*** As I’m sure you’re all aware, there are white hat, gray hat and black hat hackers. The same tools are available to everybody. With that being said, the information and content available here is for educational purposes only. I have provided vulnerable machines that are intended for you to play around with, as well as tools to help you build your own lab. Never try to break or hack anything that you do not have express written permission for. Don’t jam yourself up when you’re just getting started. ***

Alternatively, you can downlad and install all of the Kali Linux security tools using Katoolin.

Resources

Hypervisors

Vulnerable VM’s

Tools

  • Qubes – OS focused on security
  • Tails – OS optimized for privacy
  • Whonix – OS with privacy and security in mind
  • Tor – Web browser designed for anonymity
  • pfSense – Open Sourced Firewall

YouTube

  • Black Hat – Keynotes from the top security conference
  • Defcon – Keynotes from the Defcon conferences
  • Hak5 – Home to Metasploit Minute & the Wifi Pineapple
  • Null Byte – Tutorials for ethical hackers & the InfoSec Community
  • HackerSploit Demonstrations, explanations and tutorials for white hat hackers
  • Commaai – Official channel of George Hotz’s Comma AI

Websites

  • Null Byte – News, content and tutorials for the InfoSec community
  • Black Room Security – Blog specializing in CTF’s
  • Dark Reading – Online community for security proffesionals
  • Cybrary – Free training for those interested in cybersecurity

 

The Rabbit Hole

What is TOR?

What is TOR?

The Onion Router (TOR) is a free and open-source network that allows users to do two things. First, is to browse the internet anonymously; second, is to access parts of the internet that aren't normally available. Developed by the U.S. Navy in the90s, the TOR Project...

read more
What is the OWASP Top 10 and Why Should I Care?

What is the OWASP Top 10 and Why Should I Care?

The OWASP Top 10 is a list of the most common web application security risks, as determined by the Open Web Application Security Project (OWASP). The list is updated every three to four years and is widely used as a reference by developers, security professionals, and...

read more

Interested in Digital Marketing, Finance, or Cybersecurity?

Subscribe to the Blog and Jump Down the Rabbit Hole with Me...

John Crowley

@CROWLEY_OFFCL

Digital Marketing /
Cybersecurity Consultant

Sacramento, CA

Howdy, I am an IT Consultant who specializes in SEO and Digital Marketing in the Sacramento, CA area. I am also very active in the Cybersecurity, InfoSec and Ethical Hacking Communities. Questions, comments or any projects that you would like to collaborate on? Feel free to reach out anytime.

Share This