<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6697177630409920562</id><updated>2026-04-20T20:13:15.205-07:00</updated><category term="Security"/><category term="Linux"/><category term="Repair"/><category term="Website"/><category term="Android"/><category term="Privacy"/><category term="Windows"/><category term="Software"/><category term="Opinion"/><category term="uncategorized"/><category term="News"/><category term="Review"/><category term="Spyware"/><category term="Powershell"/><category term="Website Series"/><category term="PHP"/><category term="Parent"/><category term="Administration"/><category term="Kindle"/><category term="LDAP"/><category term="MySQL"/><category term="Splunk"/><category term="Video"/><title type='text'>Local Tech Repair</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>christmylord</name><uri>http://www.blogger.com/profile/05157416105455625273</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>198</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-5184577883963929675</id><published>2026-04-06T17:51:00.000-07:00</published><updated>2026-04-06T17:51:20.768-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Ransomware’s New Playbook: How Qilin and Warlock Are Systematically Killing EDR from the Kernel Up</title><content type='html'>It rarely starts with alarms. There’s no flashing warning, no obvious breach—just a valid login, often tied to a stolen credential, slipping quietly through the front door. From there, the attackers don’t rush. They don’t need to. In today’s ransomware landscape, groups like Qilin have learned that patience—and precision—delivers far greater impact than speed.&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--Popular posts-video--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;
What follows isn’t chaos. It’s preparation.&lt;br /&gt;&lt;br /&gt;

Inside compromised environments, Qilin operators begin mapping systems, expanding access, and positioning themselves deeper within the network. Days can pass—nearly a week on average—before anything resembling ransomware activity even begins. By then, the real work is already done. The attack isn’t about getting in anymore. It’s about making sure nothing can stop what comes next.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;The Moment Everything Goes Dark&lt;/h3&gt; At some point in that quiet window, a seemingly harmless file appears: &lt;code&gt;msimg32.dll&lt;/code&gt;. It doesn’t raise suspicion. It doesn’t need to. Loaded through DLL side-loading, it executes under the cover of a trusted application—exactly where defenders are least likely to look.&lt;br /&gt;&lt;br /&gt;

But this file isn’t just another payload. It’s the beginning of the end for the system’s defenses.&lt;br /&gt;&lt;br /&gt;

The DLL acts as a loader, carefully preparing the environment for a second, hidden component—encrypted, embedded, and designed for one purpose: to dismantle endpoint detection and response (EDR) protections from the inside out. Before it ever reveals that payload, it gets to work quietly stripping away visibility.&lt;br /&gt;&lt;br /&gt;

It disables user-mode hooks. It suppresses Event Tracing for Windows. It obscures how code executes and how APIs are called. By the time the real payload is ready to run, the system is still functioning—but it’s no longer watching.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;A Silent War at the Kernel Level&lt;/h3&gt; Then comes the shift that defines modern ransomware attacks.&lt;br /&gt;&lt;br /&gt;

Instead of fighting security tools, Qilin simply removes them.&lt;br /&gt;&lt;br /&gt;

Using a technique known as Bring Your Own Vulnerable Driver (BYOVD), the malware introduces legitimate—but exploitable—drivers into the system. One provides direct access to physical memory, effectively opening a path into the kernel. The other is far more targeted: it terminates processes tied to hundreds of EDR solutions across nearly every major vendor.&lt;br /&gt;&lt;br /&gt;

Before doing so, it quietly unregisters the monitoring callbacks those tools rely on. No alerts. No interference. Just silence.&lt;br /&gt;&lt;br /&gt;

At that point, the system hasn’t crashed. Nothing looks broken. But the security layer—the part designed to detect and stop threats—is gone.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHdyS1P77Ah9_kCqwv7sqXGkX8GKdpz_DE2mmQz-OGPaM-4qbhp0aS3J14MwbXi8sASF54gc2xcjiJW-XrUqAITEsFgINpZTU8WrMDWSdhNhbV-jr6EMGyyKQgGLWehQTHjAu3hggMzFDGC70A05DdacK8RtT87nQ7gfD9q39jXHMiZwhjTdsmaqQm7vv/s1000/talos.jpg&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;600&quot; data-original-height=&quot;590&quot; data-original-width=&quot;1000&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHdyS1P77Ah9_kCqwv7sqXGkX8GKdpz_DE2mmQz-OGPaM-4qbhp0aS3J14MwbXi8sASF54gc2xcjiJW-XrUqAITEsFgINpZTU8WrMDWSdhNhbV-jr6EMGyyKQgGLWehQTHjAu3hggMzFDGC70A05DdacK8RtT87nQ7gfD9q39jXHMiZwhjTdsmaqQm7vv/s600/talos.jpg&quot;/&gt;&lt;/a&gt;&lt;/div&gt;
  
  &lt;h3&gt;By the Time You Notice, It’s Over&lt;/h3&gt; Only after defenses are neutralized does the final stage begin.&lt;br /&gt;&lt;br /&gt;

Data is staged. Files are exfiltrated. Backups are identified—or destroyed. And then, when everything is in place, the ransomware executes.&lt;br /&gt;&lt;br /&gt;

For the victim, this is the first visible sign that anything is wrong. But in reality, the attack is already complete. The encryption is just the closing act.&lt;br /&gt;&lt;br /&gt;

Qilin’s rise reflects how effective this approach has become. In recent months, it has emerged as one of the most active ransomware groups globally, responsible for a significant share of attacks, including a notable concentration in Japan. Its success isn’t built on novel exploits—it’s built on discipline, timing, and the ability to quietly dismantle defenses before pulling the trigger.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;A Parallel Playbook: Warlock’s Expanding Arsenal&lt;/h3&gt; Qilin isn’t alone in this strategy.&lt;br /&gt;&lt;br /&gt;

The Warlock ransomware group has been following a similar path, targeting unpatched Microsoft SharePoint servers and refining its own approach to persistence and evasion. Like Qilin, it leans heavily on vulnerable drivers to disable security controls—but it doesn’t stop there.&lt;br /&gt;&lt;br /&gt;

Once inside a network, Warlock builds out a flexible toolkit designed to maintain control and move freely. Remote access tools establish persistence. Administrative utilities enable lateral movement. Legitimate platforms—developer tools, tunneling services—are repurposed to blend malicious activity into normal traffic.&lt;br /&gt;&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;PsExec is used to pivot between systems&lt;/li&gt; &lt;li&gt;RDP modifications allow multiple simultaneous sessions&lt;/li&gt; &lt;li&gt;Cloudflare tunnels and Visual Studio Code mask command-and-control traffic&lt;/li&gt; &lt;li&gt;Rclone facilitates quiet, efficient data exfiltration&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;&lt;br /&gt;
Even their choice of vulnerable drivers evolves, swapping components as needed to maintain effectiveness and avoid detection patterns. It’s not a static toolkit—it’s an adaptable framework.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;The Real Shift: Security Isn’t Being Bypassed—It’s Being Disabled&lt;/h3&gt; What ties these campaigns together is a fundamental shift in attacker mindset.&lt;br /&gt;&lt;br /&gt;

Traditional defenses were built on the assumption that threats would try to evade detection. But groups like Qilin and Warlock are proving that it’s often easier—and far more reliable—to simply remove detection entirely.&lt;br /&gt;&lt;br /&gt;

BYOVD attacks exploit a structural weakness: trusted drivers operating at the kernel level. Once abused, they provide a pathway to undermine the very tools designed to protect the system. And because those drivers are legitimate, they often slip past traditional controls without scrutiny.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;What Defenders Need to Do Differently&lt;/h3&gt; Stopping this kind of attack requires shifting focus earlier in the intrusion—before the EDR killer is deployed, before kernel access is achieved, before visibility is lost.&lt;br /&gt;&lt;br /&gt; &lt;ul&gt; &lt;li&gt;Restrict driver loading to explicitly trusted and verified publishers&lt;/li&gt; &lt;li&gt;Monitor for unusual driver installation or loading behavior&lt;/li&gt; &lt;li&gt;Maintain aggressive patching of driver-level vulnerabilities&lt;/li&gt; &lt;li&gt;Invest in kernel-level telemetry and integrity monitoring&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;&lt;br /&gt;
Because once that line is crossed—once attackers begin operating in the kernel—most traditional defenses are already out of the picture.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;Further Reading&lt;/h3&gt; &lt;ul&gt; &lt;li&gt;&lt;a href=&quot;https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools&lt;/a&gt; – A detailed breakdown of the BYOVD technique and EDR evasion methods used in recent campaigns&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://cyberwarzone.com/2025/10/27/qilin-ransomware-combines-linux-payload-with-byovd-exploit-in-hybrid-attack/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Qilin Ransomware Combines Linux Payload with BYOVD Exploit&lt;/a&gt; – Explores cross-platform deployment and how vulnerable drivers are integrated into the attack chain&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://blog.talosintelligence.com/qilin-edr-killer/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Qilin EDR killer infection chain&lt;/a&gt; – Insight into initial access, lateral movement, and persistence techniques&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://www.networkworld.com/article/2515594/cisco-talos-analyzes-attack-chains-network-ransomware-tactics.html&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Cisco Talos Analysis of Modern Ransomware Attack Chains&lt;/a&gt; – Breakdown of common kill chains and pre-encryption defense evasion&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://industrialcyber.co/ransomware/cisco-talos-identifies-surge-in-qilin-ransomware-attacks-with-manufacturing-sector-hit-hardest-in-2025/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Surge in Qilin Ransomware Activity&lt;/a&gt; – Overview of targeting trends and operational scale&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://www.security.com/blog-post/warlock-ransomware-origins&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Warlock Ransomware: Origins and Evolution&lt;/a&gt; – Background on tooling, evolution, and attack methodology&lt;/li&gt; &lt;/ul&gt; &lt;/span&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/5184577883963929675/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/04/ransomwares-new-playbook-how-qilin-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5184577883963929675'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5184577883963929675'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/04/ransomwares-new-playbook-how-qilin-and.html' title='Ransomware’s New Playbook: How Qilin and Warlock Are Systematically Killing EDR from the Kernel Up'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHdyS1P77Ah9_kCqwv7sqXGkX8GKdpz_DE2mmQz-OGPaM-4qbhp0aS3J14MwbXi8sASF54gc2xcjiJW-XrUqAITEsFgINpZTU8WrMDWSdhNhbV-jr6EMGyyKQgGLWehQTHjAu3hggMzFDGC70A05DdacK8RtT87nQ7gfD9q39jXHMiZwhjTdsmaqQm7vv/s72-c/talos.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-1458271135128670519</id><published>2026-04-05T15:51:00.000-07:00</published><updated>2026-04-05T15:51:15.864-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Europe Back in the Crosshairs: TA416 Revives PlugX Campaigns with OAuth Phishing Twist</title><content type='html'>After nearly two years of relative silence across the region, a China-aligned cyber espionage group has re-emerged with precision, patience, and a quietly evolving toolkit—once again setting its sights on European governments and diplomatic networks, but this time with more refined tradecraft, stealthier delivery chains, and a renewed focus shaped by global geopolitical tensions. 
&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--Popular posts-video--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;
&lt;br /&gt;
Security researchers at Proofpoint have attributed the activity to TA416, a threat cluster with deep historical ties to well-known espionage operations including DarkPeony, RedDelta, and Vertigo Panda—groups that, depending on who you ask, blur into the broader ecosystem often associated with Mustang Panda and its many aliases.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;🎯 A Quiet Return with Loud Intent&lt;/h3&gt; Since mid-2025, TA416 has resumed operations targeting **European Union and NATO-aligned diplomatic entities**, launching carefully orchestrated campaigns that combine reconnaissance and payload delivery in ways that feel both familiar and newly dangerous at the same time.&lt;br /&gt;&lt;br /&gt;

What makes this campaign particularly notable isn’t just who is being targeted—but how the attackers are adapting.&lt;br /&gt;&lt;br /&gt;

Across multiple waves, researchers observed a blend of:

&lt;ul&gt; &lt;li&gt;Web bug–driven reconnaissance&lt;/li&gt; &lt;li&gt;Malware delivery via cloud-hosted archives&lt;/li&gt; &lt;li&gt;Abuse of trusted identity infrastructure like OAuth&lt;/li&gt; &lt;/ul&gt;

…and perhaps most concerning, a willingness to continuously retool their infection chain mid-campaign, pivoting techniques just enough to stay ahead of detection while maintaining operational consistency.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;🕵️ Reconnaissance First: The Web Bug Resurgence&lt;/h3&gt; Before a single payload ever touches disk, TA416 is watching.&lt;br /&gt;&lt;br /&gt;

Using web bugs—tiny, invisible tracking pixels embedded in phishing emails—the group quietly gathers intelligence on targets, collecting IP addresses, user agents, and email open timestamps, effectively confirming whether a target is both valid and engaged, all without raising alarms.&lt;br /&gt;&lt;br /&gt;

It’s simple, low-noise, and highly effective.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;☁️ Living Off Trust: OAuth Abuse and Cloud Delivery&lt;/h3&gt; One of the more sophisticated pivots in this campaign involves abusing **Microsoft OAuth workflows**, a tactic that weaponizes trust itself.&lt;br /&gt;&lt;br /&gt;

Victims receive phishing emails containing links to legitimate Microsoft authorization endpoints. At a glance, everything appears normal—familiar domains, expected authentication prompts—but behind the scenes, the request triggers a redirect through a malicious chain, ultimately delivering a weaponized archive.&lt;br /&gt;&lt;br /&gt;

This technique, also highlighted in reporting from The Hacker News, allows attackers to:

&lt;ul&gt; &lt;li&gt;Bypass traditional email security filters&lt;/li&gt; &lt;li&gt;Evade browser-based phishing protections&lt;/li&gt; &lt;li&gt;Exploit implicit trust in Microsoft infrastructure&lt;/li&gt; &lt;/ul&gt;

And it works—because the initial interaction is, technically speaking, legitimate.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;🧬 Infection Chain Evolution: From Turnstile to MSBuild&lt;/h3&gt;  &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2OoWj33pDQTjOEOG62CG4nS0UXwwbj_QXLdRfqhqco1glti1xPAp4mRSj-_QllezbZ515h8ZUgdZ02LqPEevSaPxltKa8SY17n1vt84td2HWTGnDsQXTIA4RslPR1mh_xLBSSjk2eMWqzOX8OF3ym6UZPsLz1d-OOkBQb8kzeYCvqLwXBc3GE-K2I-uUZ/s1288/map.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;686&quot; data-original-width=&quot;1288&quot; height=&quot;341&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2OoWj33pDQTjOEOG62CG4nS0UXwwbj_QXLdRfqhqco1glti1xPAp4mRSj-_QllezbZ515h8ZUgdZ02LqPEevSaPxltKa8SY17n1vt84td2HWTGnDsQXTIA4RslPR1mh_xLBSSjk2eMWqzOX8OF3ym6UZPsLz1d-OOkBQb8kzeYCvqLwXBc3GE-K2I-uUZ/w640-h341/map.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;map from TheHackerNews {&lt;a href=&quot;https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;@&lt;/a&gt;}&lt;/span&gt;&lt;/div&gt;TA416 hasn’t relied on a single method for long.&lt;br /&gt;&lt;br /&gt;

Over the course of the campaign, researchers observed multiple delivery mechanisms, including:

&lt;ul&gt; &lt;li&gt;Fake &lt;b&gt;Cloudflare Turnstile&lt;/b&gt; verification pages&lt;/li&gt; &lt;li&gt;OAuth redirect chains&lt;/li&gt; &lt;li&gt;Malicious archives hosted on: &lt;ul&gt; &lt;li&gt;Microsoft Azure Blob Storage&lt;/li&gt; &lt;li&gt;Google Drive&lt;/li&gt; &lt;li&gt;Compromised SharePoint instances&lt;/li&gt; &lt;/ul&gt; &lt;/li&gt; &lt;/ul&gt;

But the most technically interesting evolution came in early 2026, when the group began leveraging MSBuild-based execution chains, a method that blends seamlessly into legitimate Windows development workflows.&lt;br /&gt;&lt;br /&gt;

Here’s where it gets clever—and a bit unsettling.&lt;br /&gt;&lt;br /&gt;

A downloaded archive contains:

&lt;ul&gt; &lt;li&gt;A legitimate Microsoft &lt;b&gt;MSBuild executable&lt;/b&gt;&lt;/li&gt; &lt;li&gt;A malicious &lt;b&gt;C# project file (CSPROJ)&lt;/b&gt;&lt;/li&gt; &lt;/ul&gt;

When executed, MSBuild automatically compiles the project file, which in this case acts as a loader, decoding embedded Base64 URLs, pulling down additional payload components, and executing them via a classic DLL side-loading chain.&lt;br /&gt;&lt;br /&gt;

It’s a layered approach that uses trusted binaries to execute malicious logic, making detection significantly more difficult.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;🧠 PlugX: The Persistent Backbone&lt;/h3&gt; At the center of it all remains **PlugX**, a long-standing remote access trojan that continues to anchor TA416’s operations.&lt;br /&gt;&lt;br /&gt;

Despite constant updates and variations, its core capabilities remain consistent:

&lt;ul&gt; &lt;li&gt;System reconnaissance&lt;/li&gt; &lt;li&gt;Payload delivery and execution&lt;/li&gt; &lt;li&gt;Command-and-control communication&lt;/li&gt; &lt;li&gt;Reverse shell access&lt;/li&gt; &lt;/ul&gt;

Once deployed, PlugX establishes encrypted communication with its C2 infrastructure—but not before performing anti-analysis checks designed to evade sandboxing and endpoint detection tools.&lt;br /&gt;&lt;br /&gt;

It’s not flashy malware—but it doesn’t need to be. It’s reliable, adaptable, and deeply embedded in this threat actor’s playbook.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;🌍 Expanding Scope: Middle East Enters the Picture&lt;/h3&gt; While Europe remains a primary focus, TA416 hasn’t limited its operations geographically.&lt;br /&gt;&lt;br /&gt;

Following the outbreak of tensions tied to the 2026 U.S.–Israel–Iran conflict, the group expanded its targeting to include Middle Eastern government entities, suggesting a broader intelligence-gathering objective aligned with real-world geopolitical developments.&lt;br /&gt;&lt;br /&gt;

This shift reinforces a pattern: TA416 doesn’t just operate opportunistically—it operates strategically.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;🔄 A Pattern of Adaptation&lt;/h3&gt; The bigger story here isn’t just about PlugX or phishing—it’s about **adaptation over time**.&lt;br /&gt;&lt;br /&gt;

TA416 has demonstrated a consistent ability to:

&lt;ul&gt; &lt;li&gt;Rotate infrastructure&lt;/li&gt; &lt;li&gt;Modify delivery chains&lt;/li&gt; &lt;li&gt;Blend into trusted ecosystems&lt;/li&gt; &lt;li&gt;Align targeting with geopolitical priorities&lt;/li&gt; &lt;/ul&gt;

And perhaps most tellingly, similar activity clusters linked to Chinese cyber operations have shown a willingness to maintain long-term persistence, in some cases reappearing in compromised environments hundreds of days after initial access, underscoring a level of patience that most defenders simply aren’t prepared for.&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;⚠️ Final Thoughts&lt;/h3&gt; TA416’s resurgence is less of a return and more of an evolution—a reminder that modern espionage campaigns aren’t static operations, but living systems that adapt, learn, and quietly refine themselves over time, often just out of reach of traditional defenses, and almost always aligned with something much larger happening on the global stage.&lt;br /&gt;&lt;br /&gt;

For defenders, the takeaway is clear:
&lt;b&gt;trust is now part of the attack surface&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;📚 Further Reading &amp; Related Research&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;a href=&quot;https://www.proofpoint.com/us/blog/threat-insight/id-come-running-back-eu-again-ta416-resumes-european-government-espionage&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; Proofpoint – TA416 Resumes European Government Espionage &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; The Hacker News – China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://www.infosecurity-magazine.com/news/china-hackers-ta416-europe/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; Infosecurity Magazine – Chinese Hackers Target European Governments in TA416 Campaign &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://www.darktrace.com/en/resources/research/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; Darktrace – Research on China-Linked Cyber Operations and Long-Term Persistence &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://attack.mitre.org/techniques/T1574/002/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; MITRE ATT&amp;CK – DLL Side-Loading (T1574.002) &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://attack.mitre.org/software/S0013/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; MITRE ATT&amp;CK – PlugX Malware Profile &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://learn.microsoft.com/en-us/entra/identity-platform/v2-oauth2-auth-code-flow&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; Microsoft – OAuth 2.0 Authorization Code Flow (Technical Documentation) &lt;/a&gt; &lt;/li&gt; &lt;li&gt; &lt;a href=&quot;https://arcticwolf.com/resources/blog/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt; Arctic Wolf – Threat Intelligence Blog (PlugX Campaign Coverage) &lt;/a&gt; &lt;/li&gt; &lt;/ul&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/1458271135128670519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/04/europe-back-in-crosshairs-ta416-revives.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/1458271135128670519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/1458271135128670519'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/04/europe-back-in-crosshairs-ta416-revives.html' title='Europe Back in the Crosshairs: TA416 Revives PlugX Campaigns with OAuth Phishing Twist'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2OoWj33pDQTjOEOG62CG4nS0UXwwbj_QXLdRfqhqco1glti1xPAp4mRSj-_QllezbZ515h8ZUgdZ02LqPEevSaPxltKa8SY17n1vt84td2HWTGnDsQXTIA4RslPR1mh_xLBSSjk2eMWqzOX8OF3ym6UZPsLz1d-OOkBQb8kzeYCvqLwXBc3GE-K2I-uUZ/s72-w640-h341-c/map.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-6686937944835159674</id><published>2026-03-31T11:04:00.000-07:00</published><updated>2026-03-31T11:04:45.474-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Axios Breach: Supply Chain Attack Delivers Cross-Platform RAT to Millions of Developers</title><content type='html'>A sophisticated supply chain attack targeting the widely used Axios npm package has introduced a cross-platform Remote Access Trojan (RAT) affecting Windows, macOS, and Linux systems. 
&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--Popular posts-video--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;

Malicious versions 1.14.1 and 0.30.4 were published using a compromised maintainer account, injecting a hidden dependency designed solely to execute a post-install malware dropper.

&lt;br /&gt;&lt;br /&gt;

Developers are urged to immediately downgrade, remove affected dependencies, and rotate credentials if exposure is suspected.

&lt;br /&gt;

&lt;h3&gt;A Trusted Library Turned Threat Vector&lt;/h3&gt; &lt;br /&gt;

In one of the most impactful npm ecosystem attacks of 2026, threat actors successfully compromised the supply chain of Axios—a library with over 80 million weekly downloads across modern web applications.

&lt;br /&gt;&lt;br /&gt;

Rather than modifying Axios directly, attackers took a more evasive route: injecting a malicious dependency named plain-crypto-js@4.2.1 into two newly published versions.

&lt;br /&gt;&lt;br /&gt;

This dependency was never meant to be used in code. Its sole purpose was to execute a hidden postinstall script, silently deploying malware during package installation.

&lt;br /&gt;

&lt;h3&gt;How the Attack Worked&lt;/h3&gt; &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWy-ewEkydD3YitsipeaJY3vYVR3rs4Rj5rHzsv1etRhKphO3vnoNb3YM_AEcDE9Wt4IsotXNGYpfT-i7aasNK6a4XzaTG2iGIqwOpvboBsDnD5GGKlq8E9b9BFwjlbyN3J-9552J6r82_VDLjeeCOOcvd1SR2rw640u35ZRKrB1eFAy0sX-E9jTJc0pBS/s1211/works.jpg&quot; style=&quot;display: block; padding: 1em 0; text-align: center; &quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; width=&quot;400&quot; data-original-height=&quot;1056&quot; data-original-width=&quot;1211&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWy-ewEkydD3YitsipeaJY3vYVR3rs4Rj5rHzsv1etRhKphO3vnoNb3YM_AEcDE9Wt4IsotXNGYpfT-i7aasNK6a4XzaTG2iGIqwOpvboBsDnD5GGKlq8E9b9BFwjlbyN3J-9552J6r82_VDLjeeCOOcvd1SR2rw640u35ZRKrB1eFAy0sX-E9jTJc0pBS/s400/works.jpg&quot;/&gt;&lt;/a&gt;
  image from &lt;a href=&quot;https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html&quot;&gt;TheHackerNews.com&lt;/a&gt;&lt;/div&gt;
The compromise began with the takeover of an npm maintainer account, allowing attackers to bypass CI/CD safeguards and publish malicious releases.

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;Compromised npm account used to publish malicious Axios versions&lt;/li&gt; &lt;li&gt;Injected dependency: &lt;b&gt;plain-crypto-js@4.2.1&lt;/b&gt;&lt;/li&gt; &lt;li&gt;Malware triggered automatically via npm &lt;b&gt;postinstall&lt;/b&gt; hook&lt;/li&gt; &lt;li&gt;No malicious code present in Axios source itself&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

This technique made detection extremely difficult, as traditional code reviews showed no suspicious changes in Axios.

&lt;br /&gt;

&lt;h3&gt;Cross-Platform RAT Deployment&lt;/h3&gt; &lt;br /&gt;

Once executed, the malicious installer deployed a sophisticated cross-platform Remote Access Trojan (RAT) tailored to the host operating system.

&lt;br /&gt;

  &lt;h3&gt;Attack Flow Overview&lt;/h3&gt;
&lt;p&gt;&lt;i&gt;Image Attribution: Conceptual supply chain attack flow diagrams. Source: Various security research reports. Adapted from public analyses.&lt;/i&gt;&lt;/p&gt;

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;&lt;b&gt;macOS:&lt;/b&gt; Downloads and executes a C++ RAT via AppleScript from a remote server&lt;/li&gt; &lt;li&gt;&lt;b&gt;Windows:&lt;/b&gt; Uses PowerShell and VBScript to deploy a persistent RAT disguised as system binaries&lt;/li&gt; &lt;li&gt;&lt;b&gt;Linux:&lt;/b&gt; Executes a Python-based RAT via shell commands running in the background&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

Each variant communicates with the same command-and-control (C2) infrastructure, using tailored payload delivery mechanisms per platform.

&lt;br /&gt;

&lt;h3&gt;Stealth and Evasion Techniques&lt;/h3&gt; &lt;br /&gt;

The attackers demonstrated a high level of operational maturity, implementing multiple anti-forensics techniques:

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;Self-deleting malware after execution&lt;/li&gt; &lt;li&gt;Replacement of &lt;code&gt;package.json&lt;/code&gt; to remove evidence&lt;/li&gt; &lt;li&gt;Use of a clean decoy manifest (&lt;code&gt;package.md&lt;/code&gt;)&lt;/li&gt; &lt;li&gt;No persistence on macOS/Linux (suggesting rapid data exfiltration)&lt;/li&gt; &lt;li&gt;Registry-based persistence on Windows systems&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

Notably, the malware maintained a 60-second beacon loop, enabling continuous command execution and system monitoring.

&lt;br /&gt;

&lt;h3&gt;Timeline of the Attack&lt;/h3&gt; &lt;br /&gt;

The operation was carefully staged and executed within hours:

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;&lt;b&gt;March 30, 2026:&lt;/b&gt; Clean dependency version (4.2.0) published&lt;/li&gt; &lt;li&gt;&lt;b&gt;March 30, 2026 (later):&lt;/b&gt; Malicious version (4.2.1) released&lt;/li&gt; &lt;li&gt;&lt;b&gt;March 31, 2026:&lt;/b&gt; Axios versions 1.14.1 and 0.30.4 published with injected dependency&lt;/li&gt; &lt;li&gt;&lt;b&gt;Within ~39 minutes:&lt;/b&gt; Both release branches compromised&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

Security researchers emphasized that this was a highly coordinated attack, not opportunistic in nature.

&lt;br /&gt;&lt;br /&gt;

&lt;h3&gt;Indicators of Compromise (IOCs)&lt;/h3&gt; &lt;br /&gt;

Developers and security teams should immediately check for the following artifacts:

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;&lt;b&gt;macOS:&lt;/b&gt; /Library/Caches/com.apple.act.mond&lt;/li&gt; &lt;li&gt;&lt;b&gt;Windows:&lt;/b&gt; %PROGRAMDATA%\wt.exe&lt;/li&gt; &lt;li&gt;&lt;b&gt;Linux:&lt;/b&gt; /tmp/ld.py&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

Additionally, any presence of plain-crypto-js@4.2.1 should be treated as a strong indicator of compromise.

&lt;br /&gt;

&lt;h3&gt;Response and Mitigation&lt;/h3&gt; &lt;br /&gt;

If your environment may be affected, take immediate action:

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;Downgrade Axios to &lt;b&gt;1.14.0&lt;/b&gt; or &lt;b&gt;0.30.3&lt;/b&gt;&lt;/li&gt; &lt;li&gt;Remove &lt;b&gt;plain-crypto-js&lt;/b&gt; from dependencies&lt;/li&gt; &lt;li&gt;Rotate all credentials and secrets&lt;/li&gt; &lt;li&gt;Audit CI/CD pipelines for exposure&lt;/li&gt; &lt;li&gt;Block outbound traffic to the malicious C2 domain&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

Organizations should assume full system compromise if RAT artifacts are detected.

&lt;br /&gt;

&lt;h3&gt;Why This Attack Matters&lt;/h3&gt; &lt;br /&gt;

This incident highlights a dangerous evolution in supply chain attacks:

&lt;br /&gt;

&lt;ul&gt; &lt;li&gt;Abuse of trusted ecosystems like npm&lt;/li&gt; &lt;li&gt;Malware hidden in transitive dependencies&lt;/li&gt; &lt;li&gt;Execution triggered automatically during install&lt;/li&gt; &lt;li&gt;Cross-platform targeting at scale&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;

Most importantly, it reinforces a critical lesson:

&lt;br /&gt;&lt;br /&gt;

&lt;b&gt;Even the most trusted dependencies can become attack vectors overnight.&lt;/b&gt;

&lt;br /&gt;
&lt;h3&gt;Final Thoughts&lt;/h3&gt; &lt;br /&gt;

The Axios supply chain attack is a stark reminder that modern software development pipelines are only as secure as their weakest dependency.

&lt;br /&gt;&lt;br /&gt;

With attackers increasingly targeting package registries and CI/CD workflows, organizations must adopt stricter controls, including dependency auditing, runtime monitoring, and zero-trust principles within development environments.

&lt;br /&gt;&lt;br /&gt;

As supply chain threats continue to evolve, vigilance—not trust—must become the default.

