Hide menu

TDDE61 Ethical hacking

Resources

This list is based on the corresponding reading list from the KTH course. The list is still being curated.

Ethics and the Law

Legal and policy information

Ethical guidelines

Basics

Getting started with hacking

Out of the vast amount of hacking-related tools available, there are a select few that will be useful throughout most of the course. These tools are:

 

Course setup

 

TryHackMe Rooms

TryHackMe offers many high-quality introductions to various hacking topics within their free tier. Below is a selection of topics that should serve as a good foundation for the hacking project in this course.

 

Networking basics

 

Web basics

 

Linux essentials

 

 

Windows

Linux cheat sheet

Getting help

  • whatis - Display a brief description of a command.
  • man <command> - Open the manual.
  • <command> -h; <command> --help - The help parameters for most commands.

 

  • File System Hierarchy (FHS)
  • cd - Change directory.
  • ls - List contents.
  • pwd - Print current path.
  • find - Search through the system.
  • clear - Clears the screen. Ctrl + L
  • pushd, popd - Temporary relocation to a directory and return.

 

Viewing data

  • cat - Dump content to terminal.
  • head - Read start.
  • tail - Read end.
  • less - Progresare interrupts. Ctrl + c = interrupt.
  • kill - Send signals to processes. Uses PID.
  • pgrep/pkill - Find and signal based on process names.

Service management

 

Multi-tasking

 

Package management

  • which - Where a "command" is installed.
  • whereis - More detailed package search.
  • APT - Managing and installing software.
  • DPKG - Debian Package Manager.
  • Package management cheat sheet - Many commands + translations across distributions. Kali uses apt.

 

Text editors

  • Nano - Simple and straightforward. Shortcuts and Ctrl + <key>.
  • Gedit - Graphical editor, similar to typical notepad software.
  • Emacs - For those who don't like Vi/Vim.
  • Vi/Vim - For those who don't like Emacs. Often installed by default.
  • The Vi/Vim v. Emacs war

Ethical hacking and penetration testing

Binary exploitation and reversing

Brute forcing and dictionary attacks

Cloud Computing

Encoding and Encryption

Networking

Vulnerability identification and exploitation

Web applications and web hacking

General hacking and security

Forums

Bug bounties

PodCasts

General knowledge