Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rewrite: CyberSec Roadmap #4

Open
wants to merge 7 commits into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
98 changes: 66 additions & 32 deletions CyberSec.md
Original file line number Diff line number Diff line change
@@ -1,45 +1,72 @@
# Cyber Security
# Cyber Security Roadmap

## 1. Foundational Tips

***[Click me first](AS6380756171694101529140490119_content_1.pdf)***

Apart from the prerequisites mentioned in the main readme, Cyber Security as a domain requires a few more fundamental concepts and topics to be covered. An exhaustive introduction can be found in [Cisco Networking Academy's Introduction to Cyber Security](https://www.netacad.com/courses/security/cybersecurity-essentials), and in [SANS Cyber Aces Online Tutorial](https://tutorials.cyberaces.org/tutorials.html).

Before you go ahead and dive into any of the fields below, play a few CTFs ([WTF is CTF?](https://ctftime.org/ctf-wtf/)) to practice and hone your basic skills. A good start would be the [picoCTF](https://picoctf.com/) followed by [OverTheWire's wargames](https://overthewire.org/wargames/)!
**MUST READ PORTION**

Also, If you can't seem to afford physical or e-copies of any books mentioned, fret not! You can download them from any shadow archive like [Libgen](https://libgen.is)
Always make sure you work for the morally good side of you. Also, remember to patiently and wisely study every single resource accordingly.

**Jump into any one of the sections below that you wish. Specialize in one and then go for others!**
Patience and persistence are one of the most important qualities of CyberSecurity engineering.

## Tool building
The secret to a great cybersecurity engineer is the ability to build software that tailors to their need. Whether the purpose is to root, test or even protect.
* This is an advanced guide for bash: [Black-Hat Bash](https://nostarch.com/black-hat-bash)
* Rust combines high-level logic with machine-level control: [Black-Hat Rust](https://kerkour.com/black-hat-rust)
* Learn basics of C & x86ASM with [Dive into systems](https://diveintosystems.org/book/)
Apart from the prerequisites mentioned in the main readme, Cyber Security as a domain requires a few more fundamental concepts and topics to be covered.

## Computer Forensics
[What is Computer Forensics?](https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-0?intro=1)
Follow the links sequentially, If you can't seem to afford physical or e-copies of any books mentioned, fret not! You can download them from any shadow archive like [Libgen](https://libgen.is)

Alright, let's start with [the foundations](https://www.netacad.com/courses/introduction-to-cybersecurity) (Click me!)

## 2. Basics

- [Linux Basics for Hackers](https://kea.nu/files/textbooks/humblesec/linuxbasicsforhackers.pdf)
- [Networking Basics - Cisco](https://www.netacad.com/courses/networking-basics)
- [Beej's Guide to Network Programming](https://beej.us/guide/bgnet/pdf/bgnet_usl_c_1.pdf)
- [Dive Into Systems](https://diveintosystems.org/singlepage/)
- [Rust by Example](https://doc.rust-lang.org/rust-by-example/)
- [Bash scripting](https://www.shellscript.sh/)
- [Python 3.x Guide (PDF)](https://olinux.net/wp-content/uploads/2019/01/python.pdf)
- [Scripting challenges](https://overthewire.org/wargames/)
- [Inspire yourself and rebuild some tools](https://github.com/cyberguideme/Tools)
- [Finalise your basics!](https://www.netacad.com/courses/ethical-hacker)

* File Handling:
* [File Systems](https://www.ufsexplorer.com/articles/file-systems-basics.php)
* Detailed list of all [File Extensions](https://www.online-convert.com/file-type)
* Using [File Signatures](https://blog.netspi.com/magic-bytes-identifying-common-file-formats-at-a-glance/) as a tool
* [MetaData](https://resources.infosecinstitute.com/metadata-and-information-security/#gref) of a file
* [Memory Forensics](https://forensicswiki.org/wiki/Memory_analysis)
* [Volatility](https://resources.infosecinstitute.com/memory-forensics-and-analysis-using-volatility/#gref) for extraction
* Network analysis using [Burp Suite](https://www.youtube.com/playlist?list=PLWPirh4EWFpEiXbu4JgQG0KoX6-MU8FbT) or [Wireshark](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html)
* [Steganography](https://www.edureka.co/blog/steganography-tutorial): The Why and How

## Cryptography
Here's a nifty [cheatsheet](https://picoctf.com/learning_guides/Book-2-Cryptography.pdf) for everything you need to understand at the very least in cryptography. If you're still here looking for a resource, take a look at the prerequisites in the main readme!