&lt;br /&gt;
  &lt;h3&gt;Additional Information &amp; Further Reading&lt;/h3&gt; &lt;br /&gt; &lt;ul&gt; &lt;li&gt;&lt;a href=&quot;https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html&quot; target=&quot;_blank&quot;&gt;The Hacker News – Axios Supply Chain Attack&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan&quot; target=&quot;_blank&quot;&gt;StepSecurity – Technical Analysis&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all&quot; target=&quot;_blank&quot;&gt;Elastic Security Labs – Deep Dive&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://socket.dev/blog/axios-npm-package-compromised&quot; target=&quot;_blank&quot;&gt;Socket.dev – Dependency Injection Breakdown&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package&quot; target=&quot;_blank&quot;&gt;Huntress – Incident Response Insights&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt;

&lt;br /&gt;&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/6686937944835159674/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/axios-breach-supply-chain-attack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6686937944835159674'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6686937944835159674'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/axios-breach-supply-chain-attack.html' title='Axios Breach: Supply Chain Attack Delivers Cross-Platform RAT to Millions of Developers'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWy-ewEkydD3YitsipeaJY3vYVR3rs4Rj5rHzsv1etRhKphO3vnoNb3YM_AEcDE9Wt4IsotXNGYpfT-i7aasNK6a4XzaTG2iGIqwOpvboBsDnD5GGKlq8E9b9BFwjlbyN3J-9552J6r82_VDLjeeCOOcvd1SR2rw640u35ZRKrB1eFAy0sX-E9jTJc0pBS/s72-c/works.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-7621036010758913794</id><published>2026-03-30T19:42:00.000-07:00</published><updated>2026-03-30T19:42:03.315-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>ClickFix Campaign Delivers Stealthy “DeepLoad” Malware to Hijack Browser Sessions</title><content type='html'>A newly uncovered cyber campaign is drawing attention across the security community for its effective blend of social engineering, fileless execution, and stealth persistence. Researchers at ReliaQuest have identified a previously undocumented malware loader, dubbed DeepLoad, that is being distributed via the increasingly popular “ClickFix” tactic—an approach that relies on user interaction rather than software exploits to gain initial access. 
&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--Popular posts-video--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;
  &lt;br /&gt;&lt;br /&gt;
The attack begins with a deceptive prompt that convinces users to copy and paste a malicious command into the Windows Run dialog, often under the pretense of fixing a system issue or completing a verification step. Once executed, the command launches PowerShell, which in turn leverages the legitimate Windows utility mshta.exe to retrieve and run an obfuscated payload. This technique allows attackers to bypass many traditional security controls by relying entirely on trusted system tools and user-initiated actions.&lt;br /&gt;&lt;br /&gt;

At the core of the campaign is DeepLoad’s sophisticated loader, which conceals its true purpose beneath layers of meaningless code and randomized variables. According to researchers, this obfuscation is likely generated with the assistance of artificial intelligence, enabling attackers to rapidly produce unique variants that are difficult for static detection engines to identify. Rather than dropping obvious malicious files to disk, the malware dynamically compiles components in memory using PowerShell’s Add-Type feature, creating temporary DLLs with randomized names that evade file-based detection.&lt;br /&gt;&lt;br /&gt;

Once active, DeepLoad takes deliberate steps to blend into the operating system. It disguises its activity within legitimate processes such as LockAppHost.exe, disables PowerShell command history to remove forensic evidence, and interacts directly with native Windows APIs instead of relying on monitored scripting functions. To further obscure its presence, the malware employs asynchronous procedure call (APC) injection, launching a trusted process in a suspended state, injecting malicious code into its memory, and then resuming execution—ensuring that no decoded payload is ever written to disk.&lt;br /&gt;&lt;br /&gt;

The ultimate objective of the campaign is credential theft, but the methods employed go beyond traditional password dumping. DeepLoad extracts stored browser credentials while also deploying a malicious browser extension capable of intercepting login data in real time. This allows attackers to capture active session information, significantly increasing the likelihood of successful account compromise even in environments with stronger authentication controls.&lt;br /&gt;&lt;br /&gt;

Persistence is another area where DeepLoad distinguishes itself. The malware leverages Windows Management Instrumentation (WMI) to establish covert event subscriptions that can silently re-execute the attack chain long after the initial infection. In observed cases, systems that appeared to be remediated were reinfected days later without any additional user interaction, highlighting the resilience of this approach and its ability to evade conventional detection mechanisms.&lt;br /&gt;&lt;br /&gt;

Adding to the threat, DeepLoad includes propagation capabilities that enable it to spread via removable media. When a USB device is connected, the malware copies itself using deceptive file names such as “ChromeSetup.lnk” or “Firefox Installer.lnk,” increasing the likelihood that unsuspecting users will execute the malicious payload on other systems.&lt;br /&gt;&lt;br /&gt;

The discovery of DeepLoad comes amid a broader wave of increasingly sophisticated malware loaders. Researchers have also pointed to emerging threats like Kiss Loader, which uses layered scripting techniques and cloud-hosted payload delivery to deploy remote access trojans. Together, these campaigns reflect a growing trend toward modular, multi-stage malware that relies heavily on legitimate tools, obfuscation, and user interaction to evade detection.&lt;br /&gt;&lt;br /&gt;

Security experts warn that DeepLoad exemplifies a shift in attacker strategy. Rather than exploiting software vulnerabilities, threat actors are focusing on manipulating users, blending malicious activity with normal system behavior, and maintaining long-term access through stealthy persistence mechanisms. As a result, traditional defenses that rely on signatures or known indicators are becoming less effective, underscoring the need for behavioral monitoring and deeper visibility into system activity.&lt;br /&gt;&lt;br /&gt;

In this evolving threat landscape, campaigns like DeepLoad demonstrate that the most effective attacks may no longer depend on sophisticated exploits, but instead on subtle deception and the abuse of trusted technologies already present within the operating system.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;
 &lt;h3 data-end=&quot;276&quot; data-section-id=&quot;13munc1&quot; data-start=&quot;235&quot;&gt;&lt;span role=&quot;text&quot;&gt;&lt;strong data-end=&quot;276&quot; data-start=&quot;239&quot;&gt;What Organizations Should Do Next&lt;/strong&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p data-end=&quot;476&quot; data-start=&quot;278&quot;&gt;Defending against campaigns like DeepLoad requires shifting focus from traditional signatures to &lt;strong data-end=&quot;419&quot; data-start=&quot;375&quot;&gt;behavioral visibility and user awareness&lt;/strong&gt;. Security teams should prioritize the following actions:&lt;/p&gt;
&lt;ul data-end=&quot;1603&quot; data-start=&quot;478&quot;&gt;&lt;li data-end=&quot;618&quot; data-section-id=&quot;144dfi4&quot; data-start=&quot;478&quot;&gt;
&lt;strong data-end=&quot;509&quot; data-start=&quot;480&quot;&gt;Restrict PowerShell abuse&lt;/strong&gt;
&lt;ul data-end=&quot;618&quot; data-start=&quot;512&quot;&gt;&lt;li data-end=&quot;561&quot; data-section-id=&quot;f0ofjd&quot; data-start=&quot;512&quot;&gt;
Enable script block logging and transcription
&lt;/li&gt;&lt;li data-end=&quot;618&quot; data-section-id=&quot;r1g468&quot; data-start=&quot;564&quot;&gt;
Constrain or disable PowerShell where not required
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li data-end=&quot;796&quot; data-section-id=&quot;19squ31&quot; data-start=&quot;620&quot;&gt;
&lt;strong data-end=&quot;653&quot; data-start=&quot;622&quot;&gt;Monitor for LOLBin activity&lt;/strong&gt;
&lt;ul data-end=&quot;796&quot; data-start=&quot;656&quot;&gt;&lt;li data-end=&quot;738&quot; data-section-id=&quot;1alj2ir&quot; data-start=&quot;656&quot;&gt;
Alert on suspicious use of &lt;code data-end=&quot;696&quot; data-start=&quot;685&quot;&gt;mshta.exe&lt;/code&gt;, &lt;code data-end=&quot;714&quot; data-start=&quot;698&quot;&gt;powershell.exe&lt;/code&gt;, and similar binaries
&lt;/li&gt;&lt;li data-end=&quot;796&quot; data-section-id=&quot;10h8cwm&quot; data-start=&quot;741&quot;&gt;
Look for unusual parent-child process relationships
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li data-end=&quot;950&quot; data-section-id=&quot;zkq7mz&quot; data-start=&quot;798&quot;&gt;
&lt;strong data-end=&quot;836&quot; data-start=&quot;800&quot;&gt;Audit and detect WMI persistence&lt;/strong&gt;
&lt;ul data-end=&quot;950&quot; data-start=&quot;839&quot;&gt;&lt;li data-end=&quot;883&quot; data-section-id=&quot;1lgwhxu&quot; data-start=&quot;839&quot;&gt;
Regularly review WMI event subscriptions
&lt;/li&gt;&lt;li data-end=&quot;950&quot; data-section-id=&quot;2b9fbo&quot; data-start=&quot;886&quot;&gt;
Alert on newly created or modified WMI consumers and filters
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li data-end=&quot;1098&quot; data-section-id=&quot;1lg2de3&quot; data-start=&quot;952&quot;&gt;
&lt;strong data-end=&quot;981&quot; data-start=&quot;954&quot;&gt;Harden browser security&lt;/strong&gt;
&lt;ul data-end=&quot;1098&quot; data-start=&quot;984&quot;&gt;&lt;li data-end=&quot;1028&quot; data-section-id=&quot;1ymrc6m&quot; data-start=&quot;984&quot;&gt;
Restrict unauthorized browser extensions
&lt;/li&gt;&lt;li data-end=&quot;1098&quot; data-section-id=&quot;1poom9v&quot; data-start=&quot;1031&quot;&gt;
Monitor for unexpected extension installations across endpoints
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li data-end=&quot;1277&quot; data-section-id=&quot;yp6drn&quot; data-start=&quot;1100&quot;&gt;
&lt;strong data-end=&quot;1133&quot; data-start=&quot;1102&quot;&gt;Improve endpoint visibility&lt;/strong&gt;
&lt;ul data-end=&quot;1277&quot; data-start=&quot;1136&quot;&gt;&lt;li data-end=&quot;1211&quot; data-section-id=&quot;12433pq&quot; data-start=&quot;1136&quot;&gt;
Ensure EDR solutions track in-memory execution and injection techniques
&lt;/li&gt;&lt;li data-end=&quot;1277&quot; data-section-id=&quot;16d8ezu&quot; data-start=&quot;1214&quot;&gt;
Watch for signs of APC injection and reflective DLL loading
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li data-end=&quot;1418&quot; data-section-id=&quot;1yzmre6&quot; data-start=&quot;1279&quot;&gt;
&lt;strong data-end=&quot;1314&quot; data-start=&quot;1281&quot;&gt;Control removable media risks&lt;/strong&gt;
&lt;ul data-end=&quot;1418&quot; data-start=&quot;1317&quot;&gt;&lt;li data-end=&quot;1362&quot; data-section-id=&quot;6502o5&quot; data-start=&quot;1317&quot;&gt;
Disable or limit USB usage where possible
&lt;/li&gt;&lt;li data-end=&quot;1418&quot; data-section-id=&quot;1yqew8p&quot; data-start=&quot;1365&quot;&gt;
Scan and block suspicious shortcut (&lt;code data-end=&quot;1409&quot; data-start=&quot;1403&quot;&gt;.lnk&lt;/code&gt;) files
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li data-end=&quot;1603&quot; data-section-id=&quot;1ls9gng&quot; data-start=&quot;1420&quot;&gt;
&lt;strong data-end=&quot;1450&quot; data-start=&quot;1422&quot;&gt;Invest in user awareness&lt;/strong&gt;
&lt;ul data-end=&quot;1603&quot; data-start=&quot;1453&quot;&gt;&lt;li data-end=&quot;1517&quot; data-section-id=&quot;gscmwo&quot; data-start=&quot;1453&quot;&gt;
Train users to avoid running commands from untrusted prompts
&lt;/li&gt;&lt;li data-end=&quot;1603&quot; data-section-id=&quot;sdua6q&quot; data-start=&quot;1520&quot;&gt;
Reinforce that legitimate fixes never require copying commands into Run dialogs
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p data-end=&quot;1982&quot; data-start=&quot;1633&quot;&gt;As attackers continue to refine techniques like ClickFix and fileless execution, the line between legitimate system activity and malicious behavior is becoming increasingly blurred. Organizations that rely solely on prevention will struggle—those that invest in &lt;strong data-end=&quot;1940&quot; data-start=&quot;1895&quot;&gt;visibility, detection, and user education&lt;/strong&gt; will be far better positioned to respond.&lt;/p&gt;&lt;br /&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/7621036010758913794/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/clickfix-campaign-delivers-stealthy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7621036010758913794'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7621036010758913794'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/clickfix-campaign-delivers-stealthy.html' title='ClickFix Campaign Delivers Stealthy “DeepLoad” Malware to Hijack Browser Sessions'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-2845169389213941408</id><published>2026-03-29T17:15:00.000-07:00</published><updated>2026-03-29T17:15:34.812-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Website"/><title type='text'>AdNauseam: The Ad Blocker That Fights Back</title><content type='html'>
In a web built on tracking, profiling, and behavioral data, most privacy tools play defense—blocking ads, limiting trackers, and trying to stay invisible. &lt;strong&gt;AdNauseam&lt;/strong&gt; takes a far more aggressive stance. It doesn’t just avoid the system—it actively disrupts it.
&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px;margin-top: -20px; position: relative; width: 300px;&quot;&gt;
&lt;script async src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!-- Popular posts-video --&gt;
&lt;ins class=&quot;adsbygoogle&quot;
     style=&quot;display:inline-block;width:300px;height:250px&quot;
     data-ad-client=&quot;ca-pub-6820545514881433&quot;
     data-ad-slot=&quot;2718283960&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;
&lt;br /&gt;
Instead of simply hiding ads, AdNauseam quietly clicks them in the background, feeding ad networks a stream of misleading signals. The result is a browsing profile that looks active but means nothing—a deliberate act of data pollution in a system that depends on accuracy.

&lt;br /&gt;
&lt;h3&gt;A Radical Idea with Deep Roots&lt;/h3&gt;

Launched in 2014, AdNauseam emerged from research into “obfuscation”—the idea that privacy doesn’t always mean hiding, but sometimes means blending in with noise.
&lt;br /&gt;&lt;br /&gt;
It builds on earlier projects like &lt;strong&gt;TrackMeNot&lt;/strong&gt;, which generated random search queries to confuse tracking systems. AdNauseam takes that same concept and applies it directly to online advertising—arguably the most data-driven part of the modern web.
&lt;br /&gt;&lt;br /&gt;
From the beginning, it wasn’t just a tool. It was a statement about who controls user data—and how easily that control can be challenged.

&lt;br /&gt;&lt;br /&gt;
&lt;h3&gt;How It Works&lt;/h3&gt;

On the surface, AdNauseam behaves like a traditional ad blocker. Underneath, it does something very different:
&lt;br /&gt;
&lt;ul&gt;
  &lt;li&gt;Ads are blocked from view&lt;/li&gt;
  &lt;li&gt;Clicks are automatically generated in the background&lt;/li&gt;
  &lt;li&gt;Tracking systems record those clicks as legitimate engagement&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
This breaks a core assumption in advertising technology: that clicks represent real human intent.
&lt;br /&gt;&lt;br /&gt;
Instead, AdNauseam turns that signal into noise—making it harder for platforms to build accurate behavioral profiles or optimize targeting algorithms.

&lt;br /&gt;&lt;br /&gt;
&lt;h3&gt;Collision with the Ad Industry&lt;/h3&gt;

That approach has put AdNauseam on a direct collision course with the ad ecosystem. In 2017, &lt;strong&gt;Google&lt;/strong&gt; removed the extension from the Chrome Web Store, citing policy violations.
&lt;br /&gt;&lt;br /&gt;
The underlying issue is easy to understand. AdNauseam interferes with systems like &lt;strong&gt;Google AdSense&lt;/strong&gt;, where advertisers pay per click and rely on clean data to measure performance.
&lt;br /&gt;&lt;br /&gt;
By generating automated clicks, the extension introduces:
&lt;br /&gt;
&lt;ul&gt;
  &lt;li&gt;Distorted campaign metrics&lt;/li&gt;
  &lt;li&gt;Potential financial waste for advertisers&lt;/li&gt;
  &lt;li&gt;Uncertainty in platform reporting&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Whether that behavior is labeled as fraud or protest depends largely on perspective—but either way, it exposes how fragile the system can be.

&lt;br /&gt;&lt;br /&gt;
&lt;h3&gt;The Ethical Trade-Offs&lt;/h3&gt;

AdNauseam lives in a gray area that few tools dare to occupy.
&lt;br /&gt;&lt;br /&gt;
Supporters argue it’s a necessary response to a web built on surveillance:
&lt;br /&gt;
&lt;ul&gt;
  &lt;li&gt;It restores a degree of user control&lt;/li&gt;
  &lt;li&gt;It challenges opaque data collection practices&lt;/li&gt;
  &lt;li&gt;It turns passive browsing into active resistance&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Critics, however, point out real downsides:
&lt;br /&gt;
&lt;ul&gt;
  &lt;li&gt;It generates intentionally misleading data&lt;/li&gt;
  &lt;li&gt;It may impact smaller publishers relying on ad revenue&lt;/li&gt;
  &lt;li&gt;It risks violating platform terms and trust models&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
It’s not just a technical tool—it’s a philosophical one, forcing users to decide where they stand.
&lt;br /&gt;&lt;br /&gt;
&lt;h3&gt;Where It Stands Today&lt;/h3&gt;

AdNauseam remains available, but its reach is limited. It’s largely absent from mainstream browser ecosystems and exists primarily as a niche, open-source project.
&lt;br /&gt;&lt;br /&gt;
At the same time, broader changes—like stricter browser extension policies—are making tools like this harder to maintain and distribute.
&lt;br /&gt;&lt;br /&gt;
Still, it persists, supported by a small but committed community that sees value in its mission.

&lt;br /&gt;&lt;br /&gt;
&lt;h3&gt;Why It Still Matters&lt;/h3&gt;

Even without mass adoption, AdNauseam highlights a deeper truth about the modern web:
&lt;br /&gt;
&lt;ul&gt;
  &lt;li&gt;Advertising systems depend on data they assume is trustworthy&lt;/li&gt;
  &lt;li&gt;That trust can be undermined more easily than expected&lt;/li&gt;
  &lt;li&gt;Users are no longer limited to passive privacy defenses&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
It raises a simple but powerful question:
&lt;br /&gt;&lt;br /&gt;
&lt;strong&gt;What happens when users stop playing by the rules?&lt;/strong&gt;
&lt;br /&gt;&lt;br /&gt;
AdNauseam doesn’t just block ads—it challenges the foundation they’re built on.&lt;br&gt;&lt;br /&gt;
&lt;h3&gt;Try It Yourself&lt;/h3&gt;

Curious how it works in practice? You can learn more about AdNauseam and download it directly from the official site:
&lt;br /&gt;&lt;br /&gt;
&lt;a href=&quot;https://adnauseam.io/&quot; target=&quot;_blank&quot;&gt;https://adnauseam.io/&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;
Whether you see it as a privacy tool, an experiment, or a form of protest, AdNauseam offers a rare opportunity to experience a different kind of web—one where users don’t just avoid tracking, but push back against it.
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/2845169389213941408/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/adnauseam-ad-blocker-that-fights-back.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/2845169389213941408'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/2845169389213941408'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/adnauseam-ad-blocker-that-fights-back.html' title='AdNauseam: The Ad Blocker That Fights Back'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-257964799443162831</id><published>2026-03-28T11:54:00.000-07:00</published><updated>2026-03-28T11:54:06.748-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Iran‑Linked Hackers Leak FBI Director’s Emails and Strike U.S. Firm</title><content type='html'>Threat actors tied to Iran recently breached the personal email account of FBI Director Kash Patel and leaked private emails and photos online, marking a high‑profile intrusion that captured global attention. 
&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px;margin-top: -20px; position: relative; width: 300px;&quot;&gt;
&lt;script async src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!-- Popular posts-video --&gt;
&lt;ins class=&quot;adsbygoogle&quot;
     style=&quot;display:inline-block;width:300px;height:250px&quot;
     data-ad-client=&quot;ca-pub-6820545514881433&quot;
     data-ad-slot=&quot;2718283960&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;
In late March 2026, the pro‑Iranian hacking collective known as the Handala Hack Team publicly released hundreds of emails, personal photos, and other documents allegedly taken from Patel’s personal Gmail inbox — claiming that he will now find his name “among the list of successfully hacked victims.” (&lt;a href=&quot;https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;Reuters&lt;/a&gt;)

&lt;br /&gt;&lt;br /&gt;
According to multiple outlets, including Reuters and Tom’s Guide, the FBI confirmed that the director’s personal email was targeted, but emphasized that the material leaked appears to be historical in nature and did not involve any government systems or classified information. (&lt;a href=&quot;https://www.tomsguide.com/computing/online-security/fbi-director-emails-breached-by-iran-linked-hackers-what-happened-and-how-to-protect-yourself?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;Tom’s Guide&lt;/a&gt;) Experts have noted that using a personal account for official tasks can increase exposure to attackers, and this incident highlights that risk even at the highest levels of law enforcement.

&lt;br /&gt;&lt;br /&gt;
The group taking credit — Handala — is widely assessed by analysts to be a pro‑Iranian, pro‑Palestinian persona likely linked to Iran’s Ministry of Intelligence and Security (MOIS), and has been connected with a series of offensive operations that blend hack‑and‑leak tactics with political messaging. The campaign coincides with broader geopolitical tensions involving the United States, Israel, and Iran, and security observers suggest that Handala’s activities aim to embarrass U.S. leadership and signal retaliatory capability in cyberspace. (&lt;a href=&quot;https://www.wired.com/story/iranian-hackers-breached-the-fbi-directors-personal-email-but-not-the-fbi?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;Wired&lt;/a&gt;)

&lt;br /&gt;&lt;br /&gt;
In addition to the email leak, the same actor has claimed responsibility for a destructive cyberattack against medical device giant Stryker, which disrupted its global operations earlier in March. According to Reuters, Stryker reported that manufacturing and internal systems were affected, though its teams have since mostly restored normal operations. (&lt;a href=&quot;https://www.reuters.com/business/stryker-says-manufacturing-mostly-restored-after-cyberattack-2026-03-26/?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;Reuters&lt;/a&gt;) Independent reports indicate that compromised credentials, possibly obtained via information‑stealer malware, played a role in facilitating access to enterprise systems and the deployment of wiper‑style destructive malware against endpoints. (&lt;a href=&quot;https://www.securityweek.com/iranian-hackers-likely-used-malware-stolen-credentials-in-stryker-breach/?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;SecurityWeek&lt;/a&gt;)

&lt;br /&gt;&lt;br /&gt;
Security researchers note that unlike financially motivated cybercrime groups, Handala’s campaign appears to emphasize disruption, psychological impact, and geopolitical messaging rather than direct financial gain. (&lt;a href=&quot;https://thehackernews.com/2026/03/iran-linked-hackers-breach-fbi.html?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;The Hacker News&lt;/a&gt;) WIRED also reported that some claims by the group — like penetrating FBI systems — are unsubstantiated and part of a broader attention‑grabbing strategy designed to amplify fear and misinformation. (&lt;a href=&quot;https://www.wired.com/story/iranian-hackers-breached-the-fbi-directors-personal-email-but-not-the-fbi?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;Wired&lt;/a&gt;)

&lt;br /&gt;&lt;br /&gt;
Beyond high‑profile breaches, authorities say the Handala collective and affiliated Iranian cyber actors have employed a variety of tactics — including social engineering on messaging platforms to deliver malware, use of common communications services for command‑and‑control, and campaigns historically targeting journalists, dissidents, and opposition groups. (&lt;a href=&quot;https://thehackernews.com/2026/03/iran-linked-hackers-breach-fbi.html?utm_source=chatgpt.com&quot; target=&quot;_blank&quot;&gt;The Hacker News&lt;/a&gt;) The group’s activities have drawn direct attention from the U.S. Department of Justice, which recently seized several domains linked to MOIS‑aligned infrastructure and is offering a $10 million reward for information on key members, underscoring the seriousness with which U.S. policymakers view this expanding threat.

&lt;br /&gt;&lt;br /&gt;
As the digital battlefield continues to evolve, these incidents highlight how state‑linked cyber actors can leverage both doxing and destructive malware to achieve strategic impact, reminding defenders that threat landscapes are increasingly multifaceted and politically charged. The use of legitimate administrative tools and compromised credentials in these operations also means defenders must be vigilant and proactive to prevent similar incursions in both public- and private‑sector networks.&lt;br&gt;&lt;br&gt;

&lt;h3&gt;⚠️ Defanged IoCs (Domains Linked to Handala Hack Team)&lt;/h3&gt; &lt;ul&gt; &lt;li&gt;&lt;code&gt;handala-hack[.]to&lt;/code&gt; — Handala’s primary publishing site for leaks&lt;/li&gt; &lt;li&gt;&lt;code&gt;handala-team[.]to&lt;/code&gt; — Alternate clearnet domain resurfaced after domain seizures&lt;/li&gt; &lt;li&gt;&lt;code&gt;justicehomeland[.]org&lt;/code&gt; — Seized domain linked to MOIS operations&lt;/li&gt; &lt;li&gt;&lt;code&gt;karmabelow80[.]org&lt;/code&gt; — Another seized domain associated with Iranian threat personas&lt;/li&gt; &lt;li&gt;&lt;code&gt;handala-redwanted[.]to&lt;/code&gt; — Additional seized domain used for propaganda and claimed hacks&lt;/li&gt; &lt;/ul&gt;

&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/257964799443162831/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/iranlinked-hackers-leak-fbi-directors.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/257964799443162831'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/257964799443162831'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/iranlinked-hackers-leak-fbi-directors.html' title='Iran‑Linked Hackers Leak FBI Director’s Emails and Strike U.S. Firm'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-6540211165679053216</id><published>2026-03-27T15:23:00.000-07:00</published><updated>2026-03-27T15:23:57.179-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>TikTok Business Account Takeover via AitM Phishing and CAPTCHA Evasion</title><content type='html'>A recent campaign leverages adversary-in-the-middle (AitM) phishing infrastructure to compromise TikTok for Business accounts by combining credential interception with anti-analysis controls.
&lt;br /&gt;&lt;br /&gt;
The attack flow begins with social engineering designed to drive user interaction. Victims are directed to attacker-controlled infrastructure that impersonates either TikTok for Business authentication flows or recruitment-style portals mimicking legitimate corporate workflows. These pretexts increase engagement rates and reduce suspicion, particularly when combined with contextual elements such as scheduling interfaces or onboarding narratives.
&lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px;margin-top: -20px; position: relative; width: 300px;&quot;&gt;
&lt;script async src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!-- Popular posts-video --&gt;
&lt;ins class=&quot;adsbygoogle&quot;
     style=&quot;display:inline-block;width:300px;height:250px&quot;
     data-ad-client=&quot;ca-pub-6820545514881433&quot;
     data-ad-slot=&quot;2718283960&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/div&gt;

A key technical component of the campaign is the use of a CAPTCHA challenge (Cloudflare Turnstile) as a gating mechanism. This serves multiple purposes:
&lt;br /&gt;&lt;br /&gt;
Prevents automated security crawlers and sandbox environments from accessing the malicious payload
Filters traffic to prioritize real user interaction
Delays exposure of the phishing content until basic human verification is completed
&lt;br /&gt;&lt;br /&gt;
Once the challenge is solved, the victim is proxied through an AitM framework. This infrastructure operates as a transparent relay between the user and the legitimate service, capturing authentication material in real time. Unlike traditional credential harvesting pages, AitM setups can intercept:
&lt;br /&gt;&lt;br /&gt;
Session cookies
Authentication tokens
Multi-factor authentication (MFA) responses
&lt;br /&gt;&lt;br /&gt;
This allows attackers to establish authenticated sessions without requiring persistent access to credentials, effectively bypassing MFA protections.
&lt;br /&gt;&lt;br /&gt;
The phishing kits used in these operations are consistent with modern, modular AitM toolkits that dynamically generate target-specific templates and handle session replay. These kits often integrate TLS certificates and domain fronting techniques to improve legitimacy and reduce detection.
&lt;br /&gt;&lt;br /&gt;
In parallel, a separate campaign demonstrates the continued evolution of initial access techniques through file-based delivery. This activity uses SVG (Scalable Vector Graphics) files as the initial vector. While typically treated as static image assets, SVG files can embed active content such as JavaScript, enabling execution when opened in compatible environments.
&lt;br /&gt;&lt;br /&gt;
The infection chain in this case includes:
&lt;br /&gt;&lt;br /&gt;
Delivery of a weaponized SVG attachment disguised as a business document
Execution of embedded logic that triggers outbound network communication
Retrieval of a secondary payload from a remote endpoint
Execution of a compiled malware binary written in Go
&lt;br /&gt;&lt;br /&gt;
The use of SVG provides several advantages:
&lt;br /&gt;&lt;br /&gt;
Lower detection rates due to its classification as an image format
Compatibility with multiple rendering environments (browsers, email clients)
Ability to embed obfuscated script content
&lt;br /&gt;&lt;br /&gt;
The retrieved payload exhibits characteristics aligned with ransomware-linked tooling, including overlaps in code structure and behavior with previously analyzed families. The use of Go as an implementation language further complicates analysis due to static compilation and cross-platform portability.
&lt;br /&gt;&lt;br /&gt;
Across both campaigns, several themes emerge:
&lt;br /&gt;&lt;br /&gt;
Increased reliance on traffic gating (CAPTCHA, filtering layers) to evade automated defenses
Use of legitimate service impersonation combined with real-time proxying to defeat MFA
Expansion of non-traditional file formats (e.g., SVG) as initial access vectors
Modular, reusable infrastructure enabling rapid adaptation of phishing operations
&lt;br /&gt;&lt;br /&gt;
These techniques reflect a shift toward blending user interaction requirements with layered evasion, making detection dependent on behavioral analysis rather than static indicators.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/6540211165679053216/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/tiktok-business-account-takeover-via.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6540211165679053216'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6540211165679053216'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2026/03/tiktok-business-account-takeover-via.html' title='TikTok Business Account Takeover via AitM Phishing and CAPTCHA Evasion'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-5506500897895221500</id><published>2023-04-05T11:24:00.003-07:00</published><updated>2023-04-10T15:49:16.583-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Math Matters in Cybersecurity: How Statistical Analysis and Anomaly Detection Help Protect Networks and Data</title><content type='html'>&lt;p&gt;Cybersecurity is a technical field that requires strong quantitative skills. Math is an important tool in cybersecurity, as it is used to create and maintain secure networks, protect data from attacks, and identify and prevent intrusions. Math also helps cybersecurity professionals to solve complex problems and keep networks and data secure &lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;&lt;br /&gt;

&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt; &lt;!--Popular posts-video--&gt; &lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt; &lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;Some of the math-based concepts used in cybersecurity are:&amp;nbsp;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Statistical analysis: This is the process of collecting, organizing, summarizing, and interpreting data to draw conclusions and make decisions. Statistical analysis can help with detecting malicious behavior or anomalies by analyzing network traffic data and identifying patterns, trends, outliers, and correlations that may indicate an attack or a compromise.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Anomaly detection: This is the technique that uses statistical methods to detect deviations from normal or expected behavior in network traffic data. Anomaly detection can help identify unknown or novel attacks that may not be detected by signature-based methods.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Binary math: This is a mathematical language that uses only the values “0” and “1” in combination.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Hexadecimal math: This is a math-based concept that allows you to count up to any one of 16 different options.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Boolean algebra: This has to do with the values of variables telling the truth.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Cryptography: This is the science of encrypting and decrypting data using mathematical techniques.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Math matters in cybersecurity because it helps cybersecurity professionals to perform their tasks effectively and efficiently. Math also helps cybersecurity professionals to develop critical thinking, problem-solving, and analytical skills that are vital for cybersecurity. An example of how a cybersecurity defender might use statistical analysis is monitoring the network traffic of an organization using a network forensic analysis tool. The tool collects and analyzes various data points, such as the source and destination IP addresses, ports, protocols, packet sizes, and response times of each connection. The tool also uses anomaly detection techniques to flag any suspicious or abnormal connections that may indicate a compromise.&lt;br /&gt;&lt;br /&gt;One day, the defender notices that a connection from an internal host to an external IP address has been flagged as anomalous by the tool. The defender decides to investigate further and uses statistical analysis to compare the timing of the connection with other connections from the same host.&lt;br /&gt;&lt;br /&gt;The defender calculates the mean and standard deviation of the time interval between each connection from the host in the past week. The defender then compares the time interval of the anomalous connection with the mean and standard deviation values.&lt;br /&gt;&lt;br /&gt;The defender finds that the time interval of the anomalous connection is 60 minutes, which is more than three standard deviations below the mean time interval of 180 minutes. The defender also finds that the anomalous connection has been occurring regularly every 60 minutes for the past three days.&lt;br /&gt;&lt;br /&gt;The defender concludes that the anomalous connection is likely a result of a compromise, as it shows a significant deviation from the normal behavior of the host. The defender suspects that the host has been infected by malware that is communicating with a command-and-control (C2) server using periodic connections with a fixed time interval to avoid detection.&lt;br /&gt;&lt;br /&gt;The defender reports the finding to the security team and initiates a response plan to contain and remediate the compromise.&lt;br /&gt;&lt;br /&gt;If you are interested in pursuing a career in cybersecurity, you may want to learn some basic math concepts that are relevant to the field. You can do this by reading books that cover topics such as statistical analysis, anomaly detection, binary math, hexadecimal math, Boolean algebra, cryptography, and more. These books will help you develop the quantitative skills needed for cybersecurity and prepare you for more advanced topics later on.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Practical-Statistics-Data-Scientists-Essential/dp/149207294X?tag=localtechrepair-20&quot;&gt;Practical Statistics for Data Scientists: 50+ Essential Concepts Using R and Python by Peter Bruce and Andrew Bruce&lt;/a&gt;: This book covers topics such as exploratory data analysis, correlation and regression, statistical machine learning methods, resampling techniques, clustering methods.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot; https://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace/dp/0132564718?tag=localtechrepair-20&quot;&gt;Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff and Jonathan Ham&lt;/a&gt;: This book covers topics such as network evidence acquisition tools and techniques, network protocols analysis tools and techniques.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Art-Deception-Controlling-Human-Element/dp/076454280X?tag=localtechrepair-20&quot;&gt;The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick&lt;/a&gt;: This book covers topics such as social engineering tactics and techniques.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Cryptography-Engineering-Principles-Practical-Applications/dp/0470474246?tag=localtechrepair-20&quot;&gt;Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson et al&lt;/a&gt;.: This book covers topics such as cryptographic algorithms design principles.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Code-Book-Science-Secrecy-Cryptography/dp/0385495323?tag=localtechrepair-20&quot;&gt;The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh&lt;/a&gt;: This book covers topics such as historical ciphers and codes.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;generated by Microsoft&#39;s Bing GPT-4 AI&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/5506500897895221500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/why-math-matters-to-cyber-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5506500897895221500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5506500897895221500'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/why-math-matters-to-cyber-security.html' title='Math Matters in Cybersecurity: How Statistical Analysis and Anomaly Detection Help Protect Networks and Data'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-7423857326302753857</id><published>2023-03-30T17:03:00.006-07:00</published><updated>2023-03-30T23:18:41.045-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Threat Hunting: A Proactive Approach to Cybersecurity</title><content type='html'>Cybersecurity is a constantly evolving field that requires defenders to keep up with the latest threats and techniques of attackers. Traditional security tools, such as firewalls, antivirus, and intrusion detection systems, are often reactive and rely on signatures or rules to detect known threats. However, these tools may not be enough to stop advanced persistent threats (APTs) that can evade detection and remain hidden in a network for months or even years.  &lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--Popular posts-video--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/span&gt;&lt;/div&gt;&lt;p&gt;
&lt;span class=&quot;fullpost&quot;&gt;That’s why threat hunting is becoming an essential skill for cybersecurity professionals who want to take a proactive approach to protecting their organizations. Threat hunting is the practice of actively searching for and identifying potential threats that may have bypassed the initial security defenses. Threat hunters use various tools and methods, such as threat intelligence, data analysis, machine learning, and hypothesis testing, to look for anomalies, patterns, indicators, or evidence of malicious activity in the network or system.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;Threat hunting can provide many benefits for organizations, such as:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Reducing the dwell time and impact of attackers by discovering and eliminating them before they cause damage or exfiltrate data.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Improving the security posture and resilience of the organization by identifying and addressing vulnerabilities and gaps in the security controls.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Enhancing the security awareness and skills of the security team by learning from the attackers’ tactics, techniques, and procedures (TTPs) and applying best practices for threat hunting.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Increasing the confidence and trust of the stakeholders and customers by demonstrating a proactive and mature approach to cybersecurity.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;If you are interested in learning more about threat hunting and how to become a successful threat hunter, you can start by following some of these steps:&lt;/span&gt;&lt;/p&gt;&lt;ul st=&quot;&quot; style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a class=&quot;tooltip-target&quot; data-citationid=&quot;6fbc6576-6d74-c023-bfc9-fa22138c57a8-15-group&quot; href=&quot;https://www.crowdstrike.com/cybersecurity-101/threat-hunting/&quot;&gt;Learn the basics of threat hunting methodologies, such as intelligence-based hunting&lt;/a&gt;&lt;a class=&quot;tooltip-target&quot; data-citationid=&quot;6fbc6576-6d74-c023-bfc9-fa22138c57a8-19-group&quot;&gt;, hypothesis-based hunting&lt;/a&gt;&lt;a class=&quot;tooltip-target&quot; data-citationid=&quot;6fbc6576-6d74-c023-bfc9-fa22138c57a8-21-group&quot; href=&quot;https://www.atatus.com/glossary/threat-hunting/&quot;&gt;, and custom hunting&lt;/a&gt;. Intelligence-based hunting uses indicators of compromise (IoCs) from sources that gather threat intelligence. Hypothesis-based hunting uses questions or scenarios that reflect possible malicious activity or behavior based on various sources. Custom hunting adapts to the specific context and needs of the organization based on the knowledge of the environment, the assets, the users, the business processes, and the threat landscape.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.crowdstrike.com/cybersecurity-101/threat-hunting/&quot; target=&quot;_blank&quot;&gt;&lt;span color=&quot;inherit&quot; style=&quot;border-bottom: 2px solid transparent; position: relative; text-decoration-color: var(--cib-color-neutral-foreground-hint-light); text-decoration-line: underline; text-decoration-style: dotted; text-decoration-thickness: initial; text-underline-offset: 3px;&quot;&gt;Familiarize yourself with the common tools and platforms that support threat hunting, such as SIEMs&lt;/span&gt;&lt;/a&gt;&lt;a class=&quot;tooltip-target&quot; data-citationid=&quot;6fbc6576-6d74-c023-bfc9-fa22138c57a8-26-group&quot; href=&quot;https://www.crowdstrike.com/cybersecurity-101/threat-hunting/&quot;&gt;, ELK stacks&lt;/a&gt;&lt;a class=&quot;tooltip-target&quot; data-citationid=&quot;6fbc6576-6d74-c023-bfc9-fa22138c57a8-28-group&quot; href=&quot;https://www.crowdstrike.com/cybersecurity-101/threat-hunting/&quot;&gt;, YARA&lt;/a&gt;&lt;a class=&quot;tooltip-target&quot; data-citationid=&quot;6fbc6576-6d74-c023-bfc9-fa22138c57a8-30-group&quot; href=&quot;https://www.atatus.com/glossary/threat-hunting/&quot;&gt;, Cuckoo Sandbox&lt;/a&gt;, etc. SIEMs are systems that collect and analyze security data from various sources. ELK stacks are platforms that enable data ingestion, processing, storage, and visualization. YARA is a tool that can classify and identify malware based on patterns and rules. Cuckoo Sandbox is a tool that can isolate and analyze suspicious files.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Practice your threat hunting skills by participating in online challenges, simulations, or competitions that provide realistic scenarios and datasets for threat hunting. Some of the open source websites that offer such opportunities are Hack The Box (&lt;a href=&quot;https://www.hackthebox.eu/&quot;&gt;https://www.hackthebox.eu/&lt;/a&gt;), TryHackMe (&lt;a href=&quot;https://tryhackme.com/&quot;&gt;https://tryhackme.com/&lt;/a&gt;), CyberDefenders (&lt;a href=&quot;https://cyberdefenders.org/&quot;&gt;https://cyberdefenders.org/&lt;/a&gt;), etc.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Join a community of threat hunters who can share their experiences, insights, and resources for threat hunting. Some of the open source websites that offer such communities are Reddit (&lt;a href=&quot;https://www.reddit.com/r/threathunting/&quot;&gt;https://www.reddit.com/r/threathunting/&lt;/a&gt;), SANS (&lt;a href=&quot;https://www.sans.org/cyber-security-community/threat-hunting%29&quot;&gt;https://www.sans.org/cyber-security-community/threat-hunting)&lt;/a&gt;, Threat Hunting Academy (&lt;a href=&quot;https://threathunting.academy/&quot;&gt;https://threathunting.academy/&lt;/a&gt;), etc.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span style=&quot;text-align: left;&quot;&gt;You can also learn more by the following books from amazon&amp;nbsp;&lt;/span&gt;

