Tool Bag

Online Security Awareness

CLICK HERE to download this presentation to use with your school, church, work, or social group.

Cyber Security Flavors



OSINT

Image
Google
This is your best friend when it comes to Open Source Intelligence. Any search engine will work, but you can find a lot of infromation if you can learn how to search properly. If you haven't heard of them check'em out. Good hunting!
Image
Shodan
They are the world's first search engine for Internet-connected devices. Use Shodan to discover which of your devices are connected to the Internet, where they are located and who is using them. Keep track of all the computers on your network that are directly accessible from the Internet. Shodan lets you understand your digital footprint. Websites are just one part of the Internet. There are power plants, Smart TVs, refrigerators and much more that can be found with Shodan! Shodan is used around the world by researchers, security professionals, large enterprises, CERTs and everybody in between.
Image
Wikipedia
The free encyclopedia that anyone can edit. Wikipedia has become extremely useful for all sorts of searches. Most of the information is not be fact checked and the links provided can lead to some great information. Give them a try and see if you can find the answers you are looking for.

Password Cracking

Image
CyberChef
A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. CyberChef encourages both technical and non-technical people to explore data formats, encryption and compression.
Image
Rumkin - Cipher Tools
Let's say that you need to send your friend a message, but you don't want another person to know what it is. You can use a full-blown encryption tool, such as PGP. If the message isn't that important or if it is intended to be decrypted by hand, you should use a simpler tool. This is a page dedicated to simple text manipulation tools, which all can be replicated with just paper and pencil.
Image
D Code
They are the essential site for deciphering and decoding messages, cheating on letter games, solving puzzles, treasure hunts, etc with all the necessary tools for games, puzzles, codes, encryption and dictionaries.

Hashing

Image
Hashcat
The world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking.
Image
CrackStation
This tool is still underconstruction. We are adding content as fast as possible for additional tools and links to helpful sites. If you have a tool you like to use let us know in the comments, on Facebook, on Twitter, or email us. Thank you for patience.
Image
Hashkiller
Their purpose is to serve as a meeting place for computer hobbyists, security researchers and penetration testers. It serves as a central location to promote greater security on the internet by demonstrating the weakness of using weak hash based storage / authentication. HashKiller.co.uk is a hash lookup service. This allows you to input a hash and search for its corresponding plaintext ("found") in our database of already-cracked hashes. In other words, we are not cracking your hash in realtime - we're just caching the hard work of many cracking enthusiasts over the years.

Web Exploit

Image
Gruyere
This codelab is built around Gruyere /ɡruːˈjɛər/ - a small, cheesy web application that allows its users to publish snippets of text and store assorted files. "Unfortunately," Gruyere has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The goal of this codelab is to guide you through discovering some of these bugs and learning ways to fix them both in Gruyere and in general.
Image
OWASP
OWASP is a new kind of organization. Our freedom from commercial pressures allows us to provide unbiased, practical, cost-effective information about application security. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. Similar to many open-source software projects, OWASP produces many types of materials in a collaborative and open way. The OWASP Foundation is a not-for-profit entity that ensures the project's long-term success.
Image
Troy Hunt: Hack-Yourself-First
This website is provided by troyhunt.com as part of the Pluralsight course Hack Yourself First: How to go on the cyber-offence. It's full of nasty app sec holes. No seriously, it's terrible!

Reverse Engineering

Image
InfoSec Institute
Reverse engineering refers to the duplication of another producer’s product following a thorough examination of its construction or composition. It involves taking apart the product to understand how it works so as to enhance or duplicate such a product. It makes it possible to understand the basic working principle and structure of the systems under study.
Image
0x00 SEC
Reverse Engineering and Crackme challenges: This topic is an aggregation of Crackme and reverse engineering challenges developed for 0x00sec. Please discuss the challenges in the thread they were originally posted or on IRC in #challenges. This curation is based entirely on the author's own whim and not a complete aggregation of all RE/Crackme challenges posted on the forum.
Image
Crackmes.one
This is a simple place where you can download crackmes to improve your reverse engineering skills. If you want to submit a crackme or a solution to one of them, you must register.
Image
Overthewire.org
Overthe wire wargames NARNIA and BEHEMOTH will teach you how to exploit several of the most common coding mistakes including buffer overflows, race conditions and privilege escalation. NARNIA provides the source code of each level to make it easier for you to spot the vuln and abuse it.
Image
x64dbg
32-bit and 64-bit open source debugger for windows.
Image
IDA Freeware version
Freeware version of an industry standard tool for disassembly and debugging.
Image
Radare
A portable, open source reversing framework.
Image
edb (Evan's debugger)
A GUI Linux debugger modeled on the Windows Ollydbg debugger. Available by default on Kali Linux.