## Reverse Engineering
## 3. Specializations

### **Computer Forensics**
- **What is Computer Forensics?**: [Open University](https://www.open.edu/openlearn/science-maths-technology/digital-forensics/content-section-0?intro=1)
- **File Handling**:
- [File Systems Basics](https://www.ufsexplorer.com/articles/file-systems-basics.php)
- [Detailed File Extensions List](https://www.online-convert.com/file-type)
- [File Signatures: Magic Bytes](https://blog.netspi.com/magic-bytes-identifying-common-file-formats-at-a-glance/)
- [Understanding Metadata](https://resources.infosecinstitute.com/metadata-and-information-security/#gref)
- **Memory Forensics**:
- [Introduction to Memory Analysis](https://forensicswiki.org/wiki/Memory_analysis)
- [Volatility Memory Forensics Tool](https://resources.infosecinstitute.com/memory-forensics-and-analysis-using-volatility/#gref)
- **Network Analysis**:
- [Burp Suite Playlist](https://www.youtube.com/playlist?list=PLWPirh4EWFpEiXbu4JgQG0KoX6-MU8FbT)
- [Wireshark User Guide](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html)
- **Steganography**: [Overview & Tutorial](https://www.edureka.co/blog/steganography-tutorial)

### **Reverse engineering**:
[What is Reverse Engineering?](https://www.geeksforgeeks.org/software-engineering-reverse-engineering/)

* A crash-course/cheatsheet on [Assembly Languages and Code](https://www.tutorialspoint.com/assembly_programming/assembly_quick_guide.htm)
* Using [IDA](https://www.hex-rays.com/products/ida/support/idadoc/) for Disassembly and Decompiling
* Debugging using [GDB](https://betterexplained.com/articles/debugging-with-gdb/)

## Web Exploitation and Scraping
Here's a [CTF-themed overview](https://ctf101.org/binary-exploitation/overview/) of Binary Exploitation and all it's concepts. Being a very vast and vaguely defined topic, it is essential to know the techniques and tools before the theory to properly form an outlook. Don't be scared if you can't do this, it's one of the most difficult yet the most sought-after expertise in Cyber Security!

* [CyberYeti YouTube Playlists](https://www.youtube.com/@jstrosch/playlists)
* How to setup a [Malware analysis Lab environment](https://systemweakness.com/building-a-secure-malware-analysis-lab-from-scratch-a-step-by-step-guide-2cbf15ba7c2c) for malware analysis
* Practical binary analysis [book](https://nostarch.com/binaryanalysis)
* Primer to malware analysis [book](https://nostarch.com/malware)

### **Cryptography**
Here's a nifty [cheatsheet](https://picoctf.com/learning_guides/Book-2-Cryptography.pdf) for everything you need to understand at the very least in cryptography. If you're still here looking for a resource, take a look at the prerequisites in the main readme!

### **Web Exploitation & Scraping**
[What counts as Web Exploitation?](https://www.valencynetworks.com/blogs/cyber-attacks-explained-web-exploitation/)

* What is [SQL Injection](https://www.w3schools.com/sql/sql_injection.asp) and how to use [SQLMap](https://github.com/sqlmapproject/sqlmap/wiki)
Expand All @@ -48,14 +75,21 @@ Here's a nifty [cheatsheet](https://picoctf.com/learning_guides/Book-2-Cryptogra
* Forcing out hidden directories using [DirBuster](https://www.hackingarticles.in/comprehensive-guide-on-dirbuster-tool/)
* Learn [PHP](https://www.w3schools.com/php/) and [JSON](https://www.tutorialspoint.com/json/index.htm)
* Hands-on Labs on [Portswigger](https://portswigger.net/web-security)
* [PortSwigger Labs](https://portswigger.net/)
* [HackTheBox Free Labs](https://www.hackthebox.com/)

## Binary Exploitation

Here's a [CTF-themed overview](https://ctf101.org/binary-exploitation/overview/) of Binary Exploitation and all it's concepts. Being a very vast and vaguely defined topic, it is essential to know the techniques and tools before the theory to properly form an outlook. Don't be scared if you can't do this, it's one of the most difficult yet the most sought-after expertise in Cyber Security!
## 4. Preparing for Interviews
- [Cybersecurity Interview Guide (PDF)](https://cdn.ttgtmedia.com/rms/pdf/bookshelf_hack_the_cybersecurity_interview_excerpt.pdf)

## Malware Analysis
[What is Malware Analysis?](https://www.crowdstrike.com/cybersecurity-101/malware/malware-analysis/)
## 4.B Capture The Flags
But what is a [CTF](https://www.geeksforgeeks.org/what-is-ctfs-capture-the-flag/)?
- [Learn how CTFs work](https://www.root-me.org)
- [live CTFs](https://ctftime.org/)

## 4.A Certifications
- [eJPT: Red Team, Entry-level](https://security.ine.com/certifications/ejpt-certification/)
- [Comptia CySA+: Blue Team, Intermediate-Level](https://partners.comptia.org/certifications/cybersecurity-analyst)
- Any Cloud Certification: Foundational + Associate level (AWS/GCP/Azure)
- [Practice Cloud pentesting](https://pwnedlabs.io/)

* How to setup a [Lab environment](https://systemweakness.com/building-a-secure-malware-analysis-lab-from-scratch-a-step-by-step-guide-2cbf15ba7c2c) for malware analysis
* Practical binary analysis [book](https://nostarch.com/binaryanalysis)
* Primer to malware analysis [book](https://nostarch.com/malware)