&lt;p&gt;&lt;/p&gt;&lt;li style=&quot;margin-left: 40px; text-align: left;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Practical-Threat-Intelligence-Data-Driven-Hunting/dp/1484266835?tag=localtechrepair-20&quot;&gt;Practical Threat Intelligence and Data-Driven Threat Hunting by Rashaad Steward&lt;/a&gt;:
 This book covers the fundamentals of threat intelligence and threat 
hunting, as well as how to use various open source tools and platforms 
to collect, analyze, visualize, and share threat data. It also provides 
case studies and exercises to help you apply the concepts and skills in 
real-world situations.&lt;/li&gt;&lt;li style=&quot;margin-left: 40px; text-align: left;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Threat-Hunting-Practical-Guide-Beginners/dp/1735086500?tag=localtechrepair-20&quot;&gt;Threat Hunting: A Practical Guide for Beginners by Chris Sanders&lt;/a&gt;:
 This book provides a step-by-step guide for beginners who want to learn
 how to perform threat hunting in their networks. It covers the basics 
of network security monitoring, data analysis, hypothesis generation, 
and investigation. It also introduces some of the most popular open 
source tools for threat hunting, such as Wireshark, Bro/Zeek, Suricata, 
ELK stack, etc.&lt;br /&gt;&lt;/li&gt;&lt;li style=&quot;margin-left: 40px; text-align: left;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Threat-Hunting-Handbook-Practical-Security/dp/1119649878?tag=localtechrepair-20&quot;&gt;The Threat Hunting Handbook: A Practical Guide for Security Analysts by David Bianc&lt;/a&gt;o:
 This book offers a comprehensive and practical guide for security 
analysts who want to master the art and science of threat hunting. It 
covers the theory and practice of threat hunting methodologies, such as 
intelligence-driven hunting, hypothesis-driven hunting, anomaly-driven 
hunting, etc. It also explains how to use various open source tools and 
frameworks for threat hunting, such as YARA, MISP, TheHive/Cortex, etc.&lt;/li&gt;&lt;p&gt;Threat hunting is a rewarding and exciting career path for cybersecurity enthusiasts who want to challenge themselves and make a difference in protecting their organizations. By becoming a threat hunter, you can not only improve your own security skills but also contribute to the overall security of the cyberspace. &lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;generated by Microsoft&#39;s Bing GPT-4 AI&lt;/span&gt; &lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/7423857326302753857/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/how-to-do-some-basic-open-source-threat.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7423857326302753857'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7423857326302753857'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/how-to-do-some-basic-open-source-threat.html' title='Threat Hunting: A Proactive Approach to Cybersecurity'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-5459663534353850226</id><published>2023-03-30T16:20:00.013-07:00</published><updated>2023-03-30T23:18:25.417-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>How to Get Started with Network Forensics: A Practical Guide</title><content type='html'>Network forensics is the science and art of investigating and analyzing network traffic data to discover and recover evidence of cyberattacks. It is a vital skill for anyone who wants to protect their network from hackers, malware, or data breaches. In this article, you will learn the basics of network forensics, such as what it is, why it is important, and how it works. You will also learn about the tools and techniques that network forensics experts use to capture, record, and analyze network packets. By the end of this article, you will have a solid foundation of network forensics knowledge and skills that you can apply to your own network or career. Let’s get started! &lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; padding: 5px 10px 15px; position: relative; width: 300px;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;
&lt;!--Popular posts-video--&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;
&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;
&lt;b&gt;Network Forensics&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Network forensics is a branch of digital forensics that deals with the analysis of network traffic for various purposes, such as investigating cybercrimes, detecting intrusions, or gathering information. Network forensics involves some basic concepts and techniques, such as:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Network protocols and models&lt;/b&gt;: These are the rules and standards that govern how data is transmitted and organized in a network. Examples of network protocols are TCP/IP, Ethernet, Wi-Fi, HTTP, etc. Network models are the conceptual frameworks that describe the layers and functions of network protocols. Examples of network models are OSI and TCP/IP.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Network traffic capture and analysis&lt;/b&gt;: This is the process of collecting and examining network data packets that flow through a certain point in the network. Network traffic capture can be done using tools such as Wireshark, tcpdump, etc. Network traffic analysis can be done using tools such as Snort, Bro, etc.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Network packets and headers&lt;/b&gt;: These are the units of data that are exchanged between network devices. A network packet consists of a payload (the actual data) and a header (the information that describes the source, destination, protocol, size, etc. of the packet).&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Network flow and session data&lt;/b&gt;: These are the aggregated and summarized information about network traffic based on certain criteria, such as source and destination IP addresses, ports, protocols, timestamps, etc. Network flow data can be used to monitor network performance, detect anomalies, or identify patterns. Network session data can be used to reconstruct the communication between network devices or applications.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Network artifacts and indicators of compromise&lt;/b&gt;: These are the traces or evidence of network activity that can be used to infer or confirm the occurrence of a cyberattack or an intrusion. Examples of network artifacts are log files, DNS queries, HTTP requests, etc. Examples of indicators of compromise are malicious IP addresses, domains, URLs, signatures, etc.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;&amp;nbsp;Recommended Books on Network Forensics&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Here are a few links to amazon.com books on network forensics that you may find useful:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Network-Forensics-Ric-Messier/dp/1119328284?tag=localtechrepair-20&quot;&gt;Network Forensics by Ric Messier&lt;/a&gt;: This book provides a practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. It covers topics such as network packet analysis, host artifacts, log analysis, intrusion detection systems, and more.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace/dp/0132564718?tag=localtechrepair-20&quot;&gt;Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff and Jonathan Ham&lt;/a&gt;: This book teaches you how to follow the trail of a hacker through a network using real-world examples and case studies. It covers topics such as TCP/IP fundamentals, wireless hacking, web attacks, malware analysis, encryption cracking, and more.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Hands-Network-Forensics-Investigate-evidence/dp/1789344204?tag=localtechrepair-20&quot;&gt;Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools by Nipun Jaswal&lt;/a&gt;: This book helps you learn how to use various network forensic tools to investigate different types of attacks and find evidence. It covers topics such as packet capture and analysis tools, network flow analysis tools, malware analysis tools, honeypots and honeynets, and more.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Network Forensics Use Cases&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Network forensics is the science of discovering and analyzing network data for various purposes, such as investigating cybercrimes, detecting intrusions, or gathering information. Network forensics can be applied in different scenarios, depending on the type and source of network data, the objectives and goals of the analysis, and the tools and techniques used. Here are some examples of network forensics use cases in different scenarios:&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Malware Analysis&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&amp;nbsp;Malware analysis is the process of examining malicious software to understand its functionality, behavior, origin, and impact. Network forensics can be used to support malware analysis by capturing and analyzing network traffic generated by malware samples. This can help to identify malware communication protocols, command and control servers, exfiltration channels, infection vectors, and indicators of compromise. Network forensics can also help to correlate malware activity with other network events or artifacts to establish a timeline of infection or attribution of attackers.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Practical-Threat-Hunting-setting-configuring/dp/1838556370?tag=localtechrepair-20&quot;&gt;&amp;nbsp;Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&amp;amp;CK™ Framework and open source tools by Valentina Costa-Gazcón&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Intrusion Detection and Prevention&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Intrusion detection and prevention are the processes of monitoring and protecting a network from unauthorized or malicious access or activity. Network forensics can be used to enhance intrusion detection and prevention by providing evidence of network attacks or anomalies. Network forensics can also help to validate and fine-tune intrusion detection systems (IDS) or intrusion prevention systems (IPS) by analyzing their alerts, logs, or rules. Network forensics can also help to respond to intrusions by isolating or blocking malicious traffic, tracing back the source of attacks, or collecting forensic data for further investigation.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Foundations-Threat-Hunting-Organize-effective/dp/180324299X?tag=localtechrepair-20&quot;&gt;The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs by Chad Maurice, Jeremy Thompson, William Copeland, and Anthony Particini&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Incident Response and Investigation&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Incident response and investigation are the processes of responding to and investigating security incidents that affect a network or an organization. Network forensics can be used to support incident response and investigation by providing information about the nature, scope, impact, and root cause of incidents. Network forensics can also help to preserve and analyze network evidence for legal or regulatory purposes. Network forensics can also help to recover from incidents by restoring normal network operations, removing malicious artifacts, or implementing remediation measures.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Practical-Threat-Hunting-setting-configuring/dp/1838556370?tag=localtechrepair-20&quot;&gt;Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&amp;amp;CK™ Framework and open source tools by Valentina Costa-Gazcón&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot; style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;b&gt;Threat Hunting and Intelligence&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;Threat hunting and intelligence are the processes of proactively searching for and analyzing potential threats or adversaries that target a network or an organization. Network forensics can be used to support threat hunting and intelligence by providing visibility into network activity and behavior. Network forensics can also help to identify unknown or emerging threats or adversaries by discovering new attack patterns, techniques, or indicators. Network forensics can also help to mitigate threats or adversaries by developing countermeasures, sharing threat intelligence, or collaborating with other security teams.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Threat-Hunting-Cloud-Defending-Cyberattacks/dp/111980406X?tag=localtechrepair-20&quot;&gt;Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks by Chris Peiris, Binil Pillai, and Abbas Kudrat&lt;/a&gt;i&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&amp;nbsp;Network Forensics Tools and Resources&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Network forensics is the science of discovering and analyzing network data for various purposes, such as investigating cybercrimes, detecting intrusions, or gathering information. Network forensics requires various tools and resources to capture, record, and examine network traffic and events. Here are some of the tools that can be used for network forensics:
Network Traffic Capture and Analysis Tools
These are the tools that can be used to collect and inspect network data packets that flow through a certain point in the network. These tools can help to identify network protocols, sources and destinations, payloads, headers, timestamps, and other information about network traffic. Some of the popular tools for network traffic capture and analysis are:&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;•	Tcpdump: A command-line tool that can capture and filter network traffic on Unix-based systems. It can save the captured traffic in a file that can be analyzed by other tools such as Wireshark or NetworkMiner.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;•	Wireshark: A graphical user interface tool that can capture and analyze network traffic on various platforms. It can display the captured traffic in a human-readable format, apply filters, decode protocols, and perform statistics1.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;•	NetworkMiner: A graphical user interface tool that can extract files, images, messages, certificates, and other artifacts from network traffic. It can also perform host analysis, geolocation, DNS lookup, and protocol identification.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Hands-Network-Forensics-Investigate-evidence/dp/178934947X?tag=localtechrepair-20&quot;&gt;Hands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools by Nipun Jaswal&lt;/a&gt;: This book helps you learn how to perform network forensics using various open source tools such as Wireshark, tcpdump, nmap, and more. It covers topics such as network data acquisition, packet analysis, network protocols, network attacks, malware analysis, and network forensics reporting.&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;Network Forensics Learning Paths and Opportunities&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&amp;nbsp;Network forensics is a fascinating and rewarding field that combines technical skills, analytical thinking, and investigative techniques. Network forensics professionals can work in various sectors such as law enforcement, government, military, private companies, or academia. They can also specialize in different areas such as network traffic analysis, network intrusion detection and prevention, malware analysis, network forensics reporting, and more.
To become a network forensics professional, you need to have a solid foundation in networking concepts and protocols, as well as familiarity with various network forensic tools and methods. You also need to have a keen eye for details, a curious mind, and a problem-solving attitude. You can learn network forensics through various sources such as books, courses, certifications, webinars, podcasts, blogs, or online communities. Here are some of the books that can help you learn network forensics:
&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Art-Network-Penetration-Testing-Company/dp/1718500989?tag=localtechrepair-20&quot;&gt;The Art of Network Penetration Testing: How to Take Over Any Company in the World by Royce Davis&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;&lt;a href=&quot;https://www.amazon.com/Applied-Network-Security-Monitoring-Collection/dp/0124172083?tag=localtechrepair-20&quot;&gt;Applied Network Security Monitoring: Collection, Detection, and Analysis by Chris Sanders and Jason Smith&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;
&lt;a href=&quot;https://www.amazon.com/Wireshark-101-Essential-Network-Analysis/dp/1893939758?tag=localtechrepair-20&quot;&gt;Wireshark 101: Essential Skills for Network Analysis by Laura Chappell and Gerald Combs&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033?tag=localtechrepair-20&quot;&gt;Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh et al.&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Practice-Network-Security-Monitoring-Incident/dp/1593275099?tag=localtechrepair-20&quot;&gt;The Practice of Network Security Monitoring: Understanding Incident Detection and Response by Richard Bejtlich&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Network forensics is a growing and rewarding field that offers many opportunities for learning and career advancement. Network forensics professionals can work in various sectors and specialize in different areas of network security. To become a network forensics professional, you need to have a solid foundation in networking concepts and protocols, as well as familiarity with various network forensic tools and methods. You also need to have a keen eye for details, a curious mind, and a problem-solving attitude. You can learn network forensics through various sources such as books, courses, certifications, webinars, podcasts, blogs, or online communities. We hope that this article has given you some useful information and guidance on how to start or improve your network forensics journey. Happy hacking!

.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;generated by Microsoft&#39;s Bing GPT-4 AI&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/5459663534353850226/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2023/03/how-to-learn-network-forensics-guide.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5459663534353850226'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5459663534353850226'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2023/03/how-to-learn-network-forensics-guide.html' title='How to Get Started with Network Forensics: A Practical Guide'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-8112850320223859274</id><published>2021-01-15T11:44:00.002-08:00</published><updated>2021-01-19T21:37:58.222-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="uncategorized"/><title type='text'>How to think Analytically</title><content type='html'>One of the hardest things in being a defensive security analyst is being able to think with your analytical side of your brain. Training your self to think analytically will greatly help you be a great defensive security analyst.  &lt;br /&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;div style=&quot;float: right; height: 250px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px;margin-top: -20px; position: relative; width: 300px;&quot;&gt;&lt;script async src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt; &lt;!-- Popular posts-video --&gt; &lt;ins class=&quot;adsbygoogle&quot;
     style=&quot;display:inline-block;width:300px;height:250px&quot;
     data-ad-client=&quot;ca-pub-6820545514881433&quot;
     data-ad-slot=&quot;2718283960&quot;&gt;&lt;/ins&gt; &lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/div&gt;&lt;br/&gt;So how are your analytical skills? Analytical thinking is difficult work and its a skill that you can improve upon. The nice thing though is that the more that you do it the easier it will be for you to think analytically. Though before we get into how you can improve thinking analytically lets define what analytics is and the process of thinking analytically (the process that analyst do).

Per &lt;a href=&quot;https://www.dictionary.com/browse/analytics&quot; target=&quot;_blank&quot;&gt;dictionary.com&lt;/a&gt; analytics is 
  &lt;blockquote&gt;Logic. the science of logical analysis.
  the analysis of data, typically large sets of business data, by the use of mathematics, statistics, and computer software: 
  the patterns and other meaningful information gathered from the analysis of data
  &lt;/blockquote&gt;  
&lt;br/&gt;
As an analyst we get paid to think about issues and try to figure out what is going on using this part of our brain. So it always good to improve that side of your brain. Some things we is as follows. &lt;br/&gt;&lt;br/&gt;
  &lt;b&gt;Be observant:&lt;/b&gt;&lt;br/&gt;
  Be observant about what is going on in a situation. look for things that might have an effect on the flow of information that created an event. so for example if you have an IR for virus in email. Think about the different stages that caused that IR to pop and how it got into the organization. You might have exchange logs, bro logs, IDS logs, firewall logs, email IPS/virus scanner, desktop AV logs, etc depending on what stage the detection happened and you can investigate whats going on. In every day life just watching what is going on around you. Taking a moment when you are shopping and just watching people and the flow of people and how they are moving around you and how the operation of the store has things set up to manage the people. There are a lot of science around moving people through a store to get the most money out of them while their in store. being observant can help you realize how things are interconnected and the more you learn how they work together the easier it will be fore you to think through the logical steps on an issue. &lt;br/&gt;&lt;br/&gt;
  &lt;b&gt;Learn how things work:&lt;/b&gt;&lt;br/&gt;
  When you start to become more observant you will start to learn how things work more and how things are interconnected. This is critical to being able to think analytically. Because it requires a lot of knowledge to lean on to process in logical steps how the applications and data work together. So if you are hacking a web application its important to know how the form your working with might have underlining security flaws that you can abuse. But as you learn more about how things work it will help you just that knowledge to go through the logical steps where something can be broken. &lt;br/&gt;&lt;br/&gt;
  &lt;b&gt;Ask questions:&lt;/b&gt;&lt;br/&gt;
  One of the best attributes to an analyst is to ask questions. Never be afread to ask question. This will help you learn how things work and can help you think of things that the developers might not have thought about. This is a critial step in offensive security as it helps you process though potential ways to exploit a server that might not have been thought of. In defensive security it helps you ask your self things you might not know the answer to. Someone might see an AV alert and see that the the AV software removed it and end their investigation there. But you might go further and ask your self questions like &quot;how did this file get here?&quot;, &quot;are there other files that the AV missed?&quot;, &quot;how can i be sure this system is secure now?&quot;, etc. Asking your self questions can help expand your own knowledge but can be uncomfortable ask it can cause you more work. &lt;br/&gt;&lt;br/&gt;
  &lt;b&gt;play out situations and solving problems:&lt;/b&gt;&lt;br/&gt;
  Playing games in your head and trying to solve problems will help you learn more about how things work and just practice thinking about things. People don&#39;t naturally think because it takes effort. When you put the work in in solving issues it helps you improve in thinking about all the possabilities. If you get the chance to do root cause analysis it will help work though problems to find out what truely caused the issue. When ever you get a chance to problem solve jump at it. because the more you solve problems the easier it will be for you to think analytically. &lt;br/&gt;&lt;br/&gt;
  &lt;b&gt;Think about your decisions:&lt;/b&gt;&lt;br/&gt;
  Thinking about your decisions is a great way to ask questions like &quot;what if?&quot;. Thinking about your decisions might not be the easiest because a lot of times when we make a decision we want to put the situation behind us because why waste more time on something thats resolved? well it not a waste if it can help you improve and think of potential things that you might have missed in your intial analysis. Reworking things you have done before helps you find mistakes you might have made and improve your self and your work. &lt;br/&gt;
  &lt;br/&gt;
 Working on your analytical side of your brain is something that can help you in all parts of your life. Analytical thinking is part of the greater critical thinking process. It doesn&#39;t matter what job you are in analytical thinking will help you improve and I highly recommend anyone work on improving this side of your brain as it can only benefit you. In the security world we live on analytical thinking and we need to excel at it to do well in the field. If your wanting to be an expert in the field then practice these things and you will get there in no time. &lt;br/&gt;
  &lt;br/&gt;
  if your are looking for ways to improve your learning how things work we have a few articles here that can help. &lt;br/&gt;
  if you are just starting out&lt;br/&gt;
  &lt;a href=&quot;https://localtechrepair.blogspot.com/2015/08/college-not-required-guide-to-starting.html&quot;&gt;College not required: A guide to starting in InfoSec &lt;/a&gt;&lt;br/&gt;
  if your looking for more&lt;br/&gt;
  &lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html&quot;&gt;Information Security Training&lt;/a&gt;&lt;br/&gt;
&lt;/span&gt;