Log Analysis

Image
Unix standard text manipulation tools
Unix-like operating systems have been doing text manipulation for decades. As such, many specialized tools have been created for slicing and dicing text data. Grep, sed, awk, sort, and uniq are but a few of the very useful command line tools available. Check out this introductory tutorial. These tools are also available for Windows, either through the Windows Subsystem for Linux (WSL) or natively compiled tools.

Steganography

Image
Digital Invisible Ink Toolkit (diit)
The Digital Invisible Ink Toolkit is a Java steganography tool that can hide any sort of file inside a digital image (regarding that the message will fit, and the image is 24 bit colour). It will work on Windows, Linux and Mac OS because it is written in Java and thus platform independent.
Image
Open Puff
OpenPuff is a advanced watermarking and Steganography, or data hiding, program capable of storing up to 256MB of encrypted data using an invisible copyright mark in pictures, video, audio, and flash files.OpenPuff supports many carrier formats: images (BMP, JPG, PCX, PNG, TGA),audio support (AIFF, MP3, NEXT/SUN, WAV),video support (3GP, MP4, MPG, VOB) and flash-Adobe support (FLV, SWF, PDF).
Image
Stegan RTP
Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access.
Image
MP3 Stego
This tool will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files.

Network Traffic Analysis

Image
Wireshark
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998.
Image
Malware-Traffic-Analysis
This blog focuses on network traffic related to malware infections. Their toolkit includes Wireshark and Security Onion. They are active on Twitter, so please follow @malware_traffic for additional info. Use this website at your own risk! If you download or use of any information from this website, you assume complete responsibility for any resulting loss or damage.
Image
PacketLife
PacketLife.net is the work of a network engineer named Jeremy Stretch. It began as a repository for Cisco certification study notes in 2008, but quickly grew into a popular community web site. The site's goal is to offer free, quality technical education to networkers all over the world, regardless of skill level or background.

Further Knowledge

Coding

Image
Stack Overflow
Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. More than 50 million professional and aspiring programmers visit Stack Overflow each month to help solve coding problems, develop new skills, and find job opportunities.
Image
FreeCodeCamp
Our mission: to help people learn to code for free. We accomplish this by creating thousands of videos, articles, and interactive coding lessons - all freely available to the public. We also have thousands of freeCodeCamp study groups around the world.
Image
SoloLearn
Learning has never been this social and accessible for so many! Bit-sized lessons and fun practice sessions grab your attention and keep you focused, for guaranteed best results!. Practice during lessons, practice between lessons, practice whenever you can. Master the task, then reinforce and test your knowledge with fun, hands-on exercises and interactive quizzes.
Image
Pluralsight
Keep up with technology with expert-led courses, assessments and tools that help you build the skills you need, when you need them. For organizations, get unprecedented insight into skills strengths and weaknesses and align learning to what matters.

Certifications

Image
CompTIA Academic
CompTIA certifications are accepted world-wide in the computer profession industry. As a student you have the unique ability to receive a discount on exam vouchers to earn your certifications. Some of the availble certs are: A+, Net+, Sec+, CybSec+, and more. For the purchase of Exam Vouchers or CertMaster Learning the following rules apply:
• The quantity you place in your cart for a single line item of either product is limited to (1)
• You may select ‘Add to Cart’ for either product more than once to order (2) of the same product
• You are limited to buying (2) of either product in a six month period
• Total lifetime purchases of either product may not exceed (4)
Image
SANS
They is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.
Image
Cisco - Associate Certs
The associate-level certification programs have been redesigned to better align with evolving industry job roles and provides the skills networking professionals need to successfully manage cutting edge network solutions. Candidates now need to pass only two required exams to achieve advanced technology certifications in an accelerated manner.

