World Of Hacking

Welcome to the world of Hacking / Cybersecurity! Here you can find various free resouces and tools related to cyber security!! Please stay tuned as I add additional content for the Hacking community. I will be making a CyberSecurity Forum for like minded community members :)

I am open to suggestions to make this better for everyone. Reach out to me on Twitter!

Links and Resources above

Click below to join the community :)

Common Cybersecurity Terminology

  1. Red Team - Offensive Team (Attackers)

  2. Blue Team- Defensive Team

  3. Black Hat - Red Team attackers that steal personal information and often sell it on the Dark Web. These are the bad guys (People often think of this kind when they hear HACKER I feel this is a stereotype)

  4. Grey Hat- Red Team attacker with no malicious intent however the acts they indulge in sometimes aren't always "legally consented" (No theft or major destruction)

  5. White Hat- Red or Blue Team with full authorization to carry out their attacks . Everything white hat hackers do is ethical.

  6. OSINT- Open Source Intelligence (Publicly availible information about a target.

  7. Exploit- Code that takes advantage of a vulnerability and enables access.

  8. Payload- Scripts used to interact with a exploited target.

  9. Reconnaissance- Information gathering stage (OSINT is usually used among other methods)

  10. DOS Denial of service- The act of flooding packets to a target and making connections slow or non existent.

  11. MITM Man in the middle- Traffic is routed from your device to the attacker and relayed to the destination.

  12. Social Engineering- The act of tricking the target into doing something they wouldn't normally do by gaining their trust.

  13. Clear Web- Sites indexed by google (Main Internet)

  14. .Onion - Dark Web links.

  15. TOR The onion router- Anomenity browser used for viewing .onion sites.

  16. Dark Web- Basically anything you cant find on the Clear Web is here, Often used for illegal stuff.

Q: How do I get started in cybersecurity as a beginner?

A: Start with the basics, DO NOT jump around, I have linked several free resources to get you started in the path. See my link of "Favorite Youtube channels" . Don't just settle on being able to fire off exploits, take time and understand HOW they do what they do.

Q: Do I have to be CERTIFIED to be a Hacker / Penetration tester?

A: No I have 0 Certifications, They look good on paper however everything I personally have learned has been self researched.

Looking for online anonymity? Tired of your online activities being tracked?

Go with a Reliable Trusted NO LOGS VPN! .. I use PureVPN. It is cross platform and easy to use !

VPNs have a lot of benefits they don't just secure you online. VPNs can be used for various reasons.

Bypass Geo-Blocked content on Netflix and Hulu EXPAND your possibilities. Not ALL VPN providers are capable of this.

Some streaming services can be cheaper in other countries ;) (hint hint)

My favorite feature of PureVPN is the Dedicated IP with Port Forwarding capability. (Think about the use cases for that)

CLICK HERE to give PureVPN a try! I signed up for the 2 year plan.