</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/8112850320223859274/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/how-to-think-analytically.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/8112850320223859274'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/8112850320223859274'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/how-to-think-analytically.html' title='How to think Analytically'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-5962233532203165617</id><published>2019-05-21T10:55:00.001-07:00</published><updated>2019-05-22T16:28:33.376-07:00</updated><title type='text'>What I been up to</title><content type='html'>Figured I would talk about what I been up to these past few years and why I haven&#39;t been posting much.  &lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;!-- Popular posts-video --&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;Over the past 3 years I have started doing a new IT security for a startup that has taken a lot of my processing cycles and haven&#39;t had much time to focus on creating new content on here. Along with the G+ change and trying to figure out were I would end up has kinda made me unmotivated to really continue creating articles. I tried to start over on MeWe after the G+ shutdown though that just been as hard to start from scratch again. Though even though I have one of the largest Technology groups on the site its a fraction of the 256k member community I had on G+. Though if you like to join here is a &lt;a href=&quot;https://mewe.com/join/hackingsecurity&quot;&gt;link&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Over the past few years I been focusing on a lot of different topics in life between moving and trying to figure out what I want to do. I have moved up quickly in my career to the point I am doing less technical work and more managerial and training new security professionals. This definitely has effected my motivation to post more as an INTJ it takes a bit out of me doing teaching. But with that note I was asked by my coworkers to try to start writing more and explaining complex problems in defensive security. So I am going to try to make an effort to write more and try to do some video tutorials or just podcast type of videos on youtube. &lt;br /&gt;
&lt;br /&gt;
Hope that all this will help you all continue improving your skills as it will improve mine to do it. &lt;br /&gt;
Thanks, &lt;br /&gt;
Josh&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/5962233532203165617/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/what-i-been-up-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5962233532203165617'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5962233532203165617'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2019/05/what-i-been-up-to.html' title='What I been up to'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-3111826906754946965</id><published>2017-07-18T12:50:00.000-07:00</published><updated>2019-05-21T11:01:19.136-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Splunk"/><title type='text'>Information Security Training </title><content type='html'>Here is some training information for the cyber security analyst may need to know to be effective at monitoring the network of an organization. This is just a stripped down and formatted a little different than some of the other articles that I have written before. Lot of the resources will be the same. &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;!-- Popular posts-video --&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:TrackMoves/&gt;   &lt;w:TrackFormatting/&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:DoNotPromoteQF/&gt;   &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;    &lt;w:SplitPgBreakAndParaMark/&gt;    &lt;w:EnableOpenTypeKerning/&gt;    &lt;w:DontFlipMirrorIndents/&gt;    &lt;w:OverrideTableStyleHps/&gt;   &lt;/w:Compatibility&gt;   &lt;m:mathPr&gt;    &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;    &lt;m:brkBin m:val=&quot;before&quot;/&gt;    &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;    &lt;m:smallFrac m:val=&quot;off&quot;/&gt;    &lt;m:dispDef/&gt;    &lt;m:lMargin m:val=&quot;0&quot;/&gt;    &lt;m:rMargin m:val=&quot;0&quot;/&gt;    &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;    &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;    &lt;m:intLim m:val=&quot;subSup&quot;/&gt;    &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;  &lt;br /&gt;
&lt;div class=&quot;MsoTocHeading&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;480&quot; src=&quot;https://embed.coggle.it/diagram/WUfi54WDXgAB6iGY/71cb408b42237284e247877557b9e4a4835f81ad556bed46d8e9e2840a8e8230&quot; width=&quot;720&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
Direct link:https://embed.coggle.it/diagram/WUfi54WDXgAB6iGY/71cb408b42237284e247877557b9e4a4835f81ad556bed46d8e9e2840a8e8230&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Table of Content&lt;span style=&quot;color: windowtext; font-size: 11.0pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457921&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Education Resources (general)&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;1&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: minor-fareast; mso-no-proof: yes;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457922&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;News&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;1&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457923&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Casual Reading&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;2&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457924&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Research&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;2&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457925&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Tools&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;2&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457926&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Education&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;2&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457927&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Threat Maps (pew pew pew)&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;2&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457928&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Network Overview&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;.. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;3&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: minor-fareast; mso-no-proof: yes;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457929&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Scripting &amp;amp; Programming&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;4&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: minor-fareast; mso-no-proof: yes;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457930&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Security Specific&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;4&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457931&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Python&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;4&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457932&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Regular Expressions&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;4&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457933&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Ruby&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;4&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457934&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Assembly&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;4&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457935&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Web&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;5&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457936&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Bash&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;5&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457937&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-no-proof: yes;&quot;&gt;Powershell&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;5&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457938&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Offensive Security/Red  Team&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;.. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;6&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: minor-fareast; mso-no-proof: yes;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457939&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Setting up Lab:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;6&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457940&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Learning Exploit process  and testing:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;6&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457941&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;For more additional  resources for labs check out&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;6&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457942&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Information Gathering:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;6&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457943&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Phase 1.1 - People and  Organizational&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;7&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457944&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Phase 1.2 -  Infrastructure&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;7&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457945&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Analysis and Planning:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;7&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457946&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Vulnerability  Identification:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;7&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457947&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Exploitation:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;8&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457948&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Dump Windows Password  Hashes&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;8&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457949&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Windows Passing The Hash&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;8&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457950&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Windows Privilege  Escalation&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;8&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457951&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Exploit Development:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;8&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457952&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Post Exploitation:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;8&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457953&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Linux Privilege  Escalation&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;9&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457954&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Tunneling &amp;amp; Port  Forwarding&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;9&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457955&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Reporting:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;9&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457956&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Standards:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;10&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457957&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Offensive Security  Classes that aren&#39;t dedicated resources:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;10&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457958&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;General Security sites:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;10&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457959&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Malware Analysis/Reverse  Engineering&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;11&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: minor-fareast; mso-no-proof: yes;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457960&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Analysis:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;11&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457961&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Dynamic Analysis&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;11&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457962&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Static analysis&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;11&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457963&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Network Analysis&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;11&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457964&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Automated malware  analysis:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;12&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457965&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;online&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;12&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457966&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Distros&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;12&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457967&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Tools:&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;12&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457968&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Book Recommendations&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;13&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: minor-fareast; mso-no-proof: yes;&quot;&gt;&lt;/span&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457969&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Splunk&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;13&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457970&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Monitoring/IR/Network  Forensics&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;14&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457971&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Pentesting&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;14&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457972&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Traditional Forensics&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;15&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457973&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Application Security&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;15&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457974&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Exploit Creation&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;15&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457975&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Web Security&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;15&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457976&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Mobile Security&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;16&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://localtechrepair.blogspot.com/2017/07/information-security-training.html#_Toc480457977&quot;&gt;&lt;span style=&quot;mso-no-proof: yes;&quot;&gt;Reverse  Engineering/Malware Analysis&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1 dotted;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext; display: none; mso-hide: screen; mso-no-proof: yes; text-decoration: none; text-underline: none;&quot;&gt;16&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457921&quot;&gt;&amp;nbsp;&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1&gt;&lt;span style=&quot;mso-bookmark: _Toc480457921;&quot;&gt;Education Resources (general)&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Look at the subpages for a topic and resources for learning it. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457922&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;News&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l9 level1 lfo1; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.reddit.com/r/netsec/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://www.reddit.com/r/netsec/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l12 level1 lfo2; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://isc.sans.edu/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://isc.sans.edu/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l7 level1 lfo3; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.tripwire.com/state-of-security/latest-security-news/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;http://www.tripwire.com/state-of-security/latest-security-news/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l3 level1 lfo4; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://securelist.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://securelist.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l10 level1 lfo5; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.securityweek.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;http://www.securityweek.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blog.onapsis.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blog.onapsis.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.darkreading.com/rss_simple.asp&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://www.darkreading.com/rss_simple.asp&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blog.didierstevens.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blog.didierstevens.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://firmwaresecurity.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://firmwaresecurity.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/GrahamCluleysBlog&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedburner.com/GrahamCluleysBlog&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds2.feedburner.com/HelpNetSecurity&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds2.feedburner.com/HelpNetSecurity&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/infosecResources&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedburner.com/infosecResources&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://krebsonsecurity.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://krebsonsecurity.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blog.malwarebytes.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blog.malwarebytes.org/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.malwaretech.com/feeds/posts/default&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://www.malwaretech.com/feeds/posts/default&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blogs.technet.com/b/msrc/rss.aspx&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blogs.technet.com/b/msrc/rss.aspx&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/NakedSecurity&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedburner.com/NakedSecurity&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/PCSympathy?format=xml&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedburner.com/PCSympathy?format=xml&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://seclists.org/rss/pen-test.rss&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://seclists.org/rss/pen-test.rss&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://googleprojectzero.blogspot.com/feeds/posts/default&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://googleprojectzero.blogspot.com/feeds/posts/default&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://securityblog.redhat.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://securityblog.redhat.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://research.zscaler.com/feeds/posts/default&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://research.zscaler.com/feeds/posts/default&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.schneier.com/blog/atom.xml&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;https://www.schneier.com/blog/atom.xml&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://securityaffairs.co/wordpress/feed&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://securityaffairs.co/wordpress/feed&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.pentestpartners.com/blog/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;https://www.pentestpartners.com/blog/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.trustwave.com/rss/SpiderLabs-Blog&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;https://www.trustwave.com/rss/SpiderLabs-Blog&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://thehackernews.com/feeds/posts/default&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://thehackernews.com/feeds/posts/default&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/tripwire-state-of-security&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedburner.com/tripwire-state-of-security&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://threatpost.com/en_us/rss.xml&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://threatpost.com/en_us/rss.xml&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedburner.com/TroyHunt&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedburner.com/TroyHunt&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://feeds.feedblitz.com/alienvaultotx&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://feeds.feedblitz.com/alienvaultotx&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blog.gentilkiwi.com/feed&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blog.gentilkiwi.com/feed&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.bulbsecurity.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://www.bulbsecurity.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://cybersecology.com/atom/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://cybersecology.com/atom/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://davidjorm.blogspot.com/feeds/posts/default?alt=rss&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://davidjorm.blogspot.com/feeds/posts/default?alt=rss&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://labs.detectify.com/rss&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://labs.detectify.com/rss&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.hotforsecurity.com/blog/category/e-threats-2/feed&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://www.hotforsecurity.com/blog/category/e-threats-2/feed&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://kalypto.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://kalypto.org/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/security/rss/advisory&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;https://technet.microsoft.com/en-us/security/rss/advisory&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://community.rapid7.com/community/metasploit/blog/feeds/posts&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;https://community.rapid7.com/community/metasploit/blog/feeds/posts&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.blogger.com/feeds/2059619926966266961/posts/default&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;https://www.blogger.com/feeds/2059619926966266961/posts/default&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blog.silentsignal.eu/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blog.silentsignal.eu/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://blog.strategiccyber.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://blog.strategiccyber.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-list: l11 level1 lfo13; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://opensecuritytraining.info/ChangeBlog/rss.xml&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;http://opensecuritytraining.info/ChangeBlog/rss.xml&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-add-space: auto; vertical-align: middle;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;!-- Popular posts-video --&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457923&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Casual Reading&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l5 level1 lfo6; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://arstechnica.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;http://arstechnica.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457924&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Research&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l4 level1 lfo7; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.cl.cam.ac.uk/research/security/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;http://www.cl.cam.ac.uk/research/security/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457925&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Tools&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l0 level1 lfo8; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.alienvault.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://www.alienvault.com&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l2 level1 lfo9; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://regex101.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://regex101.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l2 level1 lfo9; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://malwr.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://malwr.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457926&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Education&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l6 level1 lfo10; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://fedvte.usalearning.gov/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://fedvte.usalearning.gov/&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;only available to USA Federal Employees but has free resources for them&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457927&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Threat Maps (pew pew pew)&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l1 level1 lfo11; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.stateoftheinternet.com/trends-visualizations-ip-reputation-client-reputation-for-website-security-global-map-of-attacking-ip-addresses.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://www.stateoftheinternet.com/trends-visualizations-ip-reputation-client-reputation-for-website-security-global-map-of-attacking-ip-addresses.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in; mso-list: l8 level1 lfo12; tab-stops: list .5in; text-indent: -.25in; vertical-align: middle;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;symbol&amp;quot;; font-size: 10.0pt;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.fireeye.com/cyber-map/threat-map.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;https://www.fireeye.com/cyber-map/threat-map.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;h1&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457928&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Network Overview&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://www.cybrary.it/course/comptia-network-plus/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Network+&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://www.cybrary.it/course/cisco-ccna/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;CCNA&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://nmap.org/book/man.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 10.0pt;&quot;&gt;Nmap&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Internet_protocol_suite&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot; , sans-serif; font-size: 10.0pt;&quot;&gt;TCP/IP&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;times new roman&amp;quot; , serif; font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/Pcap.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Pcap Analysis &amp;amp; Network Hunting&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/Flow.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Flow Analysis &amp;amp; Network Hunting&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12.0pt; mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/NetworkForensics.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introduction to Network Forensics&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12.0pt; mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;From &lt;/span&gt;&lt;a href=&quot;https://fedvte.usalearning.gov/mycourses.php?group=1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;USAlearning.gov&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Cisco CCNA&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Cisco CCENT&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;LAN Security Using Switch Features&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Network Layer 1 &amp;amp; 2 Troubleshooting&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Network Monitoring with Open Source Tools&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;SiLK Traffic Analysis&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Wireless Network Security&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Security and DNS &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Securing the Network Perimeter&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Advanced PCAP Analysis and Signature Development (APA)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introduction and Layer 1&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-2&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layer 2 - Data Link&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-3&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layer 3 - Network, Part 1: Addressing &amp;amp; Masking&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-4&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layer 3 - Network, Part 2: Routing&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-5&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layer 3 - Network, Part 3: Communication&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-6&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layer 4 - Transport&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-7&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layers 5 &amp;amp; 6 - Session and Presentation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-8&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Layer 7 - Application&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/2-9&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Inter-Layer Communication &amp;amp; Conclusions&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://www.securitytube.net/groups?operation=view&amp;amp;groupId=1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Router Hacking Series&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://www.securitytube.net/groups?operation=view&amp;amp;groupId=9&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Wireless LAN Security and Penetration Testing Megaprimer&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;!-- Popular posts-video --&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;h1&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457929&quot;&gt;Scripting &amp;amp; Programming&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457930&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Security Specific&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; border: none; margin-left: 24.0pt; mso-border-alt: solid #A3A3A3 1.0pt; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184;&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;   &lt;td style=&quot;border: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 176.75pt;&quot; valign=&quot;top&quot; width=&quot;179&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroSecureCoding.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Intro   to Secure Coding&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-left: none; border: solid #A3A3A3 1.0pt; mso-border-left-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 363.9pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;A   short, focused primer related to secure coding.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 1; mso-yfti-lastrow: yes;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 176.75pt;&quot; valign=&quot;top&quot; width=&quot;179&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://www.cybrary.it/course/secure-coding/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Secure   Coding&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid #A3A3A3 1.0pt; border-left: none; border-right: solid #A3A3A3 1.0pt; border-top: none; mso-border-left-alt: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 363.9pt;&quot; valign=&quot;top&quot; width=&quot;354&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457931&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Python&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;border-collapse: collapse; border: none; margin-left: 24.0pt; mso-border-alt: solid #A3A3A3 1.0pt; mso-padding-alt: 0in 0in 0in 0in; mso-yfti-tbllook: 1184;&quot;&gt;&lt;tbody&gt;
&lt;tr style=&quot;mso-yfti-firstrow: yes; mso-yfti-irow: 0;&quot;&gt;   &lt;td style=&quot;border: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 174.4pt;&quot; valign=&quot;top&quot; width=&quot;180&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://www.codecademy.com/learn/python&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Python   Training&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-left: none; border: solid #A3A3A3 1.0pt; mso-border-left-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 366.0pt;&quot; valign=&quot;top&quot; width=&quot;353&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Codecademy&#39;s   browser-based, interactive Python training.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 1;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 174.4pt;&quot; valign=&quot;top&quot; width=&quot;180&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://www.learnpython.org/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Python Training&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid #A3A3A3 1.0pt; border-left: none; border-right: solid #A3A3A3 1.0pt; border-top: none; mso-border-left-alt: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 366.0pt;&quot; valign=&quot;top&quot; width=&quot;353&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;LearnPython.org&#39;s   browser-based, interactive Python training. &lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 2;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 174.4pt;&quot; valign=&quot;top&quot; width=&quot;180&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://www.primalsecurity.net/tutorials/python-tutorials/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Python   Tutorials&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid #A3A3A3 1.0pt; border-left: none; border-right: solid #A3A3A3 1.0pt; border-top: none; mso-border-left-alt: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 366.0pt;&quot; valign=&quot;top&quot; width=&quot;353&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Primal   Security&#39;s InfoSec focused Python tutorials.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 3;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 174.4pt;&quot; valign=&quot;top&quot; width=&quot;180&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=s9zfgP02MTc&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Offensive   Python for Web Hackers&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid #A3A3A3 1.0pt; border-left: none; border-right: solid #A3A3A3 1.0pt; border-top: none; mso-border-left-alt: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 366.0pt;&quot; valign=&quot;top&quot; width=&quot;353&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Create   your own clients, tools, and test cases using Python.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 4;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 174.4pt;&quot; valign=&quot;top&quot; width=&quot;180&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://learnpythonthehardway.org/book/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Learn   Python The Hard Way&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid #A3A3A3 1.0pt; border-left: none; border-right: solid #A3A3A3 1.0pt; border-top: none; mso-border-left-alt: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 366.0pt;&quot; valign=&quot;top&quot; width=&quot;353&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Free   digital copy of the third edition of Zed Shaw&#39;s Python book.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;tr style=&quot;mso-yfti-irow: 5; mso-yfti-lastrow: yes;&quot;&gt;   &lt;td style=&quot;border-top: none; border: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 174.4pt;&quot; valign=&quot;top&quot; width=&quot;180&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/python-security-professionals/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Python   for Security Professionals&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;   &lt;td style=&quot;border-bottom: solid #A3A3A3 1.0pt; border-left: none; border-right: solid #A3A3A3 1.0pt; border-top: none; mso-border-left-alt: solid #A3A3A3 1.0pt; mso-border-top-alt: solid #A3A3A3 1.0pt; padding: 4.0pt 4.0pt 4.0pt 4.0pt; width: 366.0pt;&quot; valign=&quot;top&quot; width=&quot;353&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457932&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Regular Expressions&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://regex101.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;regex101.com&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; helps explain what your regex does&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://regexone.com/&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;regexone.com&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; well walk you through tutorials to learn it. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457933&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Ruby&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.codecademy.com/learn/ruby&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Ruby Training&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457934&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Assembly&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroX86.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introductory Intel x86: Architecture, Assembly, Applications, &amp;amp; Alliteration&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroX86-64.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introductory Intel x86-64: Architecture, Assembly, Applications, &amp;amp; Alliteration&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroARM.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introduction to ARM&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntermediateX86.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Intermediate Intel x86: Architecture, Assembly, Applications, &amp;amp; Alliteration&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/AdvancedX86-VTX.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Advanced x86: Virtualization with Intel VT-x&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroBIOS.html&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Advanced x86: Introduction to BIOS &amp;amp; SMM&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.securitytube.net/groups?operation=view&amp;amp;groupId=5&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Assembly Language Megaprimer for Linux&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.securitytube.net/groups?operation=view&amp;amp;groupId=6&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Windows Assembly Language Megaprimer&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457935&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Web&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-1-1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;PHP - Introduction&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-1-2&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;PHP - Syntax &amp;amp; Variables&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-1-3&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;PHP - Operators&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-1-4&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;PHP - Flow Control&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-1-5&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Basic Web Security&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-1-6&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Installing Apache &amp;amp; PHP&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457936&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Bash&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-2-1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Scripting Introduction &amp;amp; Linux Review&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-2-2&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Variables &amp;amp; Parameters&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-2-3&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Flow Control&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-2-4&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Parsing &amp;amp; Scripting&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-2-5&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Practical Uses &amp;amp; Conclusion&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457937&quot;&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Powershell&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-3-1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introduction to PowerShell&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-3-2&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Cmdlets&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-3-3&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Scripting, Variables and Syntax&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-3-4&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Flow Control&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials/view/3-3-5&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Practical Uses &amp;amp; Conclusion&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=2manBaoP7Bk&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;No Tools No Problem Building a PowerShell Botnet&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; – Christopher Cambell&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=OJNWgNARnAs&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Grey Hat Powershell &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;–&amp;nbsp;Ben0xA&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=4X_uBL2YpmA&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Practical PowerShell Programming for Professional People&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; – Ben0xA&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=ottfZFRSsj4&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Powershell Fu with Metasploit&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt; – Ben Turner &amp;amp; Dave Hardy&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=Pq9t59w0mUI&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Building an empire with Powershell &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;-Will Schroeder &amp;amp; Justin Warner&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;From &lt;/span&gt;&lt;a href=&quot;https://fedvte.usalearning.gov/mycourses.php?group=1&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;USAlearning.gov&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Introduction to Windows Scripting&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;mso-ascii-font-family: Calibri; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-hansi-font-family: Calibri;&quot;&gt;Advanced Windows Scripting&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;h1&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457938&quot;&gt;Offensive Security/Red Team&lt;/a&gt;&lt;/h1&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457939&quot;&gt;Setting up Lab:&lt;/a&gt;&lt;/h2&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457940&quot;&gt;Learning Exploit process and testing:&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Vulnerable web Service&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Broken Web Application&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://blog.cobaltstrike.com/2015/06/04/cobalt-strike-penetration-testing-labs-download/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Setting up a Penetration Testing Labs&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://code.google.com/p/owaspbwa/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://code.google.com/p/owaspbwa/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.mavensecurity.com/web_security_dojo/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.mavensecurity.com/web_security_dojo/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://hackingdojo.com/dojo-media/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://hackingdojo.com/dojo-media/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://informatica.uv.es/~carlos/docencia/netinvm/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://informatica.uv.es/~carlos/docencia/netinvm/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.bonsai-sec.com/en/research/moth.php&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.bonsai-sec.com/en/research/moth.php&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/metasploitable/files/Metasploitable2/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://sourceforge.net/projects/metasploitable/files/Metasploitable2/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/lampsecurity/?source=navbar&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://sourceforge.net/projects/lampsecurity/?source=navbar&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.hacking-lab.com/index.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.hacking-lab.com/index.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/virtualhacking/files/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://sourceforge.net/projects/virtualhacking/files/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.dvwa.co.uk/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.dvwa.co.uk/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/thebutterflytmp/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://sourceforge.net/projects/thebutterflytmp/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://magikh0e.ihtb.org/pubPapers/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://magikh0e.ihtb.org/pubPapers/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457941&quot;&gt;For more additional resources for labs check out&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.amanhardikar.com/mindmaps/Practice.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.amanhardikar.com/mindmaps/Practice.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457942&quot;&gt;Information Gathering:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2015/09/penetration-test-information-gathering.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Penetration Testing Information Gathering&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Open-sourceintelligence&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://en.wikipedia.org/wiki/Open-sourceintelligence&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.slideshare.net/Laramies/tactical-information-gathering&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.slideshare.net/Laramies/tactical-information-gathering&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.infond.fr/2010/05/toturial-footprinting.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.infond.fr/2010/05/toturial-footprinting.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457943&quot;&gt;Phase 1.1 - People and Organizational&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.spokeo.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.spokeo.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.spoke.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.spoke.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.xing.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.xing.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.zoominfo.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.zoominfo.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://pipl.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://pipl.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.zabasearch.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.zabasearch.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.searchbug.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.searchbug.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://skipease.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://skipease.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://addictomatic.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://addictomatic.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://socialmention.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://socialmention.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://entitycube.research.microsoft.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://entitycube.research.microsoft.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.yasni.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.yasni.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.glassdoor.com/index.htm&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.glassdoor.com/index.htm&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://connect.data.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://connect.data.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.tineye.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.tineye.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.peekyou.com/_&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.peekyou.com/_&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.sec.gov/edgar/searchedgar/companysearch.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;EDGAR&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457944&quot;&gt;Phase 1.2 - Infrastructure&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://uptime.netcraft.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://uptime.netcraft.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.shodanhq.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.shodanhq.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.domaintools.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.domaintools.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://centralops.net/co/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://centralops.net/co/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://whois.webhosting.info/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://whois.webhosting.info/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.ssllabs.com/ssltest/analyze.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.ssllabs.com/ssltest/analyze.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.exploit-db.com/google-hacking-database/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.exploit-db.com/google-hacking-database/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.my-ip-neighbors.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.my-ip-neighbors.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://tools.digitalpoint.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://tools.digitalpoint.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;!-- Popular posts-video --&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457945&quot;&gt;Analysis and Planning:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457946&quot;&gt;Vulnerability Identification:&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroductionToVulnerabilityAssessment.