parent
238245431b
commit
1a3265295c
65 changed files with 4119 additions and 2856 deletions
File diff suppressed because it is too large
Load Diff
@ -0,0 +1 @@ |
|||||||
|
# Malware and types |
@ -0,0 +1 @@ |
|||||||
|
# Owasp top 10 |
@ -0,0 +1 @@ |
|||||||
|
# Privilege escalation attacks |
@ -0,0 +1 @@ |
|||||||
|
# Cia triad |
@ -0,0 +1 @@ |
|||||||
|
# Handshakes |
@ -0,0 +1 @@ |
|||||||
|
# Threat intel osint |
@ -0,0 +1 @@ |
|||||||
|
# False true negative positive |
@ -0,0 +1 @@ |
|||||||
|
# Blue team read team purple team |
@ -0,0 +1 @@ |
|||||||
|
# Authentication vs authorization |
@ -0,0 +1 @@ |
|||||||
|
# Basics of ids ips |
@ -0,0 +1 @@ |
|||||||
|
# Honeypots |
@ -0,0 +1 @@ |
|||||||
|
# Concept of isolation |
@ -0,0 +1 @@ |
|||||||
|
# Os hardening |
@ -0,0 +1 @@ |
|||||||
|
# Cyber kill chain |
@ -0,0 +1 @@ |
|||||||
|
# Mfa 2fa |
@ -0,0 +1 @@ |
|||||||
|
# Backups and resiliency |
@ -0,0 +1 @@ |
|||||||
|
# Definition of risk |
@ -0,0 +1 @@ |
|||||||
|
# Compliance and auditors |
@ -0,0 +1 @@ |
|||||||
|
# Zero trust |
@ -0,0 +1 @@ |
|||||||
|
# Perimiter dmz segmentation |
@ -0,0 +1 @@ |
|||||||
|
# Penetration rules of engagement |
@ -0,0 +1 @@ |
|||||||
|
# Basics of reverse engineering |
@ -0,0 +1 @@ |
|||||||
|
# Vulnerability management |
@ -0,0 +1 @@ |
|||||||
|
# Threat hunting |
@ -0,0 +1 @@ |
|||||||
|
# Forensics |
@ -0,0 +1 @@ |
|||||||
|
# Runbooks |
@ -0,0 +1 @@ |
|||||||
|
# Defense in depth |
@ -0,0 +1 @@ |
|||||||
|
# Common exploit frameworks |
@ -0,0 +1 @@ |
|||||||
|
# Common hacking tools |
@ -0,0 +1 @@ |
|||||||
|
# Phishing vishing whaling smishing |
@ -0,0 +1 @@ |
|||||||
|
# Spam vs spim |
@ -0,0 +1 @@ |
|||||||
|
# Shoulder surfing |
@ -0,0 +1 @@ |
|||||||
|
# Dumpster diving |
@ -0,0 +1 @@ |
|||||||
|
# Tailgating |
@ -0,0 +1 @@ |
|||||||
|
# Zero day |
@ -0,0 +1 @@ |
|||||||
|
# Social engineering |
@ -0,0 +1 @@ |
|||||||
|
# Reconnaissance |
@ -0,0 +1 @@ |
|||||||
|
# Impersonation |
@ -0,0 +1 @@ |
|||||||
|
# Watering hole attack |
@ -0,0 +1 @@ |
|||||||
|
# Drive by attack |
@ -0,0 +1 @@ |
|||||||
|
# Typo squatting |
@ -0,0 +1 @@ |
|||||||
|
# Brute force vs password spray |
@ -0,0 +1 @@ |
|||||||
|
# Attack types |
@ -0,0 +1 @@ |
|||||||
|
# Dos vs ddos |
@ -0,0 +1 @@ |
|||||||
|
# Mitm |
@ -0,0 +1 @@ |
|||||||
|
# Arp poisoning |
@ -0,0 +1 @@ |
|||||||
|
# Evil twin |
@ -0,0 +1 @@ |
|||||||
|
# Dns poisoning |
@ -0,0 +1 @@ |
|||||||
|
# Spoofing |
@ -0,0 +1 @@ |
|||||||
|
# Deauth attack |
@ -0,0 +1 @@ |
|||||||
|
# Vlan hopping |
@ -0,0 +1 @@ |
|||||||
|
# Rogue access point |
@ -0,0 +1 @@ |
|||||||
|
# War driving dialing |
@ -0,0 +1 @@ |
|||||||
|
# Common network based attacks |
@ -0,0 +1 @@ |
|||||||
|
# Buffer overflow |
@ -0,0 +1 @@ |
|||||||
|
# Memory leak |
@ -0,0 +1 @@ |
|||||||
|
# Xss |
@ -0,0 +1 @@ |
|||||||
|
# Sql injection |
@ -0,0 +1 @@ |
|||||||
|
# Csrf |
@ -0,0 +1 @@ |
|||||||
|
# Replay attack |
@ -0,0 +1 @@ |
|||||||
|
# Pass the hash |
@ -0,0 +1 @@ |
|||||||
|
# Directory traversal |
@ -0,0 +1 @@ |
|||||||
|
# Other attacks |
Loading…
Reference in new issue