<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=OpenWest_2014%2FHacking</id>
	<title>OpenWest 2014/Hacking - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=OpenWest_2014%2FHacking"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=OpenWest_2014/Hacking&amp;action=history"/>
	<updated>2026-04-30T05:51:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=OpenWest_2014/Hacking&amp;diff=43&amp;oldid=prev</id>
		<title>Kenneth at 15:19, 11 May 2014</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=OpenWest_2014/Hacking&amp;diff=43&amp;oldid=prev"/>
		<updated>2014-05-11T15:19:26Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;quot;Beginners Introduction to Hacking and Information Security Using Open Source Tools.&amp;quot;&lt;br /&gt;
:by Lance Buttars&lt;br /&gt;
&lt;br /&gt;
Surface Areas of Attack:&lt;br /&gt;
* Network&lt;br /&gt;
* Operating system&lt;br /&gt;
* Software&lt;br /&gt;
* Users&lt;br /&gt;
* Hardware&lt;br /&gt;
&lt;br /&gt;
Penetration test (aka. pen test)&lt;br /&gt;
&lt;br /&gt;
Do you really trust your own computer? Have you read ever line of source code?  Traced every circuit?&lt;br /&gt;
&lt;br /&gt;
CVE - database of vulnerabilities&lt;br /&gt;
* http://wiki.alpinelinux.org/wiki/Cvechecker&lt;br /&gt;
&lt;br /&gt;
Exploit Development Resources:&lt;br /&gt;
* http://exploit-exercises.com/&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
* Kali Linux OS - http://www.kali.org/&lt;br /&gt;
&lt;br /&gt;
Metasploit:&lt;br /&gt;
* http://www.offensive-security.com/metasploit-unleashed/&lt;br /&gt;
&lt;br /&gt;
Privilege Escalation - process of acquiring system rights of another target user&lt;br /&gt;
&lt;br /&gt;
Passive Attacking - ease dropping packet sniffing&lt;br /&gt;
* Man in the middle&lt;br /&gt;
* SSL strip&lt;br /&gt;
* Wireshark&lt;br /&gt;
* dsniff&lt;br /&gt;
&lt;br /&gt;
Denial of Service (DoS)&lt;br /&gt;
&lt;br /&gt;
Social Engineering Tool Kit&lt;br /&gt;
* https://www.trustedsec.com/downloads/social-engineer-toolkit/&lt;br /&gt;
* installed on Kali&lt;br /&gt;
* ?? Capture Facebook credentials and other stuff ??&lt;br /&gt;
&lt;br /&gt;
OWASP&lt;br /&gt;
&lt;br /&gt;
Web Attacks&lt;br /&gt;
* The Open Web Application Security Project (OWASP) Top 10&lt;br /&gt;
* https://www.owasp.org/index.php/Top10&lt;br /&gt;
&lt;br /&gt;
SQL Injection attacks&lt;br /&gt;
&lt;br /&gt;
Broken Authentications and Session Management&lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* easily to fight against - just include a random number for each request that the user has to respond with&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>