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Introduction to Vulnerability Assessment&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=-7ThbeAMqkw&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Introduction To Using The Nessus Vulnerability Scanner&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=qpdU1t2xyok&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;OpenVas Tutorial&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.cybrary.it/course/advanced-penetration-testing/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.cybrary.it/course/advanced-penetration-testing/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; select module 5&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Nessus&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Nmap scripting engine&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Webapp, xampp, webdav, nikto&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Directory transversals&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457947&quot;&gt;Exploitation:&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://pwnwiki.io/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://pwnwiki.io&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://download.vulnhub.com/pentesterlab/phpinclude_and_post_exploitation.pdf&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://download.vulnhub.com/pentesterlab/phpinclude_and_post_exploitation.pdf&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://ru.scribd.com/doc/245679444/hak5-org-OSXPost-Exploitation-copy-20130228-pdf#scribd&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://ru.scribd.com/doc/245679444/hak5-org-OSXPost-Exploitation-copy-20130228-pdf#scribd&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://cyberwar.nl/d/hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://cyberwar.nl/d/hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.yumpu.com/en/document/view/14963680/from-sqli-to-shell_&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.yumpu.com/en/document/view/14963680/from-sqli-to-shell_&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457948&quot;&gt;Dump Windows Password Hashes&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://bernardodamele.blogspot.com/2011/12/dump-windows-password-hashes.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://bernardodamele.blogspot.com/2011/12/dump-windows-password-hashes.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457949&quot;&gt;Windows Passing The Hash&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.kali.org/penetration-testing/passing-hash-remote-desktop/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.kali.org/penetration-testing/passing-hash-remote-desktop/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.kali.org/kali-monday/pass-the-hash-toolkit-winexe-updates/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.kali.org/kali-monday/pass-the-hash-toolkit-winexe-updates/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457950&quot;&gt;Windows Privilege Escalation&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://labs.mwrinfosecurity.com/system/assets/760/original/Windows_Services_-All_roads_lead_to_SYSTEM.pdf(https:/labs.mwrinfosecurity.com/system/assets/760/original/WindowsServices-_All_roads_lead_to_SYSTEM.pdf)_&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://labs.mwrinfosecurity.com/system/assets/760/original/Windows_Services_-All_roads_lead_to_SYSTEM.pdf(https://labs.mwrinfosecurity.com/system/assets/760/original/WindowsServices-_All_roads_lead_to_SYSTEM.pdf)_&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://travisaltman.com/windows-privilege-escalation-via-weak-service-permission&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://travisaltman.com/windows-privilege-escalation-via-weak-service-permission&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;s/&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://github.com/0xdeafbeef/PSSecSnapshot&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://github.com/0xdeafbeef/PSSecSnapshot&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.fuzzysecurity.com/tutorials/16.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.fuzzysecurity.com/tutorials/16.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=kMG8IsCohHA&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.youtube.com/watch?v=kMG8IsCohHA&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=8xJaaQlpBo&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.youtube.com/watch?v=8xJaaQlpBo&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.greyhathacker.net/?p=738&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.greyhathacker.net/?p=738&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://bernardodamele.blogspot.ru/2011/12/dump-windows-password-hashes.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://bernardodamele.blogspot.ru/2011/12/dump-windows-password-hashes.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457951&quot;&gt;Exploit Development:&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/Exploits1.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Introduction to Software Exploits (Exploits 1)&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/Exploits2.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Exploits 2: Exploitation in the Windows Environment&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.corelan.be/index.php/articles/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Corelan Exploits&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Corelan Team&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/user/OpenSecurityTraining/playlists&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Opensecurity Training Playlist&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Opensecurity training&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.primalsecurity.net/tutorials/exploit-tutorials/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Primal Security Exploit Tutorials &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;– Primal Security&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.fuzzysecurity.com/tutorials.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;FuzzySecurity Tutorials&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – FuzzySecurity&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://community.rapid7.com/community/metasploit/blog/2012/07/05/part-1-metasploit-module-development--the-series&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit exploit development&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&amp;nbsp;– Rapid7&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://sneakerhax.com/jumping-into-exploit-development/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Jumping into exploit development&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Sneakerhax&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=-ZRZMIsD9YE&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Moving past Metasploit writing your first exploit &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;– Calvin Hedler&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457952&quot;&gt;Post Exploitation:&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/post-exploitation-hacking/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Post Exploitation Hacking&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.harmj0y.net/blog/powershell/powerup-a-usage-guide/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Powerup: A usage guide &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;– harmj0y&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://community.rapid7.com/community/metasploit/blog/2015/08/11/metasploit-local-exploit-suggester-do-less-get-more&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit Local Exploit Suggester: Do Less, Get More!&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Rapid7&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.trustwave.com/Resources/SpiderLabs-Blog/My-5-Top-Ways-to-Escalate-Privileges/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;My 5 Top Ways to Escalate Privileges&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – SpiderLabs&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Basic Linux Privilege Escalation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – g0tmi1k&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=kMG8IsCohHA&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Encyclopedia Of Windows Privilege Escalation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Brett Moore&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=_8xJaaQlpBo&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Windows Attacks AT is the new black&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Mubix (Rob Fuller) &amp;amp; Carnalownage (Chris Gates)&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://fuzzysecurity.com/tutorials/16.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Windows Privilege Escalation Fundamentals&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Fuzzysecurity&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://github.com/mubix/post-exploitation-wiki&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Post Exploitation Wiki &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;– Mubix&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=yOC7blJfrJE&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Post Exploitation 2.0&amp;nbsp;Veil-Pillage Defcon 22&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Harmj0y&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=yhuXbkY3s0E&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;I Hunt Sys Admins&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Harmj0y&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=gNUhK6G8EQ4&amp;amp;index=1&amp;amp;list=PLdKs6OkLsqrj2c3Bl9xZZvo46cgNxTioj&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Tactical Post Exploitation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Carlos Perez&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=sTU-70dD-Ok&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Abusing Active Directory in Post Exploitation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Carlos Perez&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=n2nptntIsn4&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Pillage the Village Redux&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – John Strand and Ed Skoudis&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=NXTr4bomAxk&amp;amp;index=20&amp;amp;list=PLdKs6OkLsqrgtG_H_v90D9KlqBU36PFlu&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Operating in the Shadows&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; – Carlos Perez&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457953&quot;&gt;Linux Privilege Escalation&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://incolumitas.com/wp-content/uploads/2012/12/blackhats_view.pdf&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://incolumitas.com/wp-content/uploads/2012/12/blackhats_view.pdf&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://pentestmonkey.net/tools/audit/unix-privesc-check&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://pentestmonkey.net/tools/audit/unix-privesc-check&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.rebootuser.com/?page_id=1721&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.rebootuser.com/?page_id=1721&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.rebootuser.com/?p=1758&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.rebootuser.com/?p=1758&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.rebootuser.com/?p=1623&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.rebootuser.com/?p=1623&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://insidetrust.blogspot.nl/2011/04/quick-guide-to-linux-privilege.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://insidetrust.blogspot.nl/2011/04/quick-guide-to-linux-privilege.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457954&quot;&gt;Tunneling &amp;amp; Port Forwarding&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://highon.coffee/blog/reverse-shell-cheat-sheet/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://highon.coffee/blog/reverse-shell-cheat-sheet/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://staff.washington.edu/corey/fw/ssh-port-forwarding.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://staff.washington.edu/corey/fw/ssh-port-forwarding.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://magikh0e.ihtb.org/pubPapers/ssh_gymnastics_tunneling.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://magikh0e.ihtb.org/pubPapers/ssh_gymnastics_tunneling.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.debianadmin.com/howto-use-ssh-local-and-remote-port-forwarding.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.debianadmin.com/howto-use-ssh-local-and-remote-port-forwarding.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.danscourses.com/Network-Penetration-Testing/metasploit-pivoting.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.danscourses.com/Network-Penetration-Testing/metasploit-pivoting.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://carnal0wnage.attackresearch.com/2007/09/using-metasploit-to-pivot-through_06.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://carnal0wnage.attackresearch.com/2007/09/using-metasploit-to-pivot-through_06.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Portfwd&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.offensive-security.com/metasploit-unleashed/Portfwd&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Pivoting&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.offensive-security.com/metasploit-unleashed/Pivoting&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.howtoforge.com/reverse-ssh-tunneling&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://www.howtoforge.com/reverse-ssh-tunneling&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://ftp.acc.umu.se/pub/putty/putty-0.57/htmldoc/Chapter7.htmla_&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;http://ftp.acc.umu.se/pub/putty/putty-0.57/htmldoc/Chapter7.htmla_&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457955&quot;&gt;Reporting:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.pentest-standard.org/index.php/Reporting&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Reporting Standards&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://dradisframework.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Dradis&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=tH01_5-Tkg0&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.youtube.com/watch?v=tH01_5-Tkg0&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.gremwell.com/what_is_magictree&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;magictree&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://help.rapid7.com/metasploit/Content/reporting/reports.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit report generation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.advancedpentest.com/help-reporting&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;CobaltStrike Reports&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457956&quot;&gt;Standards:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.pentest-standard.org/index.php/Main_Page&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Pentest Standards&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457957&quot;&gt;Offensive Security Classes that aren&#39;t dedicated resources:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/ethical-hacking/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Penetration Testing and Ethical Hacking&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/comptia-security-plus/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Security+&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/playlist?list=PL9HO6M_MU2nesxSmhJjEvwLhUoHPHmXvz&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Red Teaming Basics&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; - older&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.cobaltstrike.com/training&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Advanced Threat Tactics&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; -newer&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/cryptography/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Cryptography&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/CryptoCore.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Understanding Cryptology: Core Concepts&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/Cryptanalysis.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Understanding Cryptology: Cryptanalysis&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/advanced-penetration-testing/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Advanced Penetration Testing&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/comptia-casp/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;CASP&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/cissp/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;CISSP&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/malware-analysis/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Intro to Malware Analysis and Reverse Engineering&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.cybrary.it/course/metasploit/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.cybrary.it/course/social-engineering/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Social Engineering and Manipulation&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/AndroidForensics.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Android Forensics &amp;amp; Security Testing&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/IntroductionToVulnerabilityAssessment.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Introduction to Vulnerability Assessment&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/CISSP-Main.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;https://www.offensive-security.com/metasploit-unleashed/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit Unleashed&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457958&quot;&gt;General Security sites:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://securitytube.net/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;SecurityTube.net&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.exploit-db.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Exploit Database&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://www.hackingtutorials.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Hacking Tutorials&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Information Security tools and resources&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457959&quot;&gt;Malware Analysis/Reverse Engineering&lt;/a&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457960&quot;&gt;Analysis:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.cybrary.it/course/malware-analysis/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Intro to malware analysis and reverse engineering&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457961&quot;&gt;Dynamic Analysis&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/MalwareDynamicAnalysis.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Dynamic Malware Analysis&lt;/span&gt;&lt;/a&gt;&lt;b&gt;&lt;span style=&quot;color: #0072bc; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457962&quot;&gt;Static analysis&lt;/a&gt;&lt;span style=&quot;mso-bookmark: _Toc480457962;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: windowtext;&quot;&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/ReverseEngineeringMalware.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Reverse Engineering Malware&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457963&quot;&gt;Network Analysis&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/NetworkForensics.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Intro to Network Forensics&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://opensecuritytraining.info/Pcap.html&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Flow analysis and Network Hunting&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #0072bc; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;and videos can be found &lt;/span&gt;&lt;a href=&quot;https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kPylwy-nZc1DeXH838-hca&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;b&gt;&lt;span style=&quot;color: #0072bc; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://resources.infosecinstitute.com/complete-tour-of-pe-and-elf-part-1/#article&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;PE and Elf file Structure&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://resources.infosecinstitute.com/malware-researchers-handbook-introduction-all-the-stuff-you-know-before-starting-research/#article&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Malware Researchers Handbook&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457964&quot;&gt;Automated malware analysis:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.cuckoosandbox.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.cuckoosandbox.org/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457965&quot;&gt;online&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.payload-security.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.payload-security.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.virustotal.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://www.virustotal.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://malwr.com/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;https://malwr.com/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457966&quot;&gt;Distros&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://digital-forensics.sans.org/community/downloads&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;SIFT&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://remnux.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Remnux&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457967&quot;&gt;Tools:&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-theme-font: major-fareast;&quot;&gt;&lt;a href=&quot;http://sourceforge.net/projects/regshot/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;RegShot&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; is for comparing differences in registry and filesystem from clean state to after malware was installed to see what happened.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://jacquelin.potier.free.fr/winapioverride32/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;WinAPIOverride&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; helps you follow the injection process of dlls and api calls for a running process to see what it did and where it went.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.wireshark.org/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;wireshark &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;to identify network traffic and if it is calling out.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/library/bb490947.aspx&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;netstat &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;is a built in tool in windows to tell what connections and ports are open on the computer. common command is netstat -anob &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;sysinternals &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;suite has lots of tools like process monitors and what not to help identify what is going on on the computer.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.gmer.net/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Gmer &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;can help detect hidden files and rootkits that may be hiding.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.virtualbox.org/wiki/Downloads&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;virtual box &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;is important for keeping malware isolated.&amp;nbsp; granted other VMs could work to as long as you can limit them to the host network and can&#39;t get out to compromise other machines.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://ntcore.com/exsuite.php&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;CFF Explorer Suite&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; is a tool to explore the PE file and DLLs. this will help you explore a exe file and what dlls that it is loading or has packaged with it.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/sysinternals/bb897441.aspx&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Sigcheck &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;helps you check and verify the signatures on files to see if a dll is signed by microsoft or vendor or if its unsigned and not legitimate file.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/attrib.mspx?mfr=true&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;attrib &lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;command is very useful for changing attributes via command line.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;a href=&quot;http://www.rohitab.com/apimonitor&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;API Monitor&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt; is a way to track and monitor applications that track api calls.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;!-- Popular posts-video --&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt; &lt;/span&gt;&lt;/div&gt;&lt;h1&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457968&quot;&gt;Book Recommendations&lt;/a&gt;&lt;/h1&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457969&quot;&gt;Splunk&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 27.0pt; margin-right: 0in; margin-top: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Splunk Developers Guide (Released 5/2015 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WAAcbo&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1785285297&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Splunk Essentials (Released 2/2015 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1rqrLDP&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1784398381&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Building Splunk Solutions, 2nd Edition (Released 10/2015 -&amp;nbsp; ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/23h8II7&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1514615746&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Splunk Operational Intelligence Cookbook (Released 10/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1Y1qL3y&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1849697841&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Implementing Splunk, 2nd Edition - (Released 7/2015 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1Y1qNbM&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1784391603&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457970&quot;&gt;Monitoring/IR/Network Forensics&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Data-Driven Security: Analysis, Visualization and Dashboards (Released 3/2014 - ASIN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1rqrLUz&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;B00MXHAU8A&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Network Security Through Data Analysis: Building Situational Awareness (Released 2/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/23h8PmJ&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1449357903&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Practice of Network Security Monitoring (Released 8/2013 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1rqrMb6&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593275099&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems (Released 7/2011 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1rqrNvJ&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593272669&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Applied Network Security Monitoring: Collection, Detection, and Analysis (Released 12/2013 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1X2wszQ&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0124172083&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan (Released 5/2015 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/21o3yus&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1491949406&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks (Released 4/2005 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WAAAqf&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593270461&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk (Released 8/2012 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1rqrPnh&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;007179039X&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Security Operations Center: Building, Operating, and Maintaining your SOC (Released 11/2015 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1Z0Fsnw&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0134052013&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Network Forensics: Tracking Hackers through Cyberspace (Released 6/2012 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/21o3GtU&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;B008CG8CYU&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Wireshark 101: Essential Skills for Network Analysis (Released 2/2013 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1rqrOzC&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1893939723&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457971&quot;&gt;Pentesting&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Nmap Network Scanning: The Official Project Guide to Network Discovery and Security Scanning (Released 1/2009 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1Z0FDPQ&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0979958717&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Hacking Exposed 7: Network Security Secrets and Solutions (Released 8/2012 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WAATkR&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0071780289&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Gray Hat Hacking The Ethical Hacker&#39;s Handbook, Fourth Edition (Released 1/2015 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1SEg9aL&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0071832386&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Browser Hacker&#39;s Handbook (Released 3/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/21o3RoW&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1118662091&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Metasploit: The Penetration Tester&#39;s Guide (Released 7/2011 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WAAWxa&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;159327288X&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457972&quot;&gt;Traditional Forensics&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Real Digital Forensics: Computer Security and Incident Response (Released 10/2005 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1ra2iOF&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0321240693&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Forensic Discovery (Released 1/2005 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1Z0FRq8&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0321703251&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Windows Forensic Analysis Toolkit, 4th Edition (Released 4/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WAB8fO&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0124171575&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Art of Memory Forensics (Released 7/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/21o40sA&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1118825098&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;File System Forensic Analysis (Released 3/2005 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1X2xbRz&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0321268172&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457973&quot;&gt;Application Security&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Art of Software Security Assessment&amp;nbsp; (Released 11/2006 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1X2xdc6&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0321444426&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;A Bug Hunter&#39;s Diary (Released 11/2011 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1SEgryh&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593273851&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Fuzzing: Brute Force Vulnerability Discovery (Released 7/2007 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1ra2Ns6&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0321446119&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457974&quot;&gt;Exploit Creation&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Hacking: The Art of Exploitation, 2nd Edition (Released 2/2008 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WADYl6&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593271441&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Shellcoder&#39;s Handbook: Discovering and Exploiting Security Holes, 2nd Edition (Released 8/2007 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1WAE0t0&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;047008023X&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457975&quot;&gt;Web Security&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Web Application Hacker&#39;s Handbook: Finding and Exploiting Security Flaws, 2nd Edition (Released 9/2011 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/26Ic3V0&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1118026470&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The Tangled Web: A Guide to Securing Modern Web Applications&amp;nbsp; (Released 11/2011 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1X2zOTp&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593273886&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457976&quot;&gt;Mobile Security&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Android Hacker&#39;s Handbook (Released 3/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1ra6Zba&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;111860864X&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Android Security Internals: An In-Depth Guide to Android&#39;s Security Architecture (Released 11/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1X2zT9F&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593275811&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;iOS Hacker&#39;s Handbook (Released 5/2012 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1X2zUdY&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1118204123&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It (Released 1/2012 - ISBN &lt;/span&gt;&lt;a href=&quot;http://amzn.to/1ra7aTW&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1449318746&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;_Toc480457977&quot;&gt;Reverse Engineering/Malware Analysis&lt;/a&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;The IDA Pro Book: The Unofficial Guide to the World&#39;s Most Popular Disassembler (Released 7/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/The-IDA-Pro-Book-Disassembler/dp/1593272898/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593272898&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Reversing: Secrets of Reverse Engineering (Released 4/2005 - ISBN &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0764574817&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (Released 2/2014 - ISBN &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1118787315&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Released 3/2012 - ISBN &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/Practical-Malware-Analysis-Hands--Dissecting/dp/1593272901/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;1593272901&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;Malware Analyst&#39;s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Released 11/2010 - ISBN &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033/&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;0470613033&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 11.0pt;&quot;&gt;)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHL0-uUeY2sO697QKy08xe-htPW_qKgq2YGG673QZIZzVPw_JZ-miP80qpx2Iq6Y7Ke4lwrrzzBIRQGNl7OKIx_7mR9B0cvpq2segdX64y0vTfSb8fhFV0iJ5e0aZxFB-I7gcOYQhZ3EwC/s1600/Cyber_Security_Analyst_Knowledge.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; data-original-height=&quot;884&quot; data-original-width=&quot;1600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHL0-uUeY2sO697QKy08xe-htPW_qKgq2YGG673QZIZzVPw_JZ-miP80qpx2Iq6Y7Ke4lwrrzzBIRQGNl7OKIx_7mR9B0cvpq2segdX64y0vTfSb8fhFV0iJ5e0aZxFB-I7gcOYQhZ3EwC/s1600/Cyber_Security_Analyst_Knowledge.png&quot; title=&quot;Cyber Security Analyst 1 Knowledge/Mind Map - Local Tech Repair&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Cyber Security Analyst Mind Map&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;false&quot;
  DefSemiHidden=&quot;false&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;371&quot;&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Indent&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;header&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footer&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index heading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of figures&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope address&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope return&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;line number&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;page number&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of authorities&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;macro&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;toa heading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Closing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Signature&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Default Paragraph Font&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Message Header&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Salutation&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Date&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Note Heading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Block Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Hyperlink&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;FollowedHyperlink&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Document Map&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Plain Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;E-mail Signature&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Top of Form&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Bottom of Form&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal (Web)&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Acronym&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Address&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Cite&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Code&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Definition&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Keyboard&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Preformatted&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Sample&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Typewriter&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Variable&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Table&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation subject&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;No List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Contemporary&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Elegant&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Professional&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Balloon Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;Table Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Theme&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Placeholder Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Revision&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; QFormat=&quot;true&quot;
   Name=&quot;List Paragraph&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Bibliography&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;41&quot; Name=&quot;Plain Table 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;42&quot; Name=&quot;Plain Table 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;43&quot; Name=&quot;Plain Table 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;44&quot; Name=&quot;Plain Table 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;45&quot; Name=&quot;Plain Table 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;40&quot; Name=&quot;Grid Table Light&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;Grid Table 1 Light&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;Grid Table 6 Colorful&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;Grid Table 7 Colorful&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;List Table 1 Light&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;List Table 6 Colorful&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;List Table 7 Colorful&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 6&quot;/&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin-top:0in;
 mso-para-margin-right:0in;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0in;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt; &lt;![endif]--&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/3111826906754946965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2017/07/information-security-training.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/3111826906754946965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/3111826906754946965'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2017/07/information-security-training.html' title='Information Security Training '/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHL0-uUeY2sO697QKy08xe-htPW_qKgq2YGG673QZIZzVPw_JZ-miP80qpx2Iq6Y7Ke4lwrrzzBIRQGNl7OKIx_7mR9B0cvpq2segdX64y0vTfSb8fhFV0iJ5e0aZxFB-I7gcOYQhZ3EwC/s72-c/Cyber_Security_Analyst_Knowledge.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-6403426538945088169</id><published>2016-10-30T17:21:00.002-07:00</published><updated>2020-04-21T15:13:21.290-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Splunk"/><title type='text'>Splunk Extreme Search - xsCreateDDContext &amp; xsWhere </title><content type='html'>Splunk has the ability to do some very impressive searches to help with statistical analysis. Some of those functions are not very well documented by Splunk&#39;s own internal documentation. I am going to go over a few commands and how they can be used.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; margin-top: -20px; padding-bottom: 15px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;br /&gt;
&lt;!-- Popular posts-video --&gt;&lt;br /&gt;
&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; hidden=&quot;&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot; tonsfhn=&quot;&quot;&gt;&lt;/ins&gt;&lt;br /&gt;
&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
To start off, if you haven&#39;t heard of, or used extreme search in Splunk, &lt;a href=&quot;http://docs.splunk.com/Documentation/ES/4.5.0/User/ExtremeSearch&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; is some documentation.&amp;nbsp; Extreme search is meant to provide dynamic thresholds and context awareness, when doing searches for IR, key indicators, and more.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Let&#39;s go over how to use a build own context and concepts. A &quot;concept&quot; is an idea represented by a concept. What this an mean for example is Very Low, Low, Normal, High, and Extreme. So instead of saying, in a search, &amp;gt; n you can say &quot;is above High&quot; to define your search.&amp;nbsp; A &quot;Context&quot; is a&amp;nbsp; collection of terms that form a view of knowledge.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;One of the commands I like a lot is xsCreateDDContext (side note if you &lt;a href=&quot;https://www.google.com/search?q=splunk+xsCreateDDContext&quot; target=&quot;_blank&quot;&gt;search for this&lt;/a&gt; you get 2 results... this article will make 3). The xsCreateDDContext builds a data driven context which contains concepts based on a variety of methods of mapping qualitative semantics to the data.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Here is a simple example of this. You can create rolling statistical analysis of our windows security events and create a standard deviation chart for each event code by computer.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;example of this could be&amp;nbsp; the following:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;&lt;span style=&quot;color: #990000;&quot;&gt;index=winevents source=&quot;WinEventLog:Security&quot; earliest=-30d@d latest=-1d@d | fields _time, ComputerName, EventCode | bin span=1d _time |stats count as Event_Code_Count by ComputerName, EventCode | `context_stats(Event_Code_Count,EventCode)` |eval min=0 | xsCreateDDContext name=Event_Code_Count_by_ComputerName_1d type=domain terms=`xs_default_magnitude_concepts` class=EventCode scope=app&lt;/span&gt; &lt;/code&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;It checks your windows security events over the last 30, days then takes the time, computername, and eventcode. then it will do stats on these, with buckets of 1 day spans and count. From there, the context_stats goes through and does just your standard deviation charts, based on the event code count and the event code. This will provide a lot of statistics. Since personally I want the min to be 0, I am overriding the statistics to be 0. From there, I am going to create the data driven context. Do a domain type and define the class and the terms.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Define more terms because Splunks &lt;a href=&quot;http://docs.splunk.com/Documentation/ES/4.5.0/User/ExtremeSearchExample&quot; target=&quot;_blank&quot;&gt;documentation&lt;/a&gt; is bad.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;type&lt;/b&gt;: can be one of two things&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;average_centered - Centers the context on the average and uses size. to scale term sizes&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;domain - the default, centers the set on (max-min)/2 and scales the context to cover the whole domain&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;class&lt;/b&gt;: a comma separated list of classes&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;We could provide all the event codes that windows could generate or, as I did above, just populate the list from the field, which has some downsides but is easier.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Now that we created this context, let&#39;s view it.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #990000;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;|xsDisplayContext Event_Code_Count_by_ComputerName_1d by 517&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;We should see a chart that looks something like this (this is just an example, not what above code would generate)&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://docs.splunk.com/images/3/38/ES32_XS_Example_context1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;113&quot; src=&quot;https://docs.splunk.com/images/3/38/ES32_XS_Example_context1.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;fullpost&quot;&gt;This is great; and we can use this information in other searches like IR searches to create alerts for security analysts, when something goes to the extreme, for your specific organization.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Here is how to create an IR type of search. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #990000;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;index=winevents source=&quot;WinEventLog:Security&quot; |&lt;/code&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;fields _time, ComputerName, EventCode &lt;/code&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;| bin span=1d _time |stats count as Event_Code_Count by ComputerName, EventCode| xsWhere &lt;/code&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;Event_Code_Count FROM &lt;/code&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;Event_Code_Count_by_ComputerName_1d by EventCode is above High&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;This search pulls up a day worth of logs and searches for ComputerNames that have abnormally extreme amount of a particular&amp;nbsp; Security EventCode. Since this is abnormal for your Organizations Environment, over the last 30 days, you will probably want to find out what is causing it. Is it just a new software that is failing? Or is it because of a compromise; or is it just a bug in the system? &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Extreme search allows you to leverage simple statistical analysis, and make it more dynamic and tuned for your organizations environment.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Happy Hunting,&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Local Tech Repair Admin&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;PS:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Please comment with questions and I can answer where I can. I am a certified Splunk admin, but I do not work for Splunk so if you have detailed questions it may be best to ask Splunk support. If you learn something useful, please let the community know, so we can all learn to build better defenses.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;I will probably write an article on how to leverage Machine Learning for your environment, to better detect security anomalies and leverage it for threat hunting. &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/6403426538945088169/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2016/10/splunk-extreme-search-xscreateddcontext.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6403426538945088169'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6403426538945088169'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2016/10/splunk-extreme-search-xscreateddcontext.html' title='Splunk Extreme Search - xsCreateDDContext &amp; xsWhere '/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-8545881176172786811</id><published>2016-08-21T17:22:00.000-07:00</published><updated>2016-08-21T17:24:14.153-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Splunk"/><title type='text'>How to create notable events via correlation search/manually in Splunk</title><content type='html'>One of the main things that you can do with Splunk Enterprise Security is dealing around the Incident Review dashboard. You can customize this to be the most helpful to you when doing threat hunting.   One of the ways is to automate your searches to create notable events automatically so that you don&#39;t have to continually look for them.  &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;br /&gt;
To be able to create a Correlation Search you will want to go to ES -&amp;gt; Configure -&amp;gt; Content Management&lt;br /&gt;