White Papers

Image
Lorem Ipsum
This tool is still underconstruction. We are adding content as fast as possible for additional tools and links to helpful sites. If you have a tool you like to use let us know in the comments, on Facebook, on Twitter, or email us. Thank you for patience.
Image
Lorem Ipsum
This tool is still underconstruction. We are adding content as fast as possible for additional tools and links to helpful sites. If you have a tool you like to use let us know in the comments, on Facebook, on Twitter, or email us. Thank you for patience.
Image
Lorem Ipsum
This tool is still underconstruction. We are adding content as fast as possible for additional tools and links to helpful sites. If you have a tool you like to use let us know in the comments, on Facebook, on Twitter, or email us. Thank you for patience.

Practice Makes Perfect

Tutorials

Image
Corey Schafer
"Welcome to my Channel. This channel is focused on creating tutorials and walkthroughs for software developers, programmers, and engineers. We cover topics for all different skill levels, so whether you are a beginner or have many years of experience, this channel will have something for you.
We've already released a wide variety of videos on topics that include: Python, Git, Development Environments, Terminal Commands, SQL, Programming Terms, JavaScript, Computer Science Fundamentals, and plenty of other tips and tricks which will help you in your career.
If you enjoy these videos and would like to support my channel, I would greatly appreciate any assistance through my Patreon account:
Corey's Patreon"
Image
Tim Corey
"My goal is to make your life easier, specifically when it comes to learning software development. I remember what it was like to not know even what questions to ask. In every video I do, I try to answer those questions. You will notice that I don't usually do quick videos. That's because I would rather help you understand rather than just padding my watch percentages. If you want more in-depth training, feel free to head over to my website (iamtimcorey.com) where I have courses dedicated to C#, SQL, and more."
Image
Eddie Richards
SNHUcoder's very own @Eddie. Eddie has helped many students work their way through Java, Python, and several other problems. Eddie is available on the SNHUcoders.slack.com and has placed some videoes up on his YouTube account to help walk students through their frustrations. Swing and leave him a like and follow if you feel he does a good job.
Image
Dale Meredith
Like the Dark Knight, Dale Meredith swoops in and saves the day when no one else can. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge on the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Along with his 17 years of experience as a Microsoft Certified Trainer, Dale also has an additional 7 years of Senior IT Management experience. Dale's priority to maintain personal knowledge and understanding of current trends in training, technology, and applications has led to many opportunities such as: training various divisions at the Department of Homeland Security during their Novell to Microsoft transition and implementing and managing networks using Microsoft's Server Platform, Exchange, SharePoint, SCCM and others for many Fortune 500 companies. Also, specializing in Active Directory, Exchange, Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud. Dale, also became a Certified Ethical Hacker and Certified EC-Council Instructor back in 2006. Out of the class room, Dale is a monolith in the IT and Tech sphere as well as a consultant for several companies, and shares his knowledge on his popular site dalemeredith.com. Check out all of Dale's courses and what his raving fans are saying about him.Dale's YouTube

CTF/Challenges

Image
National Cyber League
The NCL is a defensive and offensive puzzle-based, capture-the-flag style cybersecurity competition. Its virtual training ground helps high school and college students prepare and test themselves against cybersecurity challenges that they will likely face in the workforce. All participants play the games simultaneously during Preseason, Individual Game and Team Game.
NCL allows players of all levels to enter. Between easy, medium and hard challenges, students have multiple opportunities to really shine in areas as they excel.
The NCL challenges are based on the CompTIA Security+™ and EC-Council Certified Ethical Hacker (CEH)™ performance-based exam objectives and include the following content: Open Source Intelligence, Scanning, Enumeration and Exploitation, Password Cracking, Traffic Analysis, Log Analysis, Wireless Security, Cryptography, and Web Application Security.
NCL is open to all current High School and College students.
Image
PicoCTF
PicoCTF is geared toward middle school and high scool students. This provides an EXCELLENT introduction to CTF and Cyber related challenges for beginners. But don't be fooled... there is plenty of challenging material here for players of all levels!
Image
CTFTime.org
CTFTime provides a CTF archive of past competitions, and a list of upcoming competitions. Additionally, teams can register and keep track of their win/loss record as well. This is also a GREAT place to find CTF writeups for learning new TTPs! (tools, techniques, and procedures)