@ |
||||
# Cyber kill chain |
@ -0,0 +1 @@ |
||||
# Mfa 2fa |
@ -0,0 +1 @@ |
||||
# Backups and resiliency |
@ -0,0 +1 @@ |
||||
# Definition of risk |
@ -0,0 +1 @@ |
||||
# Compliance and auditors |
@ -0,0 +1 @@ |
||||
# Zero trust |
@ -0,0 +1 @@ |
||||
# Perimiter dmz segmentation |
@ -0,0 +1 @@ |
||||
# Penetration rules of engagement |
@ -0,0 +1 @@ |
||||
# Basics of reverse engineering |
@ -0,0 +1 @@ |
||||
# Vulnerability management |
@ -0,0 +1 @@ |
||||
# Threat hunting |
@ -0,0 +1 @@ |
||||
# Forensics |
@ -0,0 +1 @@ |
||||
# Runbooks |
@ -0,0 +1 @@ |
||||
# Defense in depth |
@ -0,0 +1 @@ |
||||
# Common exploit frameworks |
@ -0,0 +1 @@ |
||||
# Common hacking tools |
@ -0,0 +1 @@ |
||||
# Phishing vishing whaling smishing |
@ -0,0 +1 @@ |
||||
# Spam vs spim |
@ -0,0 +1 @@ |
||||
# Shoulder surfing |
@ -0,0 +1 @@ |
||||
# Dumpster diving |
@ -0,0 +1 @@ |
||||
# Tailgating |
@ -0,0 +1 @@ |
||||
# Zero day |
@ -0,0 +1 @@ |
||||
# Social engineering |
@ -0,0 +1 @@ |
||||
# Reconnaissance |
@ -0,0 +1 @@ |
||||
# Impersonation |
@ -0,0 +1 @@ |
||||
# Watering hole attack |
@ -0,0 +1 @@ |
||||
# Drive by attack |
@ -0,0 +1 @@ |
||||
# Typo squatting |
@ -0,0 +1 @@ |
||||
# Brute force vs password spray |
@ -0,0 +1 @@ |
||||
# Attack types |
@ -0,0 +1 @@ |
||||
# Dos vs ddos |
@ -0,0 +1 @@ |
||||
# Mitm |
@ -0,0 +1 @@ |
||||
# Arp poisoning |
@ -0,0 +1 @@ |
||||
# Evil twin |
@ -0,0 +1 @@ |
||||
# Dns poisoning |
@ -0,0 +1 @@ |
||||
# Spoofing |
@ -0,0 +1 @@ |
||||
# Deauth attack |
@ -0,0 +1 @@ |
||||
# Vlan hopping |
@ -0,0 +1 @@ |
||||
# Rogue access point |
@ -0,0 +1 @@ |
||||
# War driving dialing |
@ -0,0 +1 @@ |
||||
# Common network based attacks |
@ -0,0 +1 @@ |
||||
# Buffer overflow |
@ -0,0 +1 @@ |
||||
# Memory leak |
@ -0,0 +1 @@ |
||||
# Xss |
@ -0,0 +1 @@ |
||||
# Sql injection |
@ -0,0 +1 @@ |
||||
# Csrf |
@ -0,0 +1 @@ |
||||
# Replay attack |
@ -0,0 +1 @@ |
||||
# Pass the hash |
@ -0,0 +1 @@ |
||||
# Directory traversal |
@ -0,0 +1 @@ |
||||
# Other attacks |
Loading…
Reference in new issue