 &lt;img alt=&quot;&quot; src=&quot;data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAATsAAACzCAIAAAB5KiyRAAAPG0lEQVR4nO2drY7bTheHcxm5jbKWRipZ9i9cugoqWgX2DqpFUWBoAyqlrAWRsqSSCyL5BStlwUoTsGBAgUGBwYJ5gT/mjD3+jJ3xcX6PjqKt155M1nlyZux0zmT2cYZoGp/++4SoE87P1Phi4rwHHMO5CVzC+ZkaX8DYNuHcBC7h/EyNL2Bsm3BuApdwfqbGFzC2TTg3gUs4P1PjCxjbJpybwCWcn6nxBYxtE85N4BLOz9T4Asa2CecmcAnnZ2p8AWPbhHMTuITzMzW+gLFtwrkJXML5mRpfwNg24dwELuH8TI0vbMbOt1Il/Hno7skePOU9uH7BnUSL9+7qkP5NlfyxaNzCvT4pbQ6HsWOJvLEPnpLbefzPhz9Kfr/r6Mmu19jVQSm5XcT/XGyl8peNW2h6yBDC+ZkaX+SMnW/l6/ZzftevXjbrklTsfdXHbv8oFZmZHhI3+OApb/s9Pqi7DwIH0fCNu/KV3N7bfqUzZ7rDylf+9oek6VTn58Pq0/1WKn+VOfyw3Uq5vf9k/DZ93vutlNvtQanoV0tftwZjuYU1x+Z0mm9lnHjvtq+RnyQVz7cyUnS+ldTeJKMmiZq0TH6bj4fUeR1329fUfPfR7I17v5U6wWZMTjLn0o91+m/lp+Neop/OsXpj5vBSYxU9PPp0KEv1q1RvHYutpCMFGOsm7FeeHv4kH/zz2ezj7PN3mabWz99lLj0m9pL8TA8hu6Ue3m1f9di7oAN05wHpOuvK2KVPBUicXPl55azGGocvKnNstOfih0xT6+KHLJkSm9K20RXG9hHl14ofPKW8r7PP3/WlKD0wTge9qdvdGTvT0g5O11mHxpJx6eoQpdb+jaWUDowTaVvqCmP7iIq7O1FGteinx8mzPnJsFHGqH5ius67msa5zbJ2Ip9CtdIWxfUTWWNO0ZNZK/Zzfff5oTkS/evkcWzCPbWbs7OPs4fvgdJ11dq2YTESN2Wk9Y63zWPrpQCe36bPreeynT/eLOh6ufrTUFcb2EZYcS8fAespKxsDRtaVkrqvUHy+fY41DyLXipsYOM1q8d+33YwuuFdczllz1VVJKKmo04vXzOdY8qvc7Rs7P1PgC33lqE72+y1tF8Q0kp+H8TI0vYGybcG5CFIv7JFfrm0PDCudnanwBY9uEcxNiY/WF3yEmWBjbR8DYNuHcBC7h/EyNL2Bsm3BuApdwfqbGFzC2TTg3gUs4P1PjCxjbJpybwCWcn6nxBYxtE85N4BLOz9T4Asa2CecmcAnnZ2p8AWPbhHMTuITzMzW+gLFtwrkJXML5mRpfwNg24dwELuH8TI0vYGybcG4Cl3B+psYXMLZNODeBSzg/U+MLGNsmnJvAJZyfqfEFjG0Tzk3gEs7P1PhiEgAA+ABjR8Lx+Xh8PrruBegdGDsGjs9HcRLiJCDt6IGx7Il0jf5jO6QdPTCWN1RXSHsNVBn7FzHcyOtqSOu6e4jq6MBY568BUS+KdIW0jKOZseRICYbN8alMVy3t09F1T0Et6nubGJuIKl6Ef/C9397+cY8YbFTqmkrrvKuIkvB+e/7BPz4fs95WGBvp+iqPz0f1VuedAADojjcVzXEMbwuNTbLr8fnouuMAXC/Hp6N8lZXSxsYiuwLgmDd1fI6lrTBWSukf/OoWAQB94h98cRLl0sbGer+96vbA4JlwwPUfabh4vz3xUmWslFK+yv3j3nVvQQdMJhOl5JADxpawf9yLF2GkWRg7bmAsa/aP+/iiMYy9EmAsa2JjXzo1dr/zpruAbAgWS7E3fsjtv4zj5hA2fhGBvDnn8CbPZO0/L2AsayzG5qRtamywWHpT451dZux+5003Mvl6TrjeeItTw9ewa3xIE8L1xl8H1ftxoTNjf91GV4nufsHYy9GDsScx3QWmRSXGBotlgQ86c6Y7BIulWB98mk51ft4FKpA3afvp4TsZK0d/mz5vIG82cr1LPmJIul6cVPQJQp6O9L9e95RSItlijjuckTU2EW8ymUzm32p79e1u8m71ItXLlw/vvwgYeyn2j/vjU5fGJknyJMgbtNjYQN7oBGv8YrFMnD+JqT48MYHopz8d9MbM4aXGpnvSjw+9M82x9IXU657RTq9jgbpQY8Xy3WRy+zP558+5/rkiXr58mNTeGcZ2R11jo++LV7dnOEP1aGjsSZChcupkps1YJIuxxuFhZY4t+MiI2rcZW797xpMOAmKst3r/bvVitTHi9qeKs+hqPiFj4G939OZplGP1UZPJ+y+C5t7oZ91O0my8d7YPMLaE1NjoO8bnGisOfppa97t0ZNjKWDKGTJrq39iTSK+BTcuNrd29dPzc81Wxumhj7Xny210yNRXLd5P5t0iteLL661b7afygj6J+Zo3Vk95vd+lT58bVMLaEbo3Vs744Yhmaz2Od5NhA3hiT0i5yrPnHGdao2DoFzZg2uf2Zdy//Q0FGLdtifMfJ+OCAsSV0amx2BJi+a1tcKyYTxcKRdrGx1nkstYhObg1jk/b1UdQ02zy2vHva7eEZm149Ot/YNPc2chjz2OZ0aSwZBme2tLofW3Axtp6xdHzr32yoqNFlW2EdFZMrzyJtP7rYW/NasbV7g71WbLvyZBsVVxpL5ddj4LhlsXyXndnSUTSMbULH89hBUnwD6SrJ3N0Ry3fZuzu2K09Vxpp3id5/EaTlD/PbbI7NX6mCsfUYrbEiSHK1vvsClLrAd55+3Ta5r4sc24zxGpt+bwEJ1qQnY3/O04x57n1aGFvCaI0FReB7xayBsVcHjGUNjL06Jhxw/UcaLjAWAE7AWAA4AWMB4EQzYxEIhPNAjgWADTAWAE7AWAA4AWMB4ASMBYATMBYATsBYADgBYwHgROfG0sXZLvAfU8dQVgOA+nRsrFFx5xJL9cJYcF10amyJonpJtHgNX2vBi+xuFSU2FIwFDDlr4bGujbUuF67XATYWN7UVvDB3qy6xAWMBO6JSci2Xwr2EsbRQgDj4RcvnW3arLrEBYwE7YmPblYnoydj0+lOiIi0UsAsKjc3sVl1iA8YCdmhjp/aEVEav81hL8iS/KsuxusGKEhswFrAjMbbVivM9XCvWHxu0vls6BQ3NSjylu1WX2ICxgB3kIk5zuv8GBS3JoefWZEBbVlQqs1t1iQ0YC64LfOcJAE7AWAA4AWMB4ASMBYATMBYATsBYADhRy9gwDIMggLEAOGf/uJevMrI0DEP1ZtkHxgIwFGAsAJxobKz/Px+PeMSjq0fkWAA4AWMB4ASMBYATMBYATsBYADgBYwHgBIwFgBMwFgBOdG8sXTWm9WI2ZxOuN/mF6qwbAeBEx8aaK7Ol64nXJ1xvmi6Xbj0kWn7V3B6VFGBpbIs/Cxgn3RpbXJ5AF+CgK5hmCnnoKltxcq6u/ZE7JCZcb/zFzqcbxcG/2QlzcUZLTRBLbRHLnmTjTmqdSju8OOk1mS1r1jV+jeAa6dTYsiX8k/foSUx1AY5cIQ+aTGrW/ijMsf76RNdPDhZLsdc9LKoJkm+/cE/yijKrt9o6fBLTOoVLGrxGcI1cxNiTmJqLmBYvgKrfmjVrf5QZG6TPpdRJWIoMZJsqWJM1v6fxiuLnqt1h/fN5rxFcI5cylix/vt95dd6aNWt/lBubPnWsLu1hRU0Q+yrK03JjKzpco3AJjAWlXGQee3aOJe03NDYdHkcdCMgPFTVBbJUKaufYgg7XKFwCY0Epl7lWTGZ99kKS9K1J96xR+8N+RTqbq/XMUBtbXhOEGmvds2QeW9ThGoVLGrxGcI1c6n5swbXi/BDUEKxe7Q/jkBialMhRZFRcVRNEt2/bk/bNv8lfK7Z3uEbhkgavEVwj+M7T+ZxVchuARsDYloggSXf6fhUAvQNjW0Iu8yLBgssBYwHgBIwFgBMwFgBOwFgAOAFjAeAEjAWAE6jigUc8cnpEjgWAEzAWAE7AWAA4AWMB4ASMBYATMBYATsBYADgBYwHgROcrs/VRwsNolizGXXlU0X80L/kVAIOmv7UUw/WmXK366wN2vixLr8Zi3UPQI72ufmouiWasP5arTGGtlGFvVjeerbgRyJuNXO+86VLs6bOnq5/pggD5ah2ouAEuw1kZqFdj02xjLYSRWe4wv0NRs+lGa1EMo4jOXhkNksXNrdU6UHEDXIB4ltduOdu+jS1JmEXv7LyfmXls8XLHRlGCeIeqVbzpxwoqboALoN/PLQZil8mx1pIZ5jvbskNRs+nGXo1FxQ3QEyQDNa+N2qexlvGksr+z7TsUNKs3XtxYVNwAHZAYW+uWR5aLXCu2F8LIFOzI72Btlm6sZWzBPLaxsai4ATqCXP5ozoXux1oLYdDKFPZKGbZmy0akVmOV/VpxY2MVKm4A9+A7TwBwAsYCwAkYCwAnYCwAnICxAHACxgLACRgLACdgLACcgLEAcAJVPPCIR06PyLEAcALGAsAJGAsAJ2AsAJyAsQBwAsYCwAkYCwAnYCwAnOh81ZhGa+1b9++kAkC43uQXqrNuBIATbo0taqSRsda1C6O1+c3tUdkBlsZifUYQ05Ox1jIZpSuk6QIZwrISWuOqGeF64y92Pt0oDv7NTuil2yx1Qwq6ba0wkm7cScuyzLYOozIIUEoNrYpHriKGsWpx0SqkwSJ9E6ern55VNSNcb/z1iRYECRZLsdeLLVrrhhRV97Dv2azDqAwCYoZVxaOwxEbZCt0nMTVWLT2/aka8cb8jXu0Cc3lU2o3yQh65PY0Ox89Vu8NdvUbAlGFV8WhrrP5VJ1Uzko1Jy7G61FhL3ZDqZYqn5cZWdBiVQYAaWhWPXnJsrn1V19h0eBy1H5AfLHVDqkoB1M6xBR1GZRCghlbFo7TwXNk8lia086tm6Le4sUK/YWy+bkhFt809S+axRR1GZRCgjEsVzallrPfH2z/uzzVWnXGtuHHVjExx2uQoMiq21Q2xt2+vMKL75t/YSvjZOozKIOBcahkb/A2klPjOUwGdfOUDgFrUGxX/C4O/+JaigQjoTebzvzcCQC1SY8N/Ydk8NvwXwlgKucyLBAsuB4wFgBMNjPV+exfvHgDAwPvt1TXWP/gX7x4AwMA/+FLWM1achPXXAIAL8abEi5BSBkGpsepNhf/CIAiOT0izADjj+HTUt3b+hepNFRsbhuG/UMqjt/sZhriPD8BleVPHp6M4icohsVLq/4rS1C16J2vFAAAAAElFTkSuQmCC&quot; /&gt;&lt;br /&gt;
 &lt;br /&gt;
From there you will want to Create New Content -&amp;gt; Correlation Search&lt;br /&gt;
 &lt;br /&gt;
 &lt;img alt=&quot;&quot; src=&quot;data:image/png;base64,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&quot; /&gt;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
From this we need something to put in it. &lt;br /&gt;
Lets take a simple example of detecting brute forcing in the network that falls outside of normal activity in the network. &lt;br /&gt;
Lets say we searched Splunk to find out what our statistics would be over a 90 day period to give it a good baseline for our organization. &lt;br /&gt;
index=winevents*  (EventCode=4625 Sub_Status=0xc000006a) OR EventCode=529  user=*  |bin _time span=1h | stats count by _time | stats perc80(count), perc95(count), perc99(count), perc99.9(count), avg(count)&lt;br /&gt;
The 99.9th percentile would be 12900 which is fairly anomalous happening so shouldn&#39;t trigger to often less something is actually happening being it a miss configuration or actual attack, both would be useful to know. &lt;br /&gt;
We then could create a correlation search with that information. &lt;br /&gt;
index=winevents*  (EventCode=4625 Sub_Status=0xc000006a) OR EventCode=529 user=*  | stats count | where count &amp;gt; 12900 | `get_event_id` |  `map_notable_fields`&lt;br /&gt;
 &lt;br /&gt;
With that information we can start filling out the correlation search details.&lt;br /&gt;
Name: excessive login failures&lt;br /&gt;
Description: Detected a high number of login failures &lt;br /&gt;
Search:  index=winevents*  (EventCode=4625 Sub_Status=0xc000006a) OR EventCode=529 user=*  | stats count | where count &amp;gt; 12900 | `get_event_id` |  `map_notable_fields`&lt;br /&gt;
Start Time: -65m&lt;br /&gt;
End Time: -5m&lt;br /&gt;
Cron Schedule: 0 * * * * &lt;br /&gt;
 &lt;br /&gt;
Check Create Notable Event&lt;br /&gt;
Fill out the information there like you would want it to show up in IR. &lt;br /&gt;
Title:  excessive login failures&lt;br /&gt;
Description: Detected a high number of login failures &lt;br /&gt;
Security Domain: Access&lt;br /&gt;
Severity: what ever you feel it should be&lt;br /&gt;
Drill Down Search: index=winevents*  (EventCode=4625 Sub_Status=0xc000006a) OR EventCode=529 user=*&lt;br /&gt;
 &lt;br /&gt;
If you use the Risk Scoring you can fill out that information to further give more weighting to it. &lt;br /&gt;
 &lt;br /&gt;
Once this is saved Splunk will start to create IR events whenever the threshold of our where statement is passed. &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
Another thing you can do is creating Notable Events arbitrarily.  You can do this in 2 different ways. First you can go to ES -&amp;gt; Configure -&amp;gt; Incident Management -&amp;gt;  New notable Event&lt;br /&gt;
This will give you the raw information needed to create one. &lt;br /&gt;
 &lt;img alt=&quot;&quot; src=&quot;data:image/png;base64,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&quot; /&gt;&lt;br /&gt;
 &lt;br /&gt;
Next would be to use an event from a search. Once you have your search and events back you can expand the event and click on the Event Actions -&amp;gt; Create Notable Event which will bring you to the same screen as before. This allows you to create IR events that can be feed into a investigation or just help spread the work around and keep track of things that may not currently have a correlation search built for it yet. &lt;br /&gt;
 &lt;br /&gt;
Hope this helps you with your Splunking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/8545881176172786811/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2016/08/how-to-create-notable-events-via.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/8545881176172786811'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/8545881176172786811'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2016/08/how-to-create-notable-events-via.html' title='How to create notable events via correlation search/manually in Splunk'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-1404023700635829833</id><published>2016-04-03T19:25:00.002-07:00</published><updated>2016-04-03T19:43:45.208-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'> Ethical Hacking Bookmarks</title><content type='html'>Since Null byte group had a user get their wonderful post down and  things really don&#39;t disappear from the internet after they been up here  is their bookmark post of wonderful links for ethical    &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
So here is the article by author &lt;a href=&quot;http://creator.wonderhowto.com/doxsec/&quot; target=&quot;_blank&quot;&gt;Dox Sec&lt;/a&gt; who looks to have disappeared. &lt;a href=&quot;http://webcache.googleusercontent.com/search?q=cache:tJApSe6RxmUJ:null-byte.wonderhowto.com/inspiration/ethical-hacking-bookmarks-0170061/+&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us&quot; target=&quot;_blank&quot;&gt;Original&lt;/a&gt;&lt;br /&gt;
My security bookmarks collection.&lt;br /&gt;
All that things I need to pass OSCP, i think =)&lt;br /&gt;
Contents&lt;br /&gt;
Security Blogs&lt;br /&gt;
Security Forums&lt;br /&gt;
Tor Onion Links&lt;br /&gt;
Security Methodologies&lt;br /&gt;
Training/Classes/Video&lt;br /&gt;
Pentest Tools&lt;br /&gt;
Pentest Lab ISO-VMs&lt;br /&gt;
Metasploit&lt;br /&gt;
Net Scanners&lt;br /&gt;
Man-in-the-middle attack&lt;br /&gt;
Phase 1 - Reconnaissance: Information Gathering before the Attack&lt;br /&gt;
Phase 1.1 - People and Orginizational&lt;br /&gt;
Phase 1.2 - Infastructure&lt;br /&gt;
Phase 1.2 - Tools&lt;br /&gt;
Phase 2 - Enumeration: Finding Attack Vectors&lt;br /&gt;
Phase 3 - Exploitation: Verifying Security Weaknesses&lt;br /&gt;
Dump Windows Password Hashes&lt;br /&gt;
Windows Passhing The Hash&lt;br /&gt;
Windows Previlige Escalation&lt;br /&gt;
Linux Previlige Escalation&lt;br /&gt;
Tunneling &amp;amp; Port Forwarding&lt;br /&gt;
XSS Cheat Codes&lt;br /&gt;
WebShells&lt;br /&gt;
SQLi General Resources&lt;br /&gt;
MySQLi Resources&lt;br /&gt;
MSSQLi Resources&lt;br /&gt;
Oracle SQLi Resources&lt;br /&gt;
Postgres SQLi Resources&lt;br /&gt;
SQLite Resources&lt;br /&gt;
RFI/LFI Tutorials&lt;br /&gt;
NASM Tutorial&lt;br /&gt;
Buffer Overflow Tutorial&lt;br /&gt;
Exploit Development&lt;br /&gt;
Exploits and Shellcodes&lt;br /&gt;
Reverse Engineering&lt;br /&gt;
OS Cheat Sheets and Script Syntax&lt;br /&gt;
Passwords Wordlists, Hashes, Tools&lt;br /&gt;
InfoSec Hiring&lt;br /&gt;
IT Certifications&lt;br /&gt;
Links Collections&lt;br /&gt;
Books&lt;br /&gt;
Security Blogs&lt;br /&gt;
My Security OPML&lt;br /&gt;
&lt;br /&gt;
Security Forums&lt;br /&gt;
&lt;a href=&quot;http://securityoverride.org/forum/index.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://securityoverride.org/forum/index.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.hackthissite.org/forums/index.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.hackthissite.org/forums/index.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.ethicalhacker.net/forums/index.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.ethicalhacker.net/forums/index.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://evilzone.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://evilzone.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://forum.antichat.ru/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://forum.antichat.ru/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://forum.xeksec.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://forum.xeksec.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://rdot.org/forum/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://rdot.org/forum/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://forum.zloy.bz/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://forum.zloy.bz/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://forum.reverse4you.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://forum.reverse4you.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://rstforums.com/forum/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://rstforums.com/forum/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.truehackers.ru/forum/index.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.truehackers.ru/forum/index.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://garage4hackers.com/forum.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://garage4hackers.com/forum.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.hellboundhackers.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.hellboundhackers.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.lockpicking101.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.lockpicking101.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.xploitworld.com/index.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.xploitworld.com/index.php&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Tor Onion Links&lt;br /&gt;
&lt;a href=&quot;http://www.hiddenwiki.info/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.hiddenwiki.info/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Security Methodologies&lt;br /&gt;
&lt;a href=&quot;http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.pentest-standard.org/index.php/Main_Page&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.pentest-standard.org/index.php/Main_Page&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://yehg.net/lab/pr0js/misc/wasarg_owasp-tgv4_with_ref.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://yehg.net/lab/pr0js/misc/wasarg_owasp-tgv4_with_ref.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.social-engineer.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.social-engineer.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://projects.webappsec.org/w/page/13246927/FrontPage&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://projects.webappsec.org/w/page/13246927/FrontPage&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Training/Classes/Video&lt;br /&gt;
&lt;a href=&quot;https://exploit-exercises.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://exploit-exercises.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/cyber-security/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.cybrary.it/cyber-security/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.irongeek.com/i.php?page=videos/aide-winter-2011&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.irongeek.com/i.php?page=videos/aide-winter-2011&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://lab.pentestit.ru/pentestlabs/3&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://lab.pentestit.ru/pentestlabs/3&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://trailofbits.github.io/ctf/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://trailofbits.github.io/ctf/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ctf.forgottensec.com/wiki/?title=Main_Page&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://ctf.forgottensec.com/wiki/?title=Main_Page&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://smashthestack.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://smashthestack.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ctf.hcesperer.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://ctf.hcesperer.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.google.com/calendar/feeds/noge7b1rg2dg4a8kcm1k68vbjg@group.calendar.google.com/public/basic&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.google.com/calendar/feeds/noge7b1rg2dg4a8kcm1k68vbjg@group.calendar.google.com/public/basic&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.google.com/calendar/embed?src=pe2ikdbe6b841od6e26ato0asc@group.calendar.google.com&amp;amp;gsessionid=OK&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.google.com/calendar/embed?src=pe2ikdbe6b841od6e26ato0asc@group.calendar.google.com&amp;amp;gsessionid=OK&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://crypto.stanford.edu/cs155/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://crypto.stanford.edu/cs155/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.offensive-security.com/metasploit-unleashed/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.offensive-security.com/metasploit-unleashed/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.irongeek.com/i.php?page=videos/metasploit-class&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.irongeek.com/i.php?page=videos/metasploit-class&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.securitytube.net/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.securitytube.net/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://resources.infosecinstitute.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://resources.infosecinstitute.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cs.fsu.edu/%7Eredwood/OffensiveSecurity/lectures.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.cs.fsu.edu/~redwood/OffensiveSecurity/lectures.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=Sye3mu-EoTI&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.youtube.com/watch?v=Sye3mu-EoTI&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=GPjcSxyIIUc&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.youtube.com/watch?v=GPjcSxyIIUc&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=kPxavpgos2I&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.youtube.com/watch?v=kPxavpgos2I&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=pnqcHU2qFiA&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.youtube.com/watch?v=pnqcHU2qFiA&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.securitytube.net/video/7640&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.securitytube.net/video/7640&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=y2zrEAwmdws&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.youtube.com/watch?v=y2zrEAwmdws&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.securitytube.net/video/7735&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.securitytube.net/video/7735&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Pentest Tools&lt;br /&gt;
&lt;a href=&quot;https://github.com/pwnwiki/pwnwiki.github.io&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/pwnwiki/pwnwiki.github.io&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/sbilly/awesome-security&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/sbilly/awesome-security&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/paragonie/awesome-appsec&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/paragonie/awesome-appsec&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/enaqx/awesome-pentest&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/enaqx/awesome-pentest&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/kahun/awesome-sysadmin#security&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/kahun/awesome-sysadmin#security&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://beefproject.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://beefproject.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://xsser.03c8.net/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://xsser.03c8.net/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://code.google.com/p/fuzzdb/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://code.google.com/p/fuzzdb/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database#tab=Statements&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.owasp.org/index.php/Category:OWASP_Fuzzing_Code_Database#tab=Statements&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://w3af.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://w3af.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://code.google.com/p/skipfish/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://code.google.com/p/skipfish/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/testing/fuzzing-approach-credentials-discovery-burp-intruder-33214&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.sans.org/reading-room/whitepapers/testing/fuzzing-approach-credentials-discovery-burp-intruder-33214&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.securityninja.co.uk/hacking/burp-suite-tutorial-the-intruder-tool/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.securityninja.co.uk/hacking/burp-suite-tutorial-the-intruder-tool/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.justanotherhacker.com/projects/graudit.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.justanotherhacker.com/projects/graudit.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://packetstormsecurity.com/files/tags/tool&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://packetstormsecurity.com/files/tags/tool&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Pentest Lab ISO-VMs&lt;br /&gt;
&lt;a href=&quot;http://www.amanhardikar.com/mindmaps/PracticeUrls.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.amanhardikar.com/mindmaps/PracticeUrls.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.kali.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.kali.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.owasp.org/index.php/OWASP_Web_Testing_Environment_Project&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://blackarch.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://blackarch.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://code.google.com/p/owaspbwa/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://code.google.com/p/owaspbwa/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.mavensecurity.com/web_security_dojo/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.mavensecurity.com/web_security_dojo/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://hackingdojo.com/dojo-media/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://hackingdojo.com/dojo-media/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://informatica.uv.es/%7Ecarlos/docencia/netinvm/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://informatica.uv.es/~carlos/docencia/netinvm/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.bonsai-sec.com/en/research/moth.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.bonsai-sec.com/en/research/moth.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sourceforge.net/projects/metasploitable/files/Metasploitable2/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sourceforge.net/projects/metasploitable/files/Metasploitable2/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sourceforge.net/projects/lampsecurity/?source=navbar&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sourceforge.net/projects/lampsecurity/?source=navbar&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.hacking-lab.com/index.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.hacking-lab.com/index.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sourceforge.net/projects/virtualhacking/files/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sourceforge.net/projects/virtualhacking/files/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.dvwa.co.uk/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.dvwa.co.uk/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sourceforge.net/projects/thebutterflytmp/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sourceforge.net/projects/thebutterflytmp/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://magikh0e.ihtb.org/pubPapers/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://magikh0e.ihtb.org/pubPapers/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Metasploit&lt;br /&gt;
&lt;a href=&quot;http://resources.metasploit.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://resources.metasploit.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://netsec.ws/?p=262&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://netsec.ws/?p=262&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://seclists.org/metasploit/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://seclists.org/metasploit/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.offensive-security.com/metasploit-unleashed/Introduction/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.offensive-security.com/metasploit-unleashed/Introduction/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Msfvenom&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.offensive-security.com/metasploit-unleashed/Msfvenom&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://community.rapid7.com/community/metasploit/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://community.rapid7.com/community/metasploit/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.securitytube.net/video/711?q=METASPLOIT&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.securitytube.net/video/711?q=METASPLOIT&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://en.wikibooks.org/wiki/Metasploit&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://en.wikibooks.org/wiki/Metasploit&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/rapid7/metasploit-framework/wiki/Meterpreter&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/rapid7/metasploit-framework/wiki/Meterpreter&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Net Scanners&lt;br /&gt;
&lt;a href=&quot;https://nmap.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://nmap.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://nmap.org/nsedoc/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://nmap.org/nsedoc/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.securitytube.net/video/931&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.securitytube.net/video/931&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://nmap.org/nsedoc/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://nmap.org/nsedoc/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.openvas.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.openvas.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.tenable.com/products/nessus-vulnerability-scanner&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.tenable.com/products/nessus-vulnerability-scanner&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.rapid7.com/products/nexpose/compare-downloads.jsp&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.rapid7.com/products/nexpose/compare-downloads.jsp&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.inguardians.com/research/docs/Skoudis_pentestsecrets.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.inguardians.com/research/docs/Skoudis_pentestsecrets.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Man-in-the-middle attack&lt;br /&gt;
&lt;a href=&quot;http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://media.techtarget.com/searchUnifiedCommunications/downloads/Seven_Deadliest_UC_Attacks_Ch3.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://media.techtarget.com/searchUnifiedCommunications/downloads/Seven_Deadliest_UC_Attacks_Ch3.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://packetstormsecurity.com/papers/wireless/cracking-air.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://packetstormsecurity.com/papers/wireless/cracking-air.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-sam_bowne-hijacking_web_2.0.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-sam_bowne-hijacking_web_2.0.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/18.Ettercap_Spoof.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.leetupload.com/database/Misc/Papers/Asta%20la%20Vista/18.Ettercap_Spoof.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://bandwidthco.com/nf.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://bandwidthco.com/nf.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://articles.manugarg.com/arp_spoofing.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://articles.manugarg.com/arp_spoofing.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://academy.delmar.edu/Courses/ITSY2430/eBooks/Ettercap%28ManInTheMiddleAttack-tool%29.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://academy.delmar.edu/Courses/ITSY2430/eBooks/Ettercap(ManInTheMiddleAttack-tool).pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.ucci.it/docs/ICTSecurity-2004-26.pdf_&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.ucci.it/docs/ICTSecurity-2004-26.pdf_&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Phase 1 - Reconnaissance: Information Gathering before the Attack&lt;br /&gt;
&lt;a href=&quot;https://en.wikipedia.org/wiki/Open-sourceintelligence&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://en.wikipedia.org/wiki/Open-sourceintelligence&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-1-social-networks/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-%E2%80%93-part-2-blogs-message-boards-and-metadata/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.spylogic.net/2009/10/enterprise-open-source-intelligence-gathering-part-3-monitoring/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.slideshare.net/Laramies/tactical-information-gathering&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.slideshare.net/Laramies/tactical-information-gathering&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.infond.fr/2010/05/toturial-footprinting.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.infond.fr/2010/05/toturial-footprinting.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Phase 1.1 - People and Orginizational&lt;br /&gt;
&lt;a href=&quot;http://www.spokeo.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.spokeo.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.spoke.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.spoke.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.xing.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.xing.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.zoominfo.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.zoominfo.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://pipl.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://pipl.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.zabasearch.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.zabasearch.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.searchbug.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.searchbug.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://skipease.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://skipease.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://addictomatic.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://addictomatic.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://socialmention.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://socialmention.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://entitycube.research.microsoft.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://entitycube.research.microsoft.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.yasni.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.yasni.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.glassdoor.com/index.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.glassdoor.com/index.htm&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://connect.data.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://connect.data.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://searchwww.sec.gov/EDGARFSClient/jsp/EDGAR_MainAccess.jsp&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.tineye.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.tineye.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.peekyou.com/_&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.peekyou.com/_&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Phase 1.2 - Infastructure&lt;br /&gt;
&lt;a href=&quot;http://uptime.netcraft.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://uptime.netcraft.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.shodanhq.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.shodanhq.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.domaintools.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.domaintools.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://centralops.net/co/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://centralops.net/co/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://whois.webhosting.info/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://whois.webhosting.info/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.ssllabs.com/ssltest/analyze.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.ssllabs.com/ssltest/analyze.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.exploit-db.com/google-hacking-database/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.exploit-db.com/google-hacking-database/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.my-ip-neighbors.com/&quot;&gt;http://www.my-ip-neighbors.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Phase 1.2 - Tools&lt;br /&gt;
OSINT Tools&lt;br /&gt;
&lt;a href=&quot;http://www.edge-security.com/theharvester.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.edge-security.com/theharvester.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.edge-security.com/metagoofil.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.edge-security.com/metagoofil.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.paterva.com/web6/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.paterva.com/web6/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/privacy/document-metadata-silent-killer-32974&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.sans.org/reading-room/whitepapers/privacy/document-metadata-silent-killer-32974&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.sno.phy.queensu.ca/%7Ephil/exiftool/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.sno.phy.queensu.ca/~phil/exiftool/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.darkoperator.com/blog/2009/4/24/metadata-enumeration-with-foca.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.darkoperator.com/blog/2009/4/24/metadata-enumeration-with-foca.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Phase 2 - Enumeration: Finding Attack Vectors&lt;br /&gt;
&lt;a href=&quot;http://securitysynapse.blogspot.be/201308_01_archive.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://securitysynapse.blogspot.be/201308_01_archive.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://hackertarget.com/attacking-wordpress/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://hackertarget.com/attacking-wordpress/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://code.google.com/p/pentest-bookmarks/wiki/BookmarksList&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://code.google.com/p/pentest-bookmarks/wiki/BookmarksList&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.0daysecurity.com/penetration-testing/enumeration.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.0daysecurity.com/penetration-testing/enumeration.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/n3ko1/WrapMap&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/n3ko1/WrapMap&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://cirt.net/Nikto2&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://cirt.net/Nikto2&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.unixmen.com/install-nikto-web-scanner-check-vulnerabilities/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.unixmen.com/install-nikto-web-scanner-check-vulnerabilities/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://seclist.us/autoenum-nmap-enumeration-and-script-scan-automation-script.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://seclist.us/autoenum-nmap-enumeration-and-script-scan-automation-script.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://code.stephenmorley.org/articles/xampp-version-history-apache-mysql-php/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://code.stephenmorley.org/articles/xampp-version-history-apache-mysql-php/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://carnal0wnage.attackresearch.com/2007/07/over-in-lso-chat-we-were-talking-about.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://carnal0wnage.attackresearch.com/2007/07/over-in-lso-chat-we-were-talking-about.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.iodigitalsec.com/windows-null-session-enumeration/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.iodigitalsec.com/windows-null-session-enumeration/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://pen-testing.sans.org/blog/2013/07/24/plundering-windows-account-info-via-authenticated-smb-sessions&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://pen-testing.sans.org/blog/2013/07/24/plundering-windows-account-info-via-authenticated-smb-sessions&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://carnal0wnage.attackresearch.com/2007/07/enumerating-user-accounts-on-linux-and.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://carnal0wnage.attackresearch.com/2007/07/enumerating-user-accounts-on-linux-and.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/isaudits/autoenum&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/isaudits/autoenum&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.webpronews.com/snmp-enumeration-and-hacking-2003-09&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.webpronews.com/snmp-enumeration-and-hacking-2003-09&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://carnal0wnage.attackresearch.com/2007/07/over-in-lso-chat-we-were-talking-about.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://carnal0wnage.attackresearch.com/2007/07/over-in-lso-chat-we-were-talking-about.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.iodigitalsec.com/windows-null-session-enumeration/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.iodigitalsec.com/windows-null-session-enumeration/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://pen-testing.sans.org/blog/2013/07/24/plundering-windows-account-info-via-authenticated-smb-sessions&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pen-testing.sans.org/blog/2013/07/24/plundering-windows-account-info-via-authenticated-smb-sessions&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://carnal0wnage.attackresearch.com/2007/07/enumerating-user-accounts-on-linux-and.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://carnal0wnage.attackresearch.com/2007/07/enumerating-user-accounts-on-linux-and.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.madirish.net/59&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.madirish.net/59&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.enye-sec.org/en/papers/web_vuln-en.txt_&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.enye-sec.org/en/papers/web_vuln-en.txt_&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Phase 3 - Exploitation: Verifying Security Weaknesses&lt;br /&gt;
&lt;a href=&quot;http://pwnwiki.io/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pwnwiki.io&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://download.vulnhub.com/pentesterlab/phpinclude_and_post_exploitation.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://download.vulnhub.com/pentesterlab/phpinclude_and_post_exploitation.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ru.scribd.com/doc/245679444/hak5-org-OSXPost-Exploitation-copy-20130228-pdf#scribd&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://ru.scribd.com/doc/245679444/hak5-org-OSXPost-Exploitation-copy-20130228-pdf#scribd&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://cyberwar.nl/d/hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://cyberwar.nl/d/hak5.org_LinuxUnixBSDPost-ExploitationCommandList_copy-20130228.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.yumpu.com/en/document/view/14963680/from-sqli-to-shell_&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.yumpu.com/en/document/view/14963680/from-sqli-to-shell_&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Dump Windows Password Hashes&lt;br /&gt;
&lt;a href=&quot;http://bernardodamele.blogspot.com/2011/12/dump-windows-password-hashes.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://bernardodamele.blogspot.com/2011/12/dump-windows-password-hashes.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Windows Passhing The Hash&lt;br /&gt;
&lt;a href=&quot;https://www.kali.org/penetration-testing/passing-hash-remote-desktop/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.kali.org/penetration-testing/passing-hash-remote-desktop/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.kali.org/kali-monday/pass-the-hash-toolkit-winexe-updates/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.kali.org/kali-monday/pass-the-hash-toolkit-winexe-updates/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Windows Previlige Escalation&lt;br /&gt;
&lt;a href=&quot;https://labs.mwrinfosecurity.com/system/assets/760/original/Windows_Services_-All_roads_lead_to_SYSTEM.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://labs.mwrinfosecurity.com/system/assets/760/original/Windows_Services_-All_roads_lead_to_SYSTEM.pdf&lt;/a&gt;(&lt;a href=&quot;https://labs.mwrinfosecurity.com/system/assets/760/original/WindowsServices-_All_roads_lead_to_SYSTEM.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://labs.mwrinfosecurity.com/system/assets/760/original/WindowsServices-_All_roads_lead_to_SYSTEM.pdf&lt;/a&gt;)_&lt;br /&gt;
&lt;a href=&quot;http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://travisaltman.com/windows-privilege-escalation-via-weak-service-permissions/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/0xdeafbeef/PSSecSnapshot&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/0xdeafbeef/PSSecSnapshot&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fuzzysecurity.com/tutorials/16.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.fuzzysecurity.com/tutorials/16.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.youtube.com/watch?v=kMG8IsCohHA&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.youtube.com/watch?v=kMG8IsCohHA&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.youtube.com/watch?v=8xJaaQlpBo&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.youtube.com/watch?v=8xJaaQlpBo&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.greyhathacker.net/?p=738&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.greyhathacker.net/?p=738&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://bernardodamele.blogspot.ru/2011/12/dump-windows-password-hashes.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://bernardodamele.blogspot.ru/2011/12/dump-windows-password-hashes.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Linux Previlige Escalation&lt;br /&gt;
&lt;a href=&quot;http://incolumitas.com/wp-content/uploads/2012/12/blackhats_view.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://incolumitas.com/wp-content/uploads/2012/12/blackhats_view.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://pentestmonkey.net/tools/audit/unix-privesc-check&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pentestmonkey.net/tools/audit/unix-privesc-check&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.rebootuser.com/?page_id=1721&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.rebootuser.com/?page_id=1721&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.rebootuser.com/?p=1758&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.rebootuser.com/?p=1758&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.rebootuser.com/?p=1623&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.rebootuser.com/?p=1623&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://insidetrust.blogspot.nl/2011/04/quick-guide-to-linux-privilege.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://insidetrust.blogspot.nl/2011/04/quick-guide-to-linux-privilege.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Tunneling &amp;amp; Port Forwarding&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://highon.coffee/blog/reverse-shell-cheat-sheet/&quot;&gt;https://highon.coffee/blog/reverse-shell-cheat-sheet/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/&quot;&gt;https://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://staff.washington.edu/corey/fw/ssh-port-forwarding.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://staff.washington.edu/corey/fw/ssh-port-forwarding.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://magikh0e.ihtb.org/pubPapers/ssh_gymnastics_tunneling.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://magikh0e.ihtb.org/pubPapers/ssh_gymnastics_tunneling.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.debianadmin.com/howto-use-ssh-local-and-remote-port-forwarding.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.debianadmin.com/howto-use-ssh-local-and-remote-port-forwarding.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.danscourses.com/Network-Penetration-Testing/metasploit-pivoting.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.danscourses.com/Network-Penetration-Testing/metasploit-pivoting.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://carnal0wnage.attackresearch.com/2007/09/using-metasploit-to-pivot-through_06.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://carnal0wnage.attackresearch.com/2007/09/using-metasploit-to-pivot-through_06.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Portfwd&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.offensive-security.com/metasploit-unleashed/Portfwd&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Pivoting&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.offensive-security.com/metasploit-unleashed/Pivoting&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.howtoforge.com/reverse-ssh-tunneling&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.howtoforge.com/reverse-ssh-tunneling&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ftp.acc.umu.se/pub/putty/putty-0.57/htmldoc/Chapter7.htmla_&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://ftp.acc.umu.se/pub/putty/putty-0.57/htmldoc/Chapter7.htmla_&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
XSS Cheat Codes&lt;br /&gt;
&lt;a href=&quot;http://www.xenuser.org/xss-cheat-sheet/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.xenuser.org/xss-cheat-sheet/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://gist.github.com/sseffa/11031135&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://gist.github.com/sseffa/11031135&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://html5sec.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://html5sec.org/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
WebShells&lt;br /&gt;
&lt;a href=&quot;http://www.r57shell.net/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.r57shell.net/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/b374k/b374k&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/b374k/b374k&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://github.com/epinna/weevely3&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://github.com/epinna/weevely3&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
SQLi General Resources&lt;br /&gt;
&lt;a href=&quot;http://www.w3schools.com/sql/sqlinjection.asp&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.w3schools.com/sql/sqlinjection.asp&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sqlzoo.net/hack/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sqlzoo.net/hack/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://information.rapid7.com/rs/rapid7/images/R7%20SQL_Injection_Cheat_Sheet.v1.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://information.rapid7.com/rs/rapid7/images/R7%20SQL_Injection_Cheat_Sheet.v1.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://websec.ca/kb/sql_injection&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://websec.ca/kb/sql_injection&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.unixwiz.net/techtips/sql-injection.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.unixwiz.net/techtips/sql-injection.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.sqlinjectionwiki.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.sqlinjectionwiki.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://sqlmap.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sqlmap.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://packetstorm.sigterm.no/papers/cheatsheets/sqlmap-cheatsheet-1.0-SDB.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://packetstorm.sigterm.no/papers/cheatsheets/sqlmap-cheatsheet-1.0-SDB.pdf&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://bobby-tables.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://bobby-tables.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
MySQLi Resources&lt;br /&gt;
&lt;a href=&quot;http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://resources.infosecinstitute.com/backdoor-sql-injection/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://resources.infosecinstitute.com/backdoor-sql-injection/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
MSSQLi Resources&lt;br /&gt;
&lt;a href=&quot;http://evilsql.com/main/page2.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://evilsql.com/main/page2.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Oracle SQLi Resources&lt;br /&gt;
&lt;a href=&quot;http://pentestmonkey.net/cheat-sheet/sql-injection/oracle-sql-injection-cheat-sheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pentestmonkey.net/cheat-sheet/sql-injection/oracle-sql-injection-cheat-sheet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Postgres SQLi Resources&lt;br /&gt;
&lt;a href=&quot;http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
SQLite Resources&lt;br /&gt;
&lt;a href=&quot;https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
RFI/LFI Tutorials&lt;br /&gt;
&lt;a href=&quot;https://evilzone.org/tutorials/remote-file-inclusion%28rfi%29/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://evilzone.org/tutorials/remote-file-inclusion%28rfi%29/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.hackersonlineclub.com/lfi-rfi&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.hackersonlineclub.com/lfi-rfi&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://0xzoidberg.wordpress.com/category/security/lfi-rfi/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;https://0xzoidberg.wordpress.com/category/security/lfi-rfi/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
NASM Tutorial&lt;br /&gt;
&lt;a href=&quot;http://ccm.net/faq/1559-compiling-an-assembly-program-with-nasm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://ccm.net/faq/1559-compiling-an-assembly-program-with-nasm&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Buffer Overflow Tutorial&lt;br /&gt;
&lt;a href=&quot;http://www.madirish.net/142&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.madirish.net/142&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://n01g3l.tumblr.com/post/49036035399/linux-crossfire-v1-90-buffer-overflow&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://n01g3l.tumblr.com/post/49036035399/linux-crossfire-v1-90-buffer-overflow&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://resources.infosecinstitute.com/author/nikhil-kumar/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://resources.infosecinstitute.com/author/nikhil-kumar/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.frequency.com/video/athcon-hack-in-paris-demo-1/40181156&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.frequency.com/video/athcon-hack-in-paris-demo-1/40181156&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.savevid.com/video/athcon-hack-in-paris-demo-2.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://www.savevid.com/video/athcon-hack-in-paris-demo-2.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.frequency.com/video/athcon-hack-in-paris-demo-3/11306148&quot;&gt;http://www.frequency.com/video/athcon-hack-in-paris-demo-3/11306148&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://tehaurum.wordpress.com/2015/06/22/exploit-development-stack-buffer-overflow/&quot;&gt;https://tehaurum.wordpress.com/2015/06/22/exploit-development-stack-buffer-overflow/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://proactivedefender.blogspot.ru/2013/05/understanding-buffer-overflows.html&quot;&gt;http://proactivedefender.blogspot.ru/2013/05/understanding-buffer-overflows.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://forum.reverse4you.org/showthread.php?t=1371&quot;&gt;https://forum.reverse4you.org/showthread.php?t=1371&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://grey-corner.blogspot.com/2010/01/beginning-stack-based-buffer-overflow.html&quot;&gt;http://grey-corner.blogspot.com/2010/01/beginning-stack-based-buffer-overflow.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://grey-corner.blogspot.com/2010/01/seh-stack-based-windows-buffer-overflow.html&quot;&gt;http://grey-corner.blogspot.com/2010/01/seh-stack-based-windows-buffer-overflow.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://grey-corner.blogspot.com/2010/01/windows-buffer-overflow-tutorial.html&quot;&gt;http://grey-corner.blogspot.com/2010/01/windows-buffer-overflow-tutorial.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://grey-corner.blogspot.com/2010/01/heap-spray-exploit-tutorial-internet.html&quot;&gt;http://grey-corner.blogspot.com/2010/01/heap-spray-exploit-tutorial-internet.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://grey-corner.blogspot.com/2010/02/windows-buffer-overflow-tutorial.html&quot;&gt;http://grey-corner.blogspot.com/2010/02/windows-buffer-overflow-tutorial.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://thepcn3rd.blogspot.ru/2015/07/freeftpd-108-seh-stack-based-overflow.html&quot;&gt;http://thepcn3rd.blogspot.ru/2015/07/freeftpd-108-seh-stack-based-overflow.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Exploit Development&lt;br /&gt;
&lt;a href=&quot;https://www.corelan.be/index.php/articles/&quot;&gt;https://www.corelan.be/index.php/articles/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fuzzysecurity.com/tutorials.html&quot;&gt;http://www.fuzzysecurity.com/tutorials.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://code.google.com/p/it-sec-catalog/wiki/Exploitation&quot;&gt;https://code.google.com/p/it-sec-catalog/wiki/Exploitation&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.myne-us.com/2010/08/from-0x90-to-0x4c454554-journey-into.html&quot;&gt;http://www.myne-us.com/2010/08/from-0x90-to-0x4c454554-journey-into.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.ethicalhacker.net/columns/heffner/smashing-the-modern-stack-for-fun-and-profit&quot;&gt;https://www.ethicalhacker.net/columns/heffner/smashing-the-modern-stack-for-fun-and-profit&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://x9090.blogspot.ru/2010/03/tutorial-exploit-writting-tutorial-from.html&quot;&gt;http://x9090.blogspot.ru/2010/03/tutorial-exploit-writting-tutorial-from.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ref.x86asm.net/index.html&quot;&gt;http://ref.x86asm.net/index.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/&quot;&gt;https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://forum.reverse4you.org/showthread.php?t=1371&quot;&gt;https://forum.reverse4you.org/showthread.php?t=1371&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Exploits and Shellcodes&lt;br /&gt;
&lt;a href=&quot;https://www.exploit-db.com/&quot;&gt;https://www.exploit-db.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://packetstormsecurity.com/&quot;&gt;https://packetstormsecurity.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.securityfocus.com/bid&quot;&gt;http://www.securityfocus.com/bid&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://nvd.nist.gov/&quot;&gt;https://nvd.nist.gov/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://osvdb.org/&quot;&gt;http://osvdb.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.secdocs.org/&quot;&gt;http://www.secdocs.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.cvedetails.com/&quot;&gt;http://www.cvedetails.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://cve.mitre.org/&quot;&gt;https://cve.mitre.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.windowsexploits.com/&quot;&gt;http://www.windowsexploits.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://farlight.org/index.html?type=shellcode&quot;&gt;http://farlight.org/index.html?type=shellcode&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://shell-storm.org/shellcode/&quot;&gt;http://shell-storm.org/shellcode/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Reverse Engineering&lt;br /&gt;
&lt;a href=&quot;https://www.cyberguerrilla.org/blog/what-the-blackhats-dont-want-you-to-know-series/&quot;&gt;https://www.cyberguerrilla.org/blog/what-the-blackhats-dont-want-you-to-know-series/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://fumalwareanalysis.blogspot.ru/p/malware-analysis-tutorials-reverse.html&quot;&gt;http://fumalwareanalysis.blogspot.ru/p/malware-analysis-tutorials-reverse.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.woodmann.com/TiGa/idaseries.html&quot;&gt;http://www.woodmann.com/TiGa/idaseries.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://visi.kenshoto.com/viki/MainPage&quot;&gt;http://visi.kenshoto.com/viki/MainPage&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.radare.org/r/&quot;&gt;http://www.radare.org/r/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.offensivecomputing.net/&quot;&gt;http://www.offensivecomputing.net/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.oldapps.com/&quot;&gt;http://www.oldapps.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.oldversion.com/&quot;&gt;http://www.oldversion.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.exploit-db.com/webapps/&quot;&gt;https://www.exploit-db.com/webapps/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx&quot;&gt;http://www.mcafee.com/us/downloads/free-tools/hacmebooks.aspx&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx&quot;&gt;http://www.mcafee.com/us/downloads/free-tools/hacme-casino.aspx&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx&quot;&gt;http://www.mcafee.com/us/downloads/free-tools/hacmeshipping.aspx&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx&quot;&gt;http://www.mcafee.com/us/downloads/free-tools/hacmetravel.aspx&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
OS Cheat Sheets and Script Syntax&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/CheatSheets&quot;&gt;https://www.owasp.org/index.php/CheatSheets&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.cheat-sheets.org/&quot;&gt;http://www.cheat-sheets.org/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ss64.com/nt/&quot;&gt;http://ss64.com/nt/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://rstforums.com/forum/22324-hacking-tools-windows.rst&quot;&gt;https://rstforums.com/forum/22324-hacking-tools-windows.rst&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://en.wikipedia.org/wiki/IPv4subnettingreference&quot;&gt;https://en.wikipedia.org/wiki/IPv4&lt;i&gt;subnetting&lt;/i&gt;reference&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/&quot;&gt;http://www.nixtutor.com/linux/all-the-best-linux-cheat-sheets/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://shelldorado.com/shelltips/beginner.html&quot;&gt;http://shelldorado.com/shelltips/beginner.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://mywiki.wooledge.org/BashPitfalls&quot;&gt;http://mywiki.wooledge.org/BashPitfalls&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml&quot;&gt;https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.robvanderwoude.com/ntadmincommands.php&quot;&gt;http://www.robvanderwoude.com/ntadmincommands.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/security-resources/sec560/netcatcheatsheet&quot;&gt;https://www.sans.org/security-resources/sec560/netcat&lt;i&gt;cheat&lt;/i&gt;sheet&lt;/a&gt;&lt;i&gt;&lt;a href=&quot;http://v1.pdf/&quot;&gt;v1.pdf&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://countuponsecurity.files.wordpress.com/2015/06/jtr-cheatsheetimg.png&quot;&gt;https://countuponsecurity.files.wordpress.com/2015/06/jtr-cheatsheetimg.png&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://danielmiessler.com/study/tcpdump/&quot;&gt;https://danielmiessler.com/study/tcpdump/&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.infosecwriters.com/Papers/nessusNMAPcheatSheet.pdf&quot;&gt;http://www.infosecwriters.com/Papers/nessusNMAPcheatSheet.pdf&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Passwords Wordlists, Hashes, Tools&lt;br /&gt;
&lt;a href=&quot;http://www.irongeek.com/i.php?page=videos/password-exploitation-class&quot;&gt;http://www.irongeek.com/i.php?page=videos/password-exploitation-class&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://cirt.net/passwords&quot;&gt;https://cirt.net/passwords&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://h.foofus.net/?pageid=55&quot;&gt;http://h.foofus.net/?pageid=55&lt;/a&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;a href=&quot;http://foofus.net/?pageid=63&quot;&gt;http://foofus.net/?pageid=63&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://hashcrack.blogspot.ru/&quot;&gt;http://hashcrack.blogspot.ru/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.onlinehashcrack.com/&quot;&gt;http://www.onlinehashcrack.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.md5this.com/&quot;&gt;http://www.md5this.com/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://contest-2010.korelogic.com/wordlists.html&quot;&gt;http://contest-2010.korelogic.com/wordlists.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://packetstormsecurity.com/Crackers/wordlists/&quot;&gt;https://packetstormsecurity.com/Crackers/wordlists/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://hqsoftwarecollection.blogspot.in/p/36gn-wordlist.html&quot;&gt;http://hqsoftwarecollection.blogspot.in/p/36gn-wordlist.html&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://wiki.skullsecurity.org/Passwords&quot;&gt;https://wiki.skullsecurity.org/Passwords&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283&quot;&gt;https://www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.sans.org/reading-room/whitepapers/testing/crack-pass-hash-33219&quot;&gt;https://www.sans.org/reading-room/whitepapers/testing/crack-pass-hash-33219&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://nmap.org/ncrack/&quot;&gt;https://nmap.org/ncrack/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.openwall.com/john/&quot;&gt;http://www.openwall.com/john/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ophcrack.sourceforge.net/&quot;&gt;http://ophcrack.sourceforge.net/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://inquisb.github.io/keimpx/&quot;&gt;https://inquisb.github.io/keimpx/&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-passwords-part-3-using-hashcat-0156543/_&quot;&gt;http://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-passwords-part-3-using-hashcat-0156543/_&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
InfoSec Hiring&lt;br /&gt;
Reddit Thread Q3 2015&lt;br /&gt;
Reddit Thread Q2 2015&lt;br /&gt;
ShmooCon Hiring List 2015&lt;br /&gt;
SANS&lt;br /&gt;
Careers Stackoverflow&lt;br /&gt;
PenTester Salary&lt;br /&gt;
San Francisco InfoSec Jobs&lt;br /&gt;
&lt;a href=&quot;http://infosecinstitute.com/&quot;&gt;Infosecinstitute.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://inspiredcareers.org/&quot;&gt;Inspiredcareers.org/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
IT Certifications&lt;br /&gt;
&lt;a href=&quot;http://certs.infosecinstitute.com/&quot;&gt;http://certs.infosecinstitute.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Links Collections&lt;br /&gt;
&lt;a href=&quot;http://in-addr.nl/security-links.php&quot;&gt;http://in-addr.nl/security-links.php&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://ser-storchak.blogspot.ru/p/blog-page16.html&quot;&gt;http://ser-storchak.blogspot.ru/p/blog-page16.html&lt;/a&gt;&lt;br /&gt;
Reddit NetsecStudents Wiki&lt;br /&gt;
&lt;a href=&quot;https://www.vulnhub.com/resources/&quot;&gt;https://www.vulnhub.com/resources/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Books&lt;br /&gt;
Security Books at Amazon&lt;br /&gt;
A Bug Hunter&#39;s Reading List&lt;br /&gt;
An Application Security Reading List&lt;br /&gt;
&lt;br /&gt;
Videos:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/ANlROJNWtCs/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/ANlROJNWtCs?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/Sye3mu-EoTI/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/Sye3mu-EoTI?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/kPxavpgos2I/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/kPxavpgos2I?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/_8xJaaQlpBo/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/_8xJaaQlpBo?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/y2zrEAwmdws/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/y2zrEAwmdws?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/GPjcSxyIIUc/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/GPjcSxyIIUc?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/kMG8IsCohHA/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/kMG8IsCohHA?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/pnqcHU2qFiA/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/pnqcHU2qFiA?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
----End of his article------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
all in all this is a great article worth keeping on the web as it helps bring resources in one place for people.&lt;br /&gt;
&lt;br /&gt;
If you like to take a look at my resources list check out the article &lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
please share</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/1404023700635829833/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2016/04/ethical-hacking-bookmarks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/1404023700635829833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/1404023700635829833'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2016/04/ethical-hacking-bookmarks.html' title=' Ethical Hacking Bookmarks'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/ANlROJNWtCs/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-6797494411200625203</id><published>2016-03-12T21:13:00.003-08:00</published><updated>2016-03-12T21:13:35.613-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacy"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Protecting your Android device and your Privacy</title><content type='html'>Its been a while since I have &lt;a href=&quot;http://localtechrepair.blogspot.com/2013/06/protect-your-data-from-nsa.html&quot; target=&quot;_blank&quot;&gt;written &lt;/a&gt;about how to protect your self from the prying eyes of government. So if your trying to protect your self against the NSA, GCHQ, or who ever here are some things that you can do to help protect yourself.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt; Since those 3 characters agencies mass surveillance pick up a lot of innocent peoples private data that never go away or GCHQ where they are &lt;a href=&quot;http://www.theguardian.com/uk-news/2016/feb/12/gchq-hacking-does-not-breach-human-rights-investigatory-powers-tribunal&quot; target=&quot;_blank&quot;&gt;legal to hack your data&lt;/a&gt;.&amp;nbsp; So since the main area that is been popular for governments resiliency is your mobile phone here are some things you can do to help protect them.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Operating system:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;This&lt;b&gt; &lt;/b&gt;would be a modified android OS that is stock with some additional features.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://get.cm/&quot; target=&quot;_blank&quot;&gt;CyanogenMod&lt;/a&gt; has a lot of improvements over stock android and is controlled by community and not by corporate google who may be forced to try to put back doors in their OS.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
From there you will want to be on the latest version of the operation system because you will want to have the app protection with permissions that android 6 and above have and you will want to be using full hard drive encryption on the device. To protect against governments forcing Google or Apple from unlocking the device you will want to not install the Google Play store on the phone just to be sure they can&#39;t force it to be unlocked.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b&gt;&lt;span class=&quot;fullpost&quot;&gt;Apps:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;For additional security, and to help protect your information from theft while the device is on and not locked down, you can use an app called &lt;a href=&quot;https://play.google.com/store/apps/details?id=csh.cryptonite&quot; target=&quot;_blank&quot;&gt;Cryptonite&lt;/a&gt;. This may seem like over doing it but just in case someone gets on the device or they hack the device it self then you have an additional step of protection.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Communication on the devices is also very important to have.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;fullpost&quot;&gt;Email:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;using an app called &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain&quot; target=&quot;_blank&quot;&gt;OpenKeychain &lt;/a&gt;will help you protect your connections with strong pgp encryption. so even if they force your email provider to hand over your emails they will be encrypted and not able to be read.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;fullpost&quot;&gt;Messaging and Calling:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;The easiest way and with the least trouble is using an app called &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&quot; target=&quot;_blank&quot;&gt;Signal&lt;/a&gt;. Signal has data voice calling and encrypted text messages. It keeps the texts encrypted on your device and not just in transit. You have additional protection by being able to put a password on the application it self that will lock the app so even if someone gets your phone unlocked and tries to get into your messages its secure. You can have private calls to your loved ones and know that they are secure and that getting messages that are not modified by anyone.&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Browsing the Web&lt;/b&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=org.mozilla.firefox&quot; target=&quot;_blank&quot;&gt;Firefox&lt;/a&gt;: using plugins for &lt;a href=&quot;https://www.eff.org/https-everywhere&quot; target=&quot;_blank&quot;&gt;HTTPS everywhere&lt;/a&gt;, &lt;a href=&quot;https://noscript.net/nsa/&quot; target=&quot;_blank&quot;&gt;noscript&lt;/a&gt;, and &lt;a href=&quot;https://addons.mozilla.org/en-US/android/addon/adblock-plus/&quot; target=&quot;_blank&quot;&gt;adblocker&lt;/a&gt;. these will greatly increase your security. ensuring your get the security you need with encryption to the server, preventing random javascript from running that may attack your device and preventing rogue ads that may try to attack you.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;From there you can also try additional steps to keep private using some other apps. There are tools like &lt;a href=&quot;https://play.google.com/store/apps/details?id=org.torproject.android&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;Orbot&lt;/a&gt; which is the tor network, &lt;a href=&quot;https://f-droid.org/repository/browse/?fdid=net.i2p.android.router&quot; target=&quot;_blank&quot;&gt;F-Droid&lt;/a&gt; which will give you access to the ip2 network, or vpn access from companies like &lt;a href=&quot;https://www.privateinternetaccess.com/pages/android-vpn-app&quot; target=&quot;_blank&quot;&gt;Private Internet Access&lt;/a&gt; who don&#39;t &lt;a href=&quot;https://torrentfreak.com/vpn-providers-no-logging-claims-tested-in-fbi-case-160312/&quot; target=&quot;_blank&quot;&gt;keep logs&lt;/a&gt;.&amp;nbsp; Or if you like to set up and use your own open vpn and tunnel it over a ssh tunnel to make it look like normal https traffic then there are these 2 applications &lt;a href=&quot;https://play.google.com/store/apps/details?id=eu.smallapps.tunnel&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;TLS/SSL Tunnel&lt;/a&gt; and &lt;a href=&quot;https://play.google.com/store/apps/details?id=de.blinkt.openvpn&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;OpenVPN&lt;/a&gt; or if you want to be different you can go with a vpn like &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.github.shadowsocks&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;shadowsocks&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Password Management&lt;/b&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Password management is very hard for a lot of people. I find having a password manager the easiest thing that syncs between my devices. you can use a program like &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.jefftharris.passwdsafe&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;passwordsafe&lt;/a&gt; and have it sync the encrypted password file between your many devices. This will help with if any website gets compromised like they do quite often then your password that got leaked is only 1 password and does not compromise anything else for you.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;I also use 2 step verification for every account that supports it which I seriously think about not using a service if they do not support it and probably the best app for that is the &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;Authenticator&lt;/a&gt; app which is produced by Google.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;I hope these apps will help you secure your android device down more than it currently is and help you become safer and less likely to be compromised.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Thanks for reading and please share with others so they can learn also.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;Local Tech Repair Admin&lt;br /&gt;
&lt;/span&gt; </content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/6797494411200625203/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2016/03/protecting-your-android-device-and-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6797494411200625203'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6797494411200625203'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2016/03/protecting-your-android-device-and-your.html' title='Protecting your Android device and your Privacy'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-7538606039455080457</id><published>2015-10-17T08:19:00.000-07:00</published><updated>2015-10-17T08:23:44.899-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Opinion"/><title type='text'>Facebook Never deleted my account after years</title><content type='html'>So after over a year after deleting my #Facebook account and not signing into it.&amp;nbsp; My wife wanted me to get back on.&amp;nbsp; When I deleted my Facebook I went through all the trouble of doing it properly.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
So I go there to create an account because we&#39;ll a year+ later it should have been deleted.&amp;nbsp; And now I find out that my email is already in use.&amp;nbsp; This is extremely frustrating to me that they refused to delete my account after so many years. &lt;br /&gt;
&lt;br /&gt;
So I went to sign in with the old password and Yep there is my account. &lt;br /&gt;
&lt;br /&gt;
The first thing I get is a Facebook survey asking if I believe that Facebook cares about its users.&amp;nbsp; Well the answer to that is I strongly disagree.&amp;nbsp; Facebook is like a bad stalker that will hoard onto your information even after you jumped through all their hoops and you gave them the months they needed to remove it and still they did not. &lt;br /&gt;
&lt;br /&gt;
Again #Facebook is very frustrating.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;#Facebookdontcare&lt;br /&gt;
&lt;br /&gt;
</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/7538606039455080457/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/10/facebook-never-deleted-my-account-after.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7538606039455080457'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7538606039455080457'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/10/facebook-never-deleted-my-account-after.html' title='Facebook Never deleted my account after years'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-6222995465093064127</id><published>2015-10-14T12:34:00.002-07:00</published><updated>2015-10-14T19:36:07.794-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Powershell"/><title type='text'>Using powershell to check if password is going to expire</title><content type='html'>Using powershell to create a script to check if the clients password is going to be expiring in the next 5 days.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt; &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt; I love powershell and just like creating random tools with it. here is a script that can be set as a task on the clients computer to run each day. This helps fix a problem with windows where the popup notifying the user their password is going to expire in x amount of days not showing up because the end user is not login in.&lt;/span&gt;&lt;br /&gt;
&lt;code&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&amp;lt;#&lt;br /&gt;
.SYNOPSIS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Checks if user password is with in 5 days of expiring&lt;br /&gt;
.DESCRIPTION&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Created by Joshua Millikan&amp;nbsp;&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Website:http://localtechrepair.blogspot.com&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Date: 10/14/15&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; version: 1.00&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; This script is designed to check if the account is with in 5 days of expiring and then emails them with instructions on how to reset. &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
#&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#grabs current user information&lt;br /&gt;
$getusers = get-aduser $env:USERNAME -Properties * &lt;br /&gt;
#grabs todays date&lt;br /&gt;
$date = Get-Date&lt;br /&gt;
#checks the number of days between the last password set and todays date. &lt;br /&gt;
$numberofdays = New-TimeSpan -Start $getusers.PasswordLastSet -end $date&lt;br /&gt;
#grabs the domain policy for passwords&lt;br /&gt;
$domainpolicydays = Get-ADDefaultDomainPasswordPolicy | select maxpasswordage&lt;br /&gt;
#grabs the amount of days from maxpasswordage&lt;br /&gt;
[int]$policydays = $domainpolicydays.maxpasswordage.Days&lt;br /&gt;
#removes as our 5 day warning&lt;br /&gt;
$policydays += -5&lt;br /&gt;
#checks if password never expiring is checked. (it should never be checked less service account)&lt;br /&gt;
if ($getusers.PasswordNeverExpires -eq $False){&lt;br /&gt;
#checks if the number of days is greater than or policy warning&lt;br /&gt;
if ($numberofdays.Days -ge $policydays){&lt;br /&gt;
&lt;br /&gt;
$body = &quot;Hello &quot; +$env:USERNAME + &quot;&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt; your password will be expiring soon please change your password.&amp;lt;br /&amp;gt; You can do this by hitting ctrl + alt + del and selecting Change Password&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt; Report from Admin&quot;&lt;br /&gt;
Send-MailMessage -to $getusers.EmailAddress -from $getusers.EmailAddress -Subject &quot;Password Expiring soon&quot; -SmtpServer &quot;mail.pacificorp.com&quot; -BodyAsHtml $body&lt;br /&gt;
}&lt;br /&gt;
} &lt;/span&gt;&lt;br /&gt;
&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
This script is pulling a lot of user enviorment information to determine who to check.&amp;nbsp; the email it sends will be from them selves this can be changed to say the companies service desk/help desk. also the instructions can be changed if you prefer them going to a self help portal or what not.&lt;br /&gt;
&lt;br /&gt;
Hope you enjoy,&lt;br /&gt;
Local Tech Repair Admin</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/6222995465093064127/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/10/using-powershell-to-check-if-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6222995465093064127'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/6222995465093064127'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/10/using-powershell-to-check-if-password.html' title='Using powershell to check if password is going to expire'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-1391055145908300518</id><published>2015-09-17T19:30:00.000-07:00</published><updated>2016-01-18T10:39:56.810-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Information Security (InfoSec) Software, Books, and Resources</title><content type='html'>Security training and resources. I am creating this post mostly to help myself keep track of all the different infosec resources, applications, and study material for exams like Comptia Security+, CEH, CISSP, OSCP, and others. This is a resource for offensive security practices and tools. This list will be updated as time goes on.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.blogger.com/null&quot; name=&quot;more&quot;&gt;&lt;/a&gt;%Updated on 11/18/15%&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
Index &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#books&quot;&gt;Books&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#defense&quot;&gt;Defense&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#mobile&quot;&gt;Mobile Apps&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#software&quot;&gt;Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#websites&quot;&gt;Websites&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#malware&quot;&gt;Malware Analysis&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#guides&quot;&gt;Guides&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;   &lt;span id=&quot;software&quot;&gt;Software:&lt;/span&gt; &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;Probably the number one of all the software out there &lt;a href=&quot;http://www.metasploit.com/&quot; target=&quot;_blank&quot;&gt;Metasploit &lt;/a&gt;is one of the top exploit deployment and research tool. It helps you quickly deploy and expedite the exploiting process.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.fastandeasyhacking.com/&quot; target=&quot;_blank&quot;&gt;Armitage&lt;/a&gt;/&lt;a href=&quot;http://www.advancedpentest.com/&quot; target=&quot;_blank&quot;&gt;Cobalt Strike&lt;/a&gt; are both tools to help leverage the Metasploit Framework to quickly and show examples of how to quickly and quietly leverage and suggest exploits to get access to network resources. All these resources require and are based off of the complexity of the metasploit framework. So if you know how to use metasploit very well you may find that these tools will just expedite your exploiting speed and help have a graphical place to work in. Though metasploit has its own Pro version that does close to the same thing.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://code.google.com/p/subterfuge/&quot; target=&quot;_blank&quot;&gt;Subterfuge Framework&amp;nbsp;&lt;/a&gt;will help you leverage and run a Man In the Middle Attack with out needing to worry about configuring sslstrip, arp poisioning, harvesting credentials, blocking vpn tunnels, and much more. Subterfuge allows you to build plugins onto subterfuge just like Metasploit Framework does. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.paterva.com/web6/products/maltego.php&quot; target=&quot;_blank&quot;&gt;Maltego &lt;/a&gt;is there for helping you gather information on people and companies. This will help you gather information on what is out there in your corporation and you will find those that you can later try to exploit to get into the corporation. The program will help you make a threat picture of your company or another company.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://bitbucket.org/LaNMaSteR53/recon-ng&quot; target=&quot;_blank&quot;&gt;Recon-ng&lt;/a&gt; is a recon tool to help you speed up finding information on the web. For instance there is a module to search the web on a email and compare it against the different dumps of password and email. some more basic uses of recon-ng can be found &lt;a href=&quot;http://resources.infosecinstitute.com/the-recon-ng-framework-automated-information-gathering/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.tenable.com/products/nessus&quot; target=&quot;_blank&quot;&gt;Nessus&lt;/a&gt;&amp;nbsp;is a software that will help you do vulnerability scan your network computers. This will help you determine which security patches are missing, configuration, and compliance problems. There is a wide array of plugins that can help you find more exploits not patched in your network and avoid compliance problems and breaches later down the road.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;http://www.rapid7.com/products/nexpose/&quot; target=&quot;_blank&quot;&gt;Nexpose&amp;nbsp;&lt;/a&gt;&amp;nbsp;is just like Nessus and helps you know what your assets in your corporation have vulnerabilities.&amp;nbsp; Nexpose proactively scans your environment for misconfigurations, vulnerabilities, and malware and provides guidance for mitigating risks.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.openvas.org/&quot; target=&quot;_blank&quot;&gt;OpenVAS&lt;/a&gt; is a open source vulnerability scanner on the market. So if your looking for a free vulnerability scanner like that of nexpose or nessus then this would be your tool. &lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;a href=&quot;https://github.com/trustedsec/social-engineer-toolkit&quot; target=&quot;_blank&quot;&gt;SET&lt;/a&gt;&amp;nbsp;is a toolkit that will help you perform advanced attacks against the human element in an organization.&amp;nbsp;&lt;/span&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Both &lt;a href=&quot;http://www.cryptohaze.com/gpurainbowcracker.php&quot; target=&quot;_blank&quot;&gt;cryptohaze &lt;/a&gt;and &lt;a href=&quot;http://hashcat.net/oclhashcat/&quot; target=&quot;_blank&quot;&gt;oclhashcat &lt;/a&gt;are both great GPU based tools to help speed up the cracking process a lot. You can see what the difference is in our previous &lt;a href=&quot;http://localtechrepair.blogspot.com/2013/06/benchmarking-pyrit-and-oclhashcat-plus.html&quot; target=&quot;_blank&quot;&gt;article &lt;/a&gt;on it. &lt;/li&gt;
&lt;li&gt;Wireless auditing, &lt;a href=&quot;http://www.aircrack-ng.org/&quot; target=&quot;_blank&quot;&gt;Aircrack-ng&lt;/a&gt;, &lt;a href=&quot;https://code.google.com/p/pyrit/&quot; target=&quot;_blank&quot;&gt;Pyrit&lt;/a&gt;, and &lt;a href=&quot;https://code.google.com/p/reaver-wps/&quot; target=&quot;_blank&quot;&gt;reaver-wps&lt;/a&gt; are all great tools to help you get the edge on the wireless network. These allow you to do a wide variety of attacks on the wifi and the inherent trust of the different wifi systems. All these tools help you get into the network and from there you use other tools.&amp;nbsp;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2012/01/cracking-almost-any-router.html&quot; target=&quot;_blank&quot;&gt;Reaver how to&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2011/04/wpa-password-testing-pyrit.html&quot; target=&quot;_blank&quot;&gt;WPS Cracking with Pyrit&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2011/01/cracking-wep-on-ubuntu-linux.html&quot; target=&quot;_blank&quot;&gt;WEP Cracking&lt;/a&gt;&amp;nbsp;- Getting it setup on &lt;a href=&quot;http://localtechrepair.blogspot.com/2013/06/getting-wepcrackgui-installed-on-ubuntu.html&quot; target=&quot;_blank&quot;&gt;ubuntu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://code.google.com/p/wifite/&quot; target=&quot;_blank&quot;&gt;Wifite&lt;/a&gt; is an auditing suite for wep,wps, wpa and the likes. this tools is probably the easiest tool out there for auditing and automation. This tool is built into nethunter toolset.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;a guide and more details on how these attacks work can be found &lt;a href=&quot;http://localtechrepair.blogspot.com/2015/06/how-cracker-breaks-wifi-and-more.html&quot; target=&quot;_blank&quot;&gt;here &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.thoughtcrime.org/software/sslstrip/&quot; target=&quot;_blank&quot;&gt;sslstrip&lt;/a&gt; is a tool to help you when your doing a man in the middle attack on a client. After you have poisoned them and having their network connection going through you for internet. sslstrip helps strip all ssl for their connections and turns them into http requests allowing you to grab the information that they are sending be it passwords or other sensitive information.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://sourceforge.net/projects/sslscan/&quot; target=&quot;_blank&quot;&gt;sslscan&lt;/a&gt; is a tool that will go through a website and see what types of ssl/tls that the site accepts. this way you can see if there are weaknesses known to the web servers encryption.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://nmap.org/&quot; target=&quot;_blank&quot;&gt;Nmap &lt;/a&gt;you can&#39;t go into security with out hearing about nmap it is used in a lot of tools for port scanning and identifying OS of their computers. This is a very loud tool and can easily be identified on a network traffic and on host logs. so it is best to pipe the scans though a botnet&amp;nbsp; so that they can not identify who is attacking them. Also it is useful to learn how to use the tool and not just do a full scan on everything. identify the OS then use the knowledge of your exploits to selectively scan the ports that they may have vulnerabilities in them.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.yersinia.net/&quot; target=&quot;_blank&quot;&gt;Yersinia &lt;/a&gt;is a tool to attack the protocol layer to take advantage of some weakeness  in different network protocols. It pretends to be a solid framework for  analyzing and testing the deployed networks and systems&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://cirt.net/nikto2&quot; target=&quot;_blank&quot;&gt;nikto2&lt;/a&gt;&amp;nbsp;is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://wapiti.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;Wapiti&amp;nbsp; &lt;/a&gt;this framework is different than a lot of web vulnerability scanners as it does not look at the source code to find places to inject. it looks at the app it self and then tries to find places to inject. this just gives a different way of looking for places to inject. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.aircrack-ng.org/&quot; target=&quot;_blank&quot;&gt;Aircrack-ng&lt;/a&gt; is one of the top tools used for cracking wifi and doing attacks on wifi. This tool is used in many underlining script and programs that attack wifi. If you are going to attack a wifi you can&#39;t not know about aircrack-ng.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/SilverFoxx/PwnSTAR&quot; target=&quot;_blank&quot;&gt;PwnSTAR&lt;/a&gt; is a tool developed by&amp;nbsp; SilverFoxx/Vulpi. The tool speeds up the process of creating an evil maid attack and then doing a MiTM attack on the clients. some examples on how it can run on Kali linux can be found on the &lt;a href=&quot;https://forums.kali.org/showthread.php?1406-PwnSTAR-running-on-Kali&quot; target=&quot;_blank&quot;&gt;Kali Linux forum&lt;/a&gt;&lt;/li&gt;
&lt;div style=&quot;float: left; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;li&gt;&lt;a href=&quot;http://www.thc.org/thc-hydra/&quot; target=&quot;_blank&quot;&gt;THC Hydra&lt;/a&gt; is a great tool if you need to run a dictionary attack on platforms from over 30 different protocals. THC Hydra is extremely fast at attacking telnet, smb, databases, ftp and much more. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.wireshark.org/&quot; target=&quot;_blank&quot;&gt;wireshark &lt;/a&gt;is a go to default for me when it comes to packet sniffing of network and analysis of packets on a network. wireshark is a must have tool to learn if your wanting to know what is going across the wire and there are many plugins to it to help you do many other things. Though wireshark does have its own vulnerabilities so best only run it on networks that you trust or on machines you don&#39;t care about. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://sqlmap.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;sqlmap &lt;/a&gt;tool will help you when trying to find exploits in web applications and getting access to the back end database. Though this does not mean that if will find the exploit for you all the time so best to learn how to do the sql injection your first and use this tool to help speed up the exploit development for the web site.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://sqlninja.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;sqlninja &lt;/a&gt;another tool for website injections and penetration testing. This also is not the solve all solution to finding exploits on web applications but this greatly increases speed of penetration testing and also gaining access to the database server. So once you have discovered a sql injection in your web application you can use the sqlninja tool to help you exploit it and gain access.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://tools.kali.org/vulnerability-analysis/bbqsql&quot; target=&quot;_blank&quot;&gt;BBQSQL &lt;/a&gt;this ds another automated sql testing tool. &amp;nbsp;Haven&#39;t used it yet to here is explanation from kali group&quot;It is extremely useful when attacking tricky SQL injection  vulnerabilities. BBQSQL is also a semi-automatic tool, allowing quite a  bit of customization for those hard to trigger SQL injection findings.  The tool is built to be database agnostic and is extremely versatile. It  also has an intuitive UI to make setting up attacks much easier. Python  gevent is also implemented, making BBQSQL extremely fast.&quot;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.veil-framework.com/&quot; target=&quot;_blank&quot;&gt;Veil-Framework&lt;/a&gt;&amp;nbsp;is a anti virus bypassing framework. This allows you to install and run a virus on a computer with out being detected by the anti virus vendors. This gives you different methods of injection into ram so that you can get a reverse shell and then disable AV and others.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/mattifestation/PowerSploit&quot; target=&quot;_blank&quot;&gt;powersploit&lt;/a&gt;&amp;nbsp;using powersploit to speedup your pentest. this is a great way to bypass some ways if the domain administrators lock down other areas of the OS but leave powershell open to be used.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerView&quot; target=&quot;_blank&quot;&gt;PowerView&lt;/a&gt; another powershell tool to help survey the network and help you gain lateral movement.&amp;nbsp; &lt;/li&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;http://portswigger.net/burp/&quot; target=&quot;_blank&quot;&gt;Burp Suite&lt;/a&gt; or &lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project&quot; target=&quot;_blank&quot;&gt;Zed Attack Proxy&lt;/a&gt; both allow you to audit packets before they are sent and modify them on the fly.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&quot; target=&quot;_blank&quot;&gt;WebScarab &lt;/a&gt;is another proxy web application testing tool this is a little more useful if your a programmer and want to test more items directly with the application.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://w3af.org/&quot; target=&quot;_blank&quot;&gt;w3af &lt;/a&gt;is the www attack framework. so another great tool in the bunch for web test.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://sourceforge.net/projects/ws-attacker/&quot; target=&quot;_blank&quot;&gt;ws attacker framework&amp;nbsp;&lt;/a&gt; is a modular framework for web services penetration testing.  It is a free and easy to use software solution, which provides an  all-in-one security checking interface with only a few clicks.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.bulbsecurity.com/smartphone-pentest-framework/&quot; target=&quot;_blank&quot;&gt;Smartphone Pentest Framework&lt;/a&gt; is a framework to make it easier to launch attacks against smartphones. Think it as SET for smartphones.&amp;nbsp; &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.gentilkiwi.com/&quot; target=&quot;_blank&quot;&gt;Overpass the Hash/Mimikatz &lt;/a&gt;is a method for getting the hash dump on a domain controller and then creating a Golden Ticket so that you can privileged escalate to a different user&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://labs.mwrinfosecurity.com/blog/2012/07/18/incognito-v2-0-released/&quot; target=&quot;_blank&quot;&gt;Incagnito &lt;/a&gt;if your needing to get the tokens for the accounts on the computer. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://beefproject.com/&quot; target=&quot;_blank&quot;&gt;BeEF&lt;/a&gt;:&amp;nbsp; is a    penetration testing tool that focuses on the web browser. Unlike other security frameworks, BeEF looks    past the hardened network perimeter and client system, and examines    exploitability within the context of the one open door: the web browser.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://dradisframework.org/&quot; target=&quot;_blank&quot;&gt;Dradis&lt;/a&gt;: is a tool to help effectively manage information that you gather. parses a lot of the output for lots of different security tools so that you get the information you need quickly and managing multiple pen tests at one time.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.gremwell.com/what_is_magictree&quot; target=&quot;_blank&quot;&gt;MagicTree&lt;/a&gt; MagicTree is a penetration tester productivity tool. It is designed to allow easy and straightforward data consolidation, querying, external command execution and (yeah!) report generation&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Additional list of tools and descriptions can be found here at&amp;nbsp; &lt;a href=&quot;http://blackarch.org/tools.html&quot; target=&quot;_blank&quot;&gt;Blackarch Linux&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;float: left; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot; id=&quot;books&quot;&gt; Books:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;Security Training books are always a good stop shop for information though nothing beats practicing it. You will always have your coding books and what not though i am going to skip those and go towards the specialty books and the cert books. &lt;/span&gt; &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/dp/0321294319/?tag=httplocaltech-20&quot; target=&quot;_blank&quot;&gt;Rootkits: Subverting the Windows Kernel&lt;/a&gt; This book is the foundation of my learning on how rootkits work and the ideas around them. This may be an older book but it is well worth the read and learning from it every day. It was far above my head when I first picked it up and still am learning from it.. It used to be the author of Rootkits.com before the site went down. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.amazon.com/dp/0071780289/?tag=httplocaltech-20&quot; target=&quot;_blank&quot;&gt;Hacking Exposed&lt;/a&gt; is another book that has been bringing the world of network security secrets and solutions to the masses. This book has been around for a while now and they are in their 7th in the series and have made other series around it for mobile and others.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;If your going for your Security+ Certification then you may want to pick up a study book for it. If you are looking for a study book and software test then you can&#39;t beat the new &lt;a href=&quot;http://www.amazon.com/dp/0071834265/?tag=httplocaltech-20&quot; target=&quot;_blank&quot;&gt;compTIA Security+ bundle&lt;/a&gt; this has the pre assessment tests and also pdfs, videos and everything that you need to learn about it..&amp;nbsp; Other good resources are &lt;a href=&quot;http://en.wikibooks.org/wiki/Security%2B_Certification&quot; target=&quot;_blank&quot;&gt;wikibooks&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.amazon.com/gp/product/1494861275/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494861275&amp;amp;linkCode=as2&amp;amp;tag=httplocaltech-20&amp;amp;linkId=AMFLKC6CEZ4LX7O5&quot; target=&quot;_blank&quot;&gt;Basic Security Testing with Kali Linux&lt;/a&gt; is a book well exactly what it title is about. If your wanting to learn Kali Linux for basic security testing and start off with an offensive security for your security in depth then start out with an offensive security book like this.&lt;/li&gt;
&lt;li&gt;lots of books&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;http://amzn.to/1fKgcBZ&quot;&gt;Exploiting Software: How to Break Code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1DhKy3E&quot;&gt;Hacker Linux Uncovered&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1O7gopE&quot;&gt;Windows Internals (Developer Reference)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1O7hqBR&quot;&gt;Network Security Assessment: Know Your Network&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1DhLvJi&quot; target=&quot;_blank&quot;&gt;Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1SnThYU&quot; target=&quot;_blank&quot;&gt;The Shellcoder&#39;s Handbook: Discovering and Exploiting Security Holes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;http://amzn.to/1OeMyAh&quot; target=&quot;_blank&quot;&gt;Web Hacking: Attacks and Defense&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1SnTN9m&quot; target=&quot;_blank&quot;&gt;The Art of Deception: Controlling the Human Element of Security &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1O7id5M&quot; target=&quot;_blank&quot;&gt;The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1DhLLYI&quot; target=&quot;_blank&quot;&gt;Social Engineering: The Art of Human Hacking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1TDfFQA&quot; target=&quot;_blank&quot;&gt;Ghost in the Wires: My Adventures as the World&#39;s Most Wanted Hacker&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;https://www.blogger.com/Blue%20Team%20Handbook:%20Incident%20Response%20Edition&quot; target=&quot;_blank&quot;&gt;Blue Team Handbook: Incident Response Edition&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Some of the books that I personally on my jurney to learning more about computers and security.&amp;nbsp; some of these where free from professors&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1K8O429&quot; target=&quot;_blank&quot;&gt;Information Security Risk Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://CompTIA Security+ Training Kit&quot; target=&quot;_blank&quot;&gt;CompTIA Security+ Training Kit&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://Information Security Illuminated&quot; target=&quot;_blank&quot;&gt;Information Security Illuminated&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1K8WnLl&quot; target=&quot;_blank&quot;&gt;Fundamentals of Secure Computer Systems&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1GHdlAn&quot; target=&quot;_blank&quot;&gt;Virtual Private Networking: A Construction, Operation and Utilization Guide &lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1K8WUx3&quot; target=&quot;_blank&quot;&gt;CWNA Guide to Wireless LANs&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1K8X0oo&quot; target=&quot;_blank&quot;&gt;Windows Server 2012 R2 Pocket Consultant&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1ZDlPnO&quot; target=&quot;_blank&quot;&gt;Active Directory® Administrator&#39;s Pocket Consultant &lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1ZDm5mL&quot; target=&quot;_blank&quot;&gt;Cybersecurity Operations Handbook&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;http://amzn.to/1GHeIyW&quot; target=&quot;_blank&quot;&gt;Everyday Scripting with Ruby: For Teams, Testers, and You&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1Ow9XQK&quot; target=&quot;_blank&quot;&gt;Murach&#39;s Oracle SQL and PL/SQL for Developers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1GHfeNp&quot; target=&quot;_blank&quot;&gt;HTML, XHTML, and CSS Bible&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1K90Opt&quot; target=&quot;_blank&quot;&gt;Head First PHP &amp;amp; MySQL&lt;/a&gt; -- side note i love this series for those that are starting out as they are very good at logically going through the process for those that are hands on learning styles.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1K90Z4j&quot; target=&quot;_blank&quot;&gt;Linux Unwired&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://amzn.to/1GHfrQH&quot; target=&quot;_blank&quot;&gt;Mapping Security: The Corporate Security Sourcebook for Today&#39;s Global Economy&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;ul&gt;&lt;ul&gt;&lt;/ul&gt;
&lt;/ul&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot; id=&quot;websites&quot;&gt;Websites:&lt;/span&gt; &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;a href=&quot;http://www.securitytube.net/&quot; target=&quot;_blank&quot;&gt;SecurityTube.net&lt;/a&gt; is a great resource to watch and learn new security information. They have videos from a lot of the different security conferences, training programs, groups of videos for things like metasploit,&amp;nbsp; &lt;/span&gt;assembly learning, exploit research, and more.&amp;nbsp; Their goal is to bring quality InfoSec learning to the general public for free. They also have a newer Certification program and a very reasonable training program.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.cybrary.it/&quot; target=&quot;_blank&quot;&gt;Cybrary.it/&lt;/a&gt; is a website with a few classes for information security like &quot;python for security professionals&quot; and &quot;post exploitation hacking&quot;&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.exploit-db.com/&quot; target=&quot;_blank&quot;&gt;Exploit Database&lt;/a&gt; is a good way to keep up on exploits that are coming out and them being organized in good fashion. This helps you see actual code for the vulnerability and how you can use that vulnerbility that was published and exploit it. Great place to learn how to write exploits and use them or learn about which ones are out there.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://cve.mitre.org/&quot; target=&quot;_blank&quot;&gt;CVE &lt;/a&gt;There may not be an exploit written for metasploit for a vulnerability though you can find lots of the publicly known vulnerabilities out there and help you speed up the process of writing new exploits for vulnerabilities that come out. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.freerainbowtables.com/&quot; target=&quot;_blank&quot;&gt;Rainbow tables&lt;/a&gt; sadly rainbow tables are still useful for a lot of websites and even large company websites that for some odd reason do not salt their passwords. so you may find running these against your hash may find good results.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Links to other Great security related websites. &lt;a href=&quot;http://www.techexams.net/forums/off-topic/51719-best-security-websites.html&quot; target=&quot;_blank&quot;&gt;http://www.techexams.net/forums/off-topic/51719-best-security-websites.html&lt;/a&gt; this form has a wide range of websites from ethical hacking network to sectools.org to government websites. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://sectools.org/&quot; target=&quot;_blank&quot;&gt;SecTools &lt;/a&gt;is a great website to help you find more and review documentation and install guides for things like nmap and other security tools int he industry. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://opensecuritytraining.info/Training.html&quot; target=&quot;_blank&quot;&gt;OpenSecurityTraining&amp;nbsp;&lt;/a&gt;&amp;nbsp;is a wide range of Security related topics and training for free to the info security industry. &amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://skillset.com/&quot; target=&quot;_blank&quot;&gt;SkillSet.com&lt;/a&gt;&amp;nbsp;is a good website for testing your knowledge of CEH and CISSP certification exams that you may be trying to pass after learning all these topics on this page.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://code.google.com/p/it-sec-catalog/wiki/Exploitation&quot; target=&quot;_blank&quot;&gt;IT_Sec_Catalog &lt;/a&gt;for exploitation. this has links to many old and new articles on exploitation and learning how to do exploitation. Great resource for those learning to hack. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://cnqzu.com/library/Anarchy%20Folder/Computers/Hacking,%20Security/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Anarchy resources &lt;/a&gt;- WARNING! This website is not per say the most trusted source. so take extra security measures when accessing information on this website. resources may be infected and more. I put it here because it has more of the blackhat hacking side of information security training. so suggested only visit website behind network firewall on separate subnet of your rest of your network and in a vm and monitor your traffic on the network to make sure nothing escapes the network. So with that said I can&#39;t guarantee the safety or legal information on the website but its a good resource to understand how people think and history of hacking. Though this website has a huge resource of other information in the sub directories. also &lt;a href=&quot;http://murdercube.com/files/Computers/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;murdercube&lt;/a&gt; has almost the same collection.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://tldp.org/LDP/lkmpg/2.6/html/&quot; target=&quot;_blank&quot;&gt;Kernel Level Programing &lt;/a&gt;Site helping you learn how to program modules for the kernel. This is an essential beginning to learning how to program and make your own kernel RATs.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.sec.gov/edgar/searchedgar/companysearch.html&quot; target=&quot;_blank&quot;&gt;EDGAR&lt;/a&gt;&amp;nbsp;is used for gathering public information on a organization to help find weaknesses.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;webdns, ping, and other onlinetools: &lt;a href=&quot;http://whois.domaintools.com/&quot; target=&quot;_blank&quot;&gt;domaintools, &lt;/a&gt;&lt;a href=&quot;http://centralops.net/co/&quot; target=&quot;_blank&quot;&gt;CentralOps&lt;/a&gt;, and &lt;a href=&quot;https://tools.digitalpoint.com/&quot; target=&quot;_blank&quot;&gt;digitalpoint&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Reverse Engineering Malware&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://zeltser.com/reverse-malware-cheat-sheet/&quot; target=&quot;_blank&quot;&gt;https://zeltser.com/reverse-malware-cheat-sheet/&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.herdprotect.com/downloads.aspx&quot; target=&quot;_blank&quot;&gt;http://www.herdprotect.com/downloads.aspx &lt;/a&gt;Anti-Malware Scanner is a fast and free Windows desktop program which  detects malicious threats, spyware and adware by utilizing 68 industry  anti-malware scanners.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;https://remnux.org/&quot;&gt;https://remnux.org/&lt;/a&gt; virtual application that is used to reverse engineer malware and analyse how malware works. &lt;/li&gt;
&lt;li&gt;list of free automated malware analysis tool sanboxes. these online tools will try to determine what it does and how. &lt;a href=&quot;https://zeltser.com/automated-malware-analysis/&quot;&gt;https://zeltser.com/automated-malware-analysis/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://digital-forensics.sans.org/community/downloads&quot; target=&quot;_blank&quot;&gt;SIFT&lt;/a&gt; workstation is a tool kinda like the remnux though more aimed at investigating what happened.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.youtube.com/playlist?list=PL9HO6M_MU2nesxSmhJjEvwLhUoHPHmXvz&quot; target=&quot;_blank&quot;&gt;Red Teaming basics&lt;/a&gt;&amp;nbsp; if your just starting to get into red teaming then this is a series for you. Goes over the basics of red teaming and how as a offensive security professional you can think of how an attacker would exploit my network. Only negative is that its coming from a heavy cobalt strike perspective of a tool. though still a great starting point.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ht.transparencytoolkit.org/&quot; target=&quot;_blank&quot;&gt;Hacking Team Dump&lt;/a&gt; of knowledge.&amp;nbsp; This has&amp;nbsp; a huge list of resources, books, and topics on hacking and how a pay for service for governments taught their staff on how to hack.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://tutorials.cyberaces.org/tutorials&quot; target=&quot;_blank&quot;&gt;Cyber aces&lt;/a&gt; has tutorials on basics linux, windows, networking, powershell scripting, bash, and web scripting. If your looking at stating out in these areas this may be a good place to start to get a general understanding of them.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.hackingtutorials.org/&quot; target=&quot;_blank&quot;&gt;Hacking Tutorials&lt;/a&gt; has a list of tutorials on hacking.&amp;nbsp; &quot;We will be posting beginner Hacking Tutorials about hacking with Kali  Linux and other operating systems to show home and office users how easy  it often is to breach security and bad passwords. We will be covering  subjects like Wifi hacking, fingerprinting, vulnerability scanning,  malware and exploiting, penetration testing and ethical hacking.&quot;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.offensive-security.com/metasploit-unleashed/&quot; target=&quot;_blank&quot;&gt;Metasploit Unleashed&lt;/a&gt;&amp;nbsp; is a guide and free online materials for learning the materials framework and how to do pen-testing through the framework. it is a good read if you have not done it.&amp;nbsp; &lt;/li&gt;
&lt;li&gt;Windows internals&amp;nbsp;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.microsoftvirtualacademy.com/&quot;&gt;https://www.microsoftvirtualacademy.com/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/&quot; target=&quot;_blank&quot;&gt;https://technet.microsoft.com/en-us/&amp;nbsp;&lt;/a&gt;&amp;nbsp; &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;ul&gt;&lt;ul&gt;&lt;/ul&gt;
&lt;/ul&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;  &lt;span class=&quot;fullpost&quot; id=&quot;mobile&quot;&gt;Mobile apps:&lt;/span&gt; &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://www.amazon.com/dp/B007X7VHHI/?tag=httplocaltech-20&quot; target=&quot;_blank&quot;&gt;Hackers Reference&lt;/a&gt; and &lt;a href=&quot;https://play.google.com/store/apps/details?id=my.first.app&quot; target=&quot;_blank&quot;&gt;InfoSec Reference&lt;/a&gt; are both good solutions to learning security topics on the go. They go over different tools, news, and really everything about infosec and hacking. Great source while your wanting quick information to get your mind going till you get home. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.gurkedev.wifiprotector&quot; target=&quot;_blank&quot;&gt;Wifi Protector&lt;/a&gt; will help you stay safe while on open wifis and on your own personal one. It will alert you to ARP poisoning on the network. So if someone on the network is saying that they are the router and trying to do a man in the middle attack then you will be alerted and you can set it to auto kick you off.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=1282900&quot; target=&quot;_blank&quot;&gt;WifiKill &lt;/a&gt;is a easy way to implement a ARP poisoning from your android phone. Find out where people are surfing the web and denying those that are using to much bandwidth. So if you spot someone downloading using torrents then you can stop them so they don&#39;t take all the bandwidth.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.amazon.com/dp/B00BE9M1UI/?tag=httplocaltech-20&quot; target=&quot;_blank&quot;&gt;FlashCard Machine &lt;/a&gt;is not really a security tool though it is great for using to study. They allow you to download flashcards from a global shared database. So you can find infosecurity and certification flash cards. This can help you study and learn from others. You can also test your self against these cards. I have found CISSP, Security+, and CEH flash cards that help me study when i am on the go.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.nethunter.com/&quot; target=&quot;_blank&quot;&gt;Nethunter&lt;/a&gt; is a build of cyanogenmod and combining kali linux arm to make it run. nethunter gives you some easy scripts to work with external wifi card and then run evil ap, evil usb, and the likes. Comes with working metasploit and is able to be leveraged in a small platform on the go. This is more than a tool but more of a OS and tool set to work with. &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=2196707&quot; target=&quot;_blank&quot;&gt;DriveDroid &lt;/a&gt;allows you to plugin your droid to a computer and use it to boot a linux live cd via it. This allows you to leverage your phone as a mobile OS and store everything on your phone&amp;nbsp; and use the computers hardware. slight difference than using nethunter which uses the mobile hardware. &lt;/li&gt;
&lt;/ul&gt;
&lt;div id=&quot;defense&quot;&gt;
Hacking Prevention:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;IPS/IDS&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.snort.org/&quot; target=&quot;_blank&quot;&gt;Snort&amp;nbsp;&lt;/a&gt;is a great open source IDS and IPS system.&amp;nbsp; If your setting up a network at home or wanting to test your exploits against a network and see what attacks get picked up by snort rules and what not. This is good to help detect attacks, prevent them, and learn to get around IDS/IPS systems.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://suricata-ids.org/&quot; target=&quot;_blank&quot;&gt;Suricata&lt;/a&gt; is an open source IPS/IDS able to use snort rules also. &lt;br /&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;a href=&quot;http://technet.microsoft.com/en-us/windows/applocker.aspx&quot; target=&quot;_blank&quot;&gt;applocker&lt;/a&gt; you should use applocker to white list all applications that are allowed to load on your network. This video is a great explanation.&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=tYFVVY8GX24&quot;&gt;https://www.youtube.com/watch?v=tYFVVY8GX24&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Blocking Java User Agent at the proxy level so that you can control all java that is deployed and used on your network. White list good domains.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/emet&quot; target=&quot;_blank&quot;&gt;EMET&lt;/a&gt;&amp;nbsp;is a enhanced mitigation experience toolkit that is designed to help users defense against cyberattacks. The software is free though can be complicated to deploy but this help break a lot of malware requiring them to use another bypass.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;ADAudit Plus aka auditing both good and bad logins. This allows you to see if the local admin was used to login to multiple computer at one time.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=7558&quot; target=&quot;_blank&quot;&gt;Microsoft Baseline Security Analyzer&lt;/a&gt;. Helps you stay on top of patches for microsoft products and the applications that run on them.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
Defense Websites&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.justice.gov/criminal-ccips/ccips-documents-and-reports&quot; target=&quot;_blank&quot;&gt;CyberCrime &lt;/a&gt;has links to reports and documentation to help with computer crime. Different reports from the FBI for the years on computer crime&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div id=&quot;malware&quot;&gt;
Malware Analysis Tools&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;http://sourceforge.net/projects/regshot/&quot; target=&quot;_blank&quot;&gt;RegShot&lt;/a&gt; is for comparing differences in registry and filesystem from clean state to after malware was installed to see what happened.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://jacquelin.potier.free.fr/winapioverride32/&quot; target=&quot;_blank&quot;&gt;WinAPIOverride&lt;/a&gt; helps you follow the injection process of dlls and api calls for a running process to see what it did and where it went.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.wireshark.org/&quot; target=&quot;_blank&quot;&gt;wireshark &lt;/a&gt;to identify network traffic and if it is calling out.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/library/bb490947.aspx&quot; target=&quot;_blank&quot;&gt;netstat &lt;/a&gt;is a built in tool in windows to tell what connections and ports are open on the computer. common command is netstat -anob&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx&quot; target=&quot;_blank&quot;&gt;sysinternals &lt;/a&gt;suite has lots of tools like process monitors and what not to help identify what is going on on the computer.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.gmer.net/&quot; target=&quot;_blank&quot;&gt;Gmer &lt;/a&gt;can help detect hidden files and rootkits that may be hiding.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://remnux.org/&quot; target=&quot;_blank&quot;&gt;Remnux &lt;/a&gt;is a OS designed at analyzing the malware.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://digital-forensics.sans.org/community/downloads&quot; target=&quot;_blank&quot;&gt;SIFT &lt;/a&gt;is another suite by SANS to help analysis of malware.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.virtualbox.org/wiki/Downloads&quot; target=&quot;_blank&quot;&gt;virtual box &lt;/a&gt;is important for keeping malware isolated.&amp;nbsp; granted other VMs could work to as long as you can limit them to the host network and can&#39;t get out to compromise other machines.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ntcore.com/exsuite.php&quot; target=&quot;_blank&quot;&gt;CFF Explorer Suite&lt;/a&gt; is a tool to explore the PE file and DLLs. this will help you explore a exe file and what dlls that it is loading or has packaged with it.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/sysinternals/bb897441.aspx&quot; target=&quot;_blank&quot;&gt;Sigcheck &lt;/a&gt;helps you check and verify the signatures on files to see if a dll is signed by microsoft or vendor or if its unsigned and not legitimate file.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/attrib.mspx?mfr=true&quot; target=&quot;_blank&quot;&gt;attrib &lt;/a&gt;command is very useful for changing attributes via command line.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.rohitab.com/apimonitor&quot; target=&quot;_blank&quot;&gt;API Monitor&lt;/a&gt; is a way to track and monitor applications that track api calls.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div id=&quot;guides&quot;&gt;
Guides to starting in Infosec&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2015/08/college-not-required-guide-to-starting.html&quot; target=&quot;_blank&quot;&gt;College not required: A guide to starting in InfoSec&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://localtechrepair.blogspot.com/2015/09/penetration-test-information-gathering.html&quot; target=&quot;_blank&quot;&gt;Penetration Test Information Gathering&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;more to come &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
Thanks for reading, Local Tech Repair Admin  I will be adding a lot more to this article and also breaking more articles on more specific topics about Info Security and Offensive Security to help my self study and get my knowledge out there for others to learn more quickly from all my searching.  PS if you have good tools or what not that you think would go great on here let me know in comments and i will look at adding it to the site.&amp;nbsp;  &lt;br /&gt;
&lt;ul&gt;&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/1391055145908300518/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/1391055145908300518'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/1391055145908300518'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html' title='Information Security (InfoSec) Software, Books, and Resources'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-71397776410133385</id><published>2015-09-15T10:13:00.002-07:00</published><updated>2015-09-30T09:47:43.479-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Opinion"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Penetration Test Information Gathering</title><content type='html'>After taking many classes on Advanced penetration testings i find that many of these classes are very basic when it comes to their subjects.&amp;nbsp;So here are some resources to better round off your penetration testing in more depth than just the basics that most of these &quot;Advanced&quot; classes go through. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt; So we will be starting with information gathering/recon/competitive intelligence all these topics have the same type of concept and are all legal or very gray area to do. At this stage we are not in anyway attacking your target. This is where you will be spending majority of your time.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; A good standard to go off of is the pentest standards that can be found &lt;a href=&quot;http://www.pentest-standard.org/index.php/Intelligence_Gathering&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. The goal of information gathering is to learn everything you can about your target before starting any kind of attack at all.&lt;br /&gt;
&lt;br /&gt;
before we start gathering any information we will want to define our scope of what we are testing and looking at. at this we will want to check out what ip ranges we are looking at and what is actually in our scope. we want to be checking for things like content delivery networks, load balancers, IPSs, and really anything we can get our hands on. enumerating the domain to check for sub domains, pages, job descriptions, and employee comments will all help us get information on the network, technologies, versions, attack targets, etc.&lt;br /&gt;
&lt;br /&gt;
some tools are commonly used are google, bing (particularly ip:ipaddress),&amp;nbsp; dnstools.com, &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/passiverecon/&quot; target=&quot;_blank&quot;&gt;passiverecon&lt;/a&gt;, &lt;a href=&quot;https://github.com/jmbr/halberd&quot; target=&quot;_blank&quot;&gt;halberd&lt;/a&gt;, and more. Depending on what item your looking for you will have different tools for it.&amp;nbsp; Probably one of the largest tools for connections between information is the tool maltego. This will help gather and connect all the information your gathering together an build relationships between them.&amp;nbsp; The developers of Maltego have a list of 6 tutorials to get you going &lt;a href=&quot;https://www.youtube.com/playlist?list=PLC9DB3E7C258CD215&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&amp;nbsp; I would highly suggest learning maltego and learning it well especially if you have any Social engineering you have to do (hint you always do).&lt;br /&gt;
&lt;br /&gt;
Key thing is keeping a central location that your team or just you can put the information together. Dradis is a large corroborative&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
after gathering some targets and what not you can start mapping the actual systems you find that are in scope. things like nmap are commonly used. some key things is always exporting data so that it can be imported into your database system. the -oA appended to the end of your nmap scan will give you the 3 major formats to be imported into places like Metasploit  and other. This will help you with services and targets that you have known good vulnerabilities for and greatly speedup the vulnerability assessment. Some things to learn are the different type of stealth scans and advantages and disadvantages to each. some IDS systems will have signatures for nmap scans but most likely these are going to be lost in the ether specially done from the out side because nmap scans are so common its hard to tell its you vs others. But with that said its still good to know the things and a good article of learning about the art of port scanning is &lt;a href=&quot;https://nmap.org/nmap_doc.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. Another nice thing about nmap is that you can script out these scans. so you do it once and you can have them set up working for other engagements which can be found &lt;a href=&quot;https://nmap.org/book/nse.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&amp;nbsp; Another port scanner that is not nmap would be Metasploit. Metasploit has its own auxiliary modules for scanning. A list of the different scanners and modules in Metasploit can be found &lt;a href=&quot;https://www.offensive-security.com/metasploit-unleashed/auxiliary-module-reference/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. for example auxiliary/scanner/discovery/arp_sweep will allow you to do an arp sweep to discover computers.&lt;br /&gt;
&lt;br /&gt;
after discovery you move to threat modeling and determining what vulnerabilities may be on the services and hosts we discovered.&amp;nbsp; Since most of this probably passes from legal line to gray area only do this on services you own as you may bring down something during a scan.&amp;nbsp; some popular tools for this are &lt;a href=&quot;http://www.tenable.com/products/nessus-vulnerability-scanner&quot; target=&quot;_blank&quot;&gt;Nessus&lt;/a&gt;, &lt;a href=&quot;http://www.openvas.org/&quot; target=&quot;_blank&quot;&gt;openvas&lt;/a&gt;, &lt;a href=&quot;http://www.rapid7.com/products/nexpose/&quot; target=&quot;_blank&quot;&gt;Nexpose&lt;/a&gt;, &lt;a href=&quot;https://cirt.net/Nikto2&quot; target=&quot;_blank&quot;&gt;Nikto&lt;/a&gt;, and many more found &lt;a href=&quot;https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. &lt;br /&gt;
If your using nessus then I would highly suggest using it with in Metasploit so that you can easily import the results straight into the Metasploit Database and be able to quickly find vulnerabilities based off those scans that you can quickly test if they are actually vulnerable.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tools:&lt;br /&gt;
&lt;a href=&quot;http://bing.com/&quot;&gt;bing.com&lt;/a&gt; - ability to use ip: to check for shared hosting&lt;br /&gt;
&lt;a href=&quot;http://google.com/&quot;&gt;google.com&lt;/a&gt; - ability to use Google Dorks to check common problems&lt;br /&gt;
&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/passiverecon/&quot; target=&quot;_blank&quot;&gt;passiverecon&lt;/a&gt; - general recon plugin to speed up recon&lt;br /&gt;
&lt;a href=&quot;https://github.com/jmbr/halberd&quot; target=&quot;_blank&quot;&gt;halberd&lt;/a&gt; - detecting load balancing&lt;br /&gt;
&lt;a href=&quot;http://whois.dnstools.com/&quot; target=&quot;_blank&quot;&gt;dnstools&lt;/a&gt; - whois, ip ranges, detect shared hosting, etc. &lt;br /&gt;
&lt;a href=&quot;http://tracert.com/&quot; target=&quot;_blank&quot;&gt;tracert &lt;/a&gt; the ability to ping and traceroute from different contents and not from your ip&lt;br /&gt;
&lt;a href=&quot;https://github.com/sandrogauci/wafw00f&quot; target=&quot;_blank&quot;&gt;wafwoof&lt;/a&gt; - helps detect what application firewall&lt;br /&gt;
&lt;a href=&quot;https://nmap.org/book/man.html&quot; target=&quot;_blank&quot;&gt;nmap&lt;/a&gt; gold standard for network scanning &lt;br /&gt;
&lt;a href=&quot;https://www.rapid7.com/products/metasploit/index.jsp&quot; target=&quot;_blank&quot;&gt;metasploit &lt;/a&gt;- gold standard for exploit launching&lt;br /&gt;
&lt;a href=&quot;https://bitbucket.org/LaNMaSteR53/recon-ng&quot; target=&quot;_blank&quot;&gt;recon-ng&lt;/a&gt; -more information can be found &lt;a href=&quot;https://www.cybrary.it/video/information-gathering-part-4/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.tenable.com/products/nessus-vulnerability-scanner&quot; target=&quot;_blank&quot;&gt;Nessus&lt;/a&gt;, very common vulnerability scanner&lt;br /&gt;
&lt;a href=&quot;http://www.openvas.org/&quot; target=&quot;_blank&quot;&gt;openvas&lt;/a&gt;, - free open source vulnerability scanner you should be aware of&lt;br /&gt;
&lt;a href=&quot;http://www.rapid7.com/products/nexpose/&quot; target=&quot;_blank&quot;&gt;Nexpose&lt;/a&gt;, same creators of metasploit but for vulnerability scanning. &lt;br /&gt;
&lt;a href=&quot;https://cirt.net/Nikto2&quot; target=&quot;_blank&quot;&gt;Nikto&lt;/a&gt; - web vulnerability scanner. &lt;br /&gt;
&lt;br /&gt;
This is s a quick overview of information gathering that you will get in most of these &quot;Advanced&quot; classes. Though this is the basics that you will need to know to actually do your job as a pentester.&lt;br /&gt;
&lt;br /&gt;
Let me knwo what tricks/tips/ and tools you prefer for information gathering during a pentest.&lt;br /&gt;
&lt;br /&gt;
PS: search youtube for examples on how to use each an you will find loads of resources. </content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/71397776410133385/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/09/penetration-test-information-gathering.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/71397776410133385'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/71397776410133385'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/09/penetration-test-information-gathering.html' title='Penetration Test Information Gathering'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-5632652892019183382</id><published>2015-09-11T07:43:00.001-07:00</published><updated>2015-09-30T09:48:08.104-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Opinion"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Remedy 7.x, 8.x and possibly 9.x login password decoder</title><content type='html'>So recently I have been doing some QA for a BMC Remedy product that my work is starting to work with. One thing i noticed right away is that the cipher that they use is extremely bad and basically plain text.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt; So here is how it works. when you go to the login page for a remedy product when you sign in there is a javascript that encodes the password field to a ciphered text. BMC suggests always using HTTPS with their products to make sure its secure though it is disabled by default. You can find more on their Best Practice Security guidelines here. https://docs.bmc.com/docs/display/public/ars81/General+security+guidelines&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;Here is the javascript cipher that is used in their products.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;code&gt;&lt;br /&gt;
function getScrambledPassword(pwd) {&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; var cipher = [&#39;k&#39;, &#39;s&#39;, &#39;z&#39;, &#39;h&#39;, &#39;x&#39;, &#39;b&#39;, &#39;p&#39;, &#39;j&#39;, &#39;v&#39;, &#39;c&#39;, &#39;g&#39;, &#39;f&#39;, &#39;q&#39;, &#39;n&#39;, &#39;t&#39;, &#39;m&#39;];&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; var result=&quot;&quot;;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if (pwd == null)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pwd = &quot;&quot;;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; pwd = encodeURIComponent(pwd);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; //alert(&quot;encoded password: &quot; + pwd);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; for(var i=0;i&amp;lt;pwd.length;i++) {&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; var cc = pwd.charCodeAt(i);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result += cipher[Math.floor(cc/16)] + cipher[cc%16];&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; //alert(&quot;scrambled password: &quot; + result);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; return result;&lt;br /&gt;
}&lt;br /&gt;
&lt;/code&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;what this code does it takes the inputed password then does a urlencode and brakes it down into char codes and then passes that on to some math.&amp;nbsp; so for instance&lt;br /&gt;
input @&lt;br /&gt;
encodeuricomponent = %40&lt;br /&gt;
for each charactor in the encoded uri charactor we get 37 52 48&lt;br /&gt;
so for each the cipher is calculated and picked&lt;br /&gt;
for instance the first time it goes through it uses 37&lt;br /&gt;
so math.floor of 37/16 = 2&lt;br /&gt;
the 2nd item in the cipher is z&lt;br /&gt;
then it adds cipher 37 mod 16 = 5&lt;br /&gt;
cipher 5 = b&lt;br /&gt;
so from the first encoded uri charactor we get zb&lt;br /&gt;
and then it repeats for the next encoded uri charactor&lt;br /&gt;
this gives us the encoding&lt;br /&gt;
zbhxhk&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;so what this means for decoding is 2 things because the math rounds down we can&#39;t really get the key code that way but because they were doing a mod on this it gives us the remainder anyways.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;so here is an PoC python decoder for the Remedy cipher. &lt;br /&gt;
&lt;code&gt;&lt;/code&gt;&lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;code&gt;&lt;/code&gt;&lt;span style=&quot;font-family: &#39;Segoe UI&#39;;&quot;&gt;import os&lt;br /&gt;
import urllib&lt;br /&gt;
print &quot;Welcome to the BMC Remedy password decoder&quot;&lt;br /&gt;
password = raw_input(&#39;Enter Password hash: &#39;)&lt;br /&gt;
cipher = [&#39;k&#39;, &#39;s&#39;, &#39;z&#39;, &#39;h&#39;, &#39;x&#39;, &#39;b&#39;, &#39;p&#39;, &#39;j&#39;, &#39;v&#39;, &#39;c&#39;, &#39;g&#39;, &#39;f&#39;, &#39;q&#39;, &#39;n&#39;, &#39;t&#39;, &#39;m&#39;]&lt;br /&gt;
decryptedpass = &quot;&quot;&lt;br /&gt;
num = 0&lt;br /&gt;
while num &amp;lt; len(password):&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ciphernum = cipher.index(password[num])&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; encodednum = ciphernum * 16&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; num = num+1&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ciphernum = cipher.index(password[num])&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; encodednum += ciphernum&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; decryptedpass += chr(encodednum)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; num = num +1&lt;br /&gt;
print urllib.unquote(decryptedpass) &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;  &lt;/span&gt;&lt;br /&gt;
&lt;b&gt;What this means as an attack vector:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;With in many organizations their users are very used to continuing even if they get a https warning about certificate because people generally think the company is keeping them safe.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;If an attacker gets into a organization and then does a MiTM attack using a SSLstrip the attacker could in turn gather all of IT users credentials or even some. This would greatly increase the attackers speed of penetrating the organization.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;If you use remedy please request that the vendor fix this issue. This has been around for some time and has been posted in other going back years and still have not been fixed.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;for example&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;http://rewtdance.blogspot.com/2012/05/bmc-remedy-password-descrambling.html&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;http://myitpath.blogspot.com/2010/09/reversing-remedy-passwords.html&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;are 2 that popup on the first page &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;- Local Tech Repair Admin&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/5632652892019183382/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/09/remedy-7x-8x-and-possibly-9x-login.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5632652892019183382'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/5632652892019183382'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/09/remedy-7x-8x-and-possibly-9x-login.html' title='Remedy 7.x, 8.x and possibly 9.x login password decoder'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-7391678012504828790</id><published>2015-08-19T11:44:00.002-07:00</published><updated>2015-12-15T23:21:03.330-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Opinion"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>College not required: A guide to starting in InfoSec</title><content type='html'>So recently I had someone tell a
community member that you needed to go to school like everyone else and pay to
learn infosec. For some reason this bugged me because I really only see college
degree as a rubber stamp for HR I would like to tell you that is a lie and here is why. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;*Updated 12/15/15*&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;br /&gt;
&lt;/span&gt;College is very rarely needed for learning especially if you’re
self-motivated. Basically all college will do is open doors for some companies
that management think they must have it. This is the computer age and knowledge
is not learned in the class rooms with $100Ks in debt and loss of 4 years of
income.&lt;br /&gt;
&lt;br /&gt;
If you’re self-motivated and have a passion for learning start here!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;If you never done Linux before:&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.edx.org/course/introduction-linux-linuxfoundationx-lfs101x-2&quot;&gt;intro
to linux&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/course/comptia-linux-plus/&quot;&gt;linux+&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;If you never done pentesting before:&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/course/ethical-hacking/&quot;&gt;ethical hacking class&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/course/advanced-penetration-testing/&quot;&gt;advanced
penetration testing&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;networking overview:&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/course/comptia-network-plus/&quot;&gt;network+&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/course/cisco-ccna/&quot;&gt;ccna&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://nmap.org/book/man.html&quot;&gt;Nmap&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;https://en.wikipedia.org/wiki/Internet_protocol_suite&quot;&gt;TCP/IP&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://amzn.to/1DhLvJi&quot; target=&quot;_blank&quot;&gt;Silence on the Wire: A Field Guide to Passive Reconnaissance
and Indirect Attacks &lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Psychology:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://amzn.to/1SnTN9m&quot;&gt;The
Art of Deception: Controlling the Human Element of Security&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://amzn.to/1DhLLYI&quot;&gt;Social
Engineering: The Art of Human Hacking&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;b&gt;For programming topics to
get you a strong foundation.&lt;/b&gt;&lt;br /&gt;
java, python, php, powershell, bash, javascript, c,&amp;nbsp; and assembly&lt;br /&gt;
There are many websites out there to learn programming languages here are 2 links for assembly&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;https://www.youtube.com/playlist?list=PL9gza8iek1hIHSIii2RxJi5q9oFKYGa4t&quot;&gt;assembly
primer linux&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/playlist?list=PL9gza8iek1hKu56dQmMXTR4AcK70Yv0LI&quot;&gt;assembly
primer windows&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Regular Expression&lt;/b&gt;&lt;br /&gt;
This is a part of programming that is commonly used to help identify hard to detect data. so you can detect paterns in code. This is great when it comes to defensive side and writing rules based off regular expression.&lt;br /&gt;
&lt;a href=&quot;http://regex101.com/&quot;&gt;regex101.com&lt;/a&gt; helps explain what your regex does&lt;br /&gt;
&lt;a href=&quot;http://regexone.com/&quot;&gt;regexone.com&lt;/a&gt; well walk you through tutorials to learn it. &lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Kernel Review&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://opensecuritytraining.info/IntroX86.html&quot;&gt;Introduction Intel x86&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://opensecuritytraining.info/IntroX86-64.html&quot;&gt;Introduction Intel
x86-64&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://opensecuritytraining.info/IntroARM.html&quot;&gt;Introduction to ARM&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://tldp.org/LDP/lkmpg/2.6/html/&quot;&gt;Linux Kernel Level Programming&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Defensive and SOC training&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://opensecuritytraining.info/NetworkForensics.html&quot; target=&quot;_blank&quot;&gt;Intro to Network Forensics&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://opensecuritytraining.info/Pcap.html&quot; target=&quot;_blank&quot;&gt;Flow analysis and Network Hunting&lt;/a&gt; and videos can be found &lt;a href=&quot;https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kPylwy-nZc1DeXH838-hca&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://www.cybrary.it/course/malware-analysis/#&quot; target=&quot;_blank&quot;&gt;Intro to malware analysis and reverse engineering&lt;/a&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://opensecuritytraining.info/MalwareDynamicAnalysis.html&quot; target=&quot;_blank&quot;&gt;Dynamic Malware Analysis&lt;/a&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://amzn.to/1QLzcyg&quot; target=&quot;_blank&quot;&gt;Practical Malware Analysis&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://opensecuritytraining.info/ReverseEngineeringMalware.html&quot; target=&quot;_blank&quot;&gt;Reverse Engineering Malware&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://amzn.to/1T10Zd8&quot; target=&quot;_blank&quot;&gt;Blue Team Handbook&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
Malware analysis tools can be found &lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html#malware&quot; target=&quot;_blank&quot;&gt;here.&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Learning Exploit process and testing:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&quot;&gt;Vulnerable
web Service&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project&quot;&gt;Broken
Web Application&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://blog.cobaltstrike.com/2015/06/04/cobalt-strike-penetration-testing-labs-download/&quot;&gt;Setting
up a Penetration Testing Labs&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
For more additional resources for
labs check out&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://www.amanhardikar.com/mindmaps/Practice.html&quot;&gt;http://www.amanhardikar.com/mindmaps/Practice.html&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
Standards for penetration testing a
good resource for learning them are at the bellow link. &lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://www.pentest-standard.org/index.php/Main_Page&quot;&gt;http://www.pentest-standard.org/index.php/Main_Page&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://amzn.to/1O7hqBR&quot;&gt;Network
Security Assessment: Know Your Network&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
I would also take a deep look at
powershell and other advanced windows services.&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;a href=&quot;http://amzn.to/1O7gopE&quot;&gt;Windows
Internals (Developer Reference)&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: .0001pt; margin: 0in;&quot;&gt;
&lt;br /&gt;
The key is finding an area in infosec you like and become the expert for that
area.&lt;br /&gt;
&lt;br /&gt;
If you’re interested in more resources for learning, you can check out the bellow link
for resources of websites, books, mobile, tools and more.&lt;br /&gt;
&lt;a href=&quot;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html&quot; target=&quot;_blank&quot;&gt;http://localtechrepair.blogspot.com/2014/01/information-security-software-books-and.html&lt;/a&gt;﻿&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/7391678012504828790/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/08/college-not-required-guide-to-starting.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7391678012504828790'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/7391678012504828790'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/08/college-not-required-guide-to-starting.html' title='College not required: A guide to starting in InfoSec'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-8797183468396104998</id><published>2015-08-18T12:11:00.001-07:00</published><updated>2015-09-30T09:48:28.609-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Repair"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Nethunter 2 metasploit Database [*] postgresql selected, no connection.</title><content type='html'>Nethunter 2 getting posgresql working with metasploit. If your in metasploit and are checking the status of db_status and are getting error that [*] postgresql selected, no connection.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt;to resolve the issue you will want to set up the database for metasploit. Resolution steps are as follows. &lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;open nethunter android app&lt;/li&gt;
&lt;li&gt;start metasploit service&lt;/li&gt;
&lt;li&gt;launch kali shell in terminal&lt;/li&gt;
&lt;li&gt;service postgresql start&lt;/li&gt;
&lt;li&gt;cd /usr/share/metasploit-framework&lt;/li&gt;
&lt;li&gt;./msfdb init&lt;/li&gt;
&lt;li&gt;msfconsole&lt;/li&gt;
&lt;li&gt;db_status&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfwISoI3_IoUwWtjeM38Zasvrm4rp2vVJ5ccS6C97-_cOUYS4b-2JYs5ZMHGwkGXKobYfa1ggrh_42-fIIGAApZU6f0xyHZeF-zjTRfHr1v3KdrQzGdb5evIsMHBq1JUpsY6rXFTRfQJu/s1600/15+-+1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfwISoI3_IoUwWtjeM38Zasvrm4rp2vVJ5ccS6C97-_cOUYS4b-2JYs5ZMHGwkGXKobYfa1ggrh_42-fIIGAApZU6f0xyHZeF-zjTRfHr1v3KdrQzGdb5evIsMHBq1JUpsY6rXFTRfQJu/s400/15+-+1.png&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ67twFIt4-GYsrZENxAlIZhE9ZH5twpwcbFnNnOv9501ctmLg06TX7QHb9MQNfceqPS1m_gOnyU0ryFDPCrikgAizyPfiMAeO-NMc8xJvvnt3ELocIzgFuO3loWTN7Vp5nW4J0xVGP6U0/s1600/15+-+2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQ67twFIt4-GYsrZENxAlIZhE9ZH5twpwcbFnNnOv9501ctmLg06TX7QHb9MQNfceqPS1m_gOnyU0ryFDPCrikgAizyPfiMAeO-NMc8xJvvnt3ELocIzgFuO3loWTN7Vp5nW4J0xVGP6U0/s400/15+-+2.png&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
this should fix the issue and show as connected to msf now.&lt;br /&gt;
&lt;br /&gt;
Share if anyone is wondering how to get this fixed.&lt;br /&gt;
&lt;br /&gt;
- Local Tech Repair Admin</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/8797183468396104998/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/08/nethunter-2-metasploit-database.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/8797183468396104998'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/8797183468396104998'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/08/nethunter-2-metasploit-database.html' title='Nethunter 2 metasploit Database [*] postgresql selected, no connection.'/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfwISoI3_IoUwWtjeM38Zasvrm4rp2vVJ5ccS6C97-_cOUYS4b-2JYs5ZMHGwkGXKobYfa1ggrh_42-fIIGAApZU6f0xyHZeF-zjTRfHr1v3KdrQzGdb5evIsMHBq1JUpsY6rXFTRfQJu/s72-c/15+-+1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6697177630409920562.post-3157595506908870298</id><published>2015-07-28T09:39:00.000-07:00</published><updated>2015-09-30T09:48:48.804-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="uncategorized"/><title type='text'>Flagship Smartphone Specs 2015 - OnePlus 2, Galaxy S6 edge, HTC One M9, and Nexus 6 </title><content type='html'>I am not a big fan of comparing specs on things though I figured why not do one anywho.&amp;nbsp;  &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt; For those of you that do not know the OnePlus 2 just got announced last night and today we get to see the specs for the OnePlus 2. so since they claim to be a flagship killer which is kinda funny but non the less good phone.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;So here is the specifications compared to the flag ships out there.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;some of the flagship phones are galaxy s6 edge, HTC One M9, and Nexus 6.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;b&gt;Galaxy S6 Edge:&lt;/b&gt;&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;lets first look at the &lt;a href=&quot;http://amzn.to/1U47jBV&quot; target=&quot;_blank&quot;&gt;Galaxy s6 edge&lt;/a&gt; costs ~$730 &lt;/span&gt;&lt;span class=&quot;fullpost&quot;&gt;&lt;span class=&quot;a-list-item&quot;&gt;from &lt;a href=&quot;http://amzn.to/1Kvv4AY&quot; target=&quot;_blank&quot;&gt;Amazon.com&lt;/a&gt;&lt;/span&gt; for the unlocked international version with 64 GB hard drive.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
Specs:&lt;br /&gt;
&lt;ul class=&quot;a-vertical a-spacing-none&quot;&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; Display: 5.1 inches (~71.7% screen-to-body ratio) - 1440 x 2560 pixels (~577 ppi pixel density)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; CPU: Quad-core 1.5 GHz Cortex-A53 &amp;amp; Quad-core 2.1 GHz - Exynos 7420&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; OS: Android OS, v5.0.2 (Lollipop)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; Internal Memory: 64GB, 3 GB RAM&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; Camera: 16 MP, 2988 x 5312 pixels, optical image stabilization&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt;Battery: &lt;/span&gt;&lt;span class=&quot;a-list-item&quot;&gt;2600 mAh     &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;a-list-item&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://ecx.images-amazon.com/images/I/61sJAmfX9cL._SL1500_.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://ecx.images-amazon.com/images/I/61sJAmfX9cL._SL1500_.jpg&quot; height=&quot;320&quot; width=&quot;169&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;HTC One M9:&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;The HTC brand has gotten some heavy following around the one line. I have not tried out the newer one series I had the older one xl series a before the revamped the one line.&amp;nbsp; This phone comes in at ~$720 from &lt;a href=&quot;http://amzn.to/1IGBWLN&quot; target=&quot;_blank&quot;&gt;Amazon.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;Specs:&lt;/span&gt;&lt;br /&gt;
&lt;ul class=&quot;a-vertical a-spacing-none&quot;&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; 5.0-inch LCD, HD 1080 x 1920, Super LCD3 capacitive touchscreen with Capacitive Multi touch panel 441PPI&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; Rear Camera: 20.7 Mega-Pixel,  Automatic simultaneous video and image recording, geo-tagging,  face/smile detection, HDR, panorama&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; Qualcomm MSM8994 Snapdragon 810 Quad-core 1.5 GHz Cortex-A53 &amp;amp; Quad-core 2 GHz Cortex-A57&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt; MicroSD card slot (up to 128 GB)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt;&lt;span class=&quot;a-list-item&quot;&gt;Internal Memory: 64GB, 3GB RAM&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt;&lt;span class=&quot;a-list-item&quot;&gt;Battery: &lt;/span&gt;&lt;/span&gt;2840 mAh &lt;/li&gt;
&lt;/ul&gt;
&lt;span class=&quot;a-list-item&quot;&gt;&lt;span class=&quot;a-list-item&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://ecx.images-amazon.com/images/I/61e0JpnK1hL._SL1000_.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://ecx.images-amazon.com/images/I/61e0JpnK1hL._SL1000_.jpg&quot; height=&quot;320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Nexus 6:&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;The nexus line is known for its simplistic just basic android experience. This gives it a lot of compatability with other OSs like Cyangenmod which is a huge. This phone will cost you ~$550 from &lt;a href=&quot;http://amzn.to/1SL7j78&quot; target=&quot;_blank&quot;&gt;amazon.com&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;Specs:&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Display: 5.96” 2560x1440 QHD AMOLED display (493&amp;nbsp;ppi)&lt;/li&gt;
&lt;li&gt;&amp;nbsp;Battery: 3220 mAh&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-size-base a-color-secondary&quot;&gt;Processor: 2.7GHz Qualcomm Snapdragon 805 with quad-core CPU (APQ 8084-AB), Adreno 420 GPU&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-size-base a-color-secondary&quot;&gt;&amp;nbsp;Internal Memory: 64GB, 3GB RAM&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;a-size-base a-color-secondary&quot;&gt;Camera: 13MP IMX 214 Image Sensor&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://ecx.images-amazon.com/images/I/81qKt8MSikL._SL1500_.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://ecx.images-amazon.com/images/I/81qKt8MSikL._SL1500_.jpg&quot; height=&quot;320&quot; width=&quot;202&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class=&quot;a-list-item&quot;&gt;&lt;b&gt;OnePlus 2:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;OnePlus is a newish chines company that made a hit phone with the oneplus one phone. which I personally use and like. It is not a perfect phone but for the price point it was the best out there. OnePlus may want you to think that it is a flagship killer but in reality its a midrange phone. The one plus 2 also hits the same price point. The OnePlus 2 will cost you around ~$330 if you can get your hands on a invite.&amp;nbsp; &lt;a href=&quot;https://oneplus.net/2/&quot; target=&quot;_blank&quot;&gt;https://oneplus.net/2/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;Specs:&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;a-list-item&quot;&gt;Display: 5.5&quot; &lt;/span&gt;1080p Full HD (1920 x 1080 pixels), 401 PPI&lt;/li&gt;
&lt;li&gt;CPU:64-bit Qualcomm© Snapdragon™ 810 processor with 1.8GHz Octa-core CPUs&lt;/li&gt;
&lt;li&gt;GPU: Adreno™ 430&lt;/li&gt;
&lt;li&gt;Internal Storage: 64GB, 4 GB RAM LPDDR4&lt;/li&gt;
&lt;li&gt;Camera: 13 Megapixel (1.3um), Front: 5 Megapixel&lt;/li&gt;
&lt;/ul&gt;
though what may be different than almost every other phone on the market is they are upping the phone port to the USB C type of port. this will give the phone faster data transfer rates and more power for charging.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://content.oneplus.net/skin/frontend/oneplus2015/default/images/feature/two/impress-img.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://content.oneplus.net/skin/frontend/oneplus2015/default/images/feature/two/impress-img.png&quot; height=&quot;314&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
so all in all what do you think? will the OnePlus be able to compete with the big leage like they did with the OnePlus One?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;a-list-item&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;float: right; height: 250px; padding-bottom: 5px; padding-left: 10px; padding-right: 10px; padding-top: 5px; position: relative; width: 300px;&quot;&gt;
&lt;script async=&quot;&quot; src=&quot;http://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js&quot;&gt;&lt;/script&gt;&lt;span class=&quot;fullpost&quot;&gt; &lt;/span&gt; &lt;span class=&quot;fullpost&quot;&gt;&lt;ins class=&quot;adsbygoogle&quot; data-ad-client=&quot;ca-pub-6820545514881433&quot; data-ad-slot=&quot;2718283960&quot; style=&quot;display: inline-block; height: 250px; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;script&gt;
(adsbygoogle = window.adsbygoogle || []).push({});
&lt;/script&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://localtechrepair.blogspot.com/feeds/3157595506908870298/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://localtechrepair.blogspot.com/2015/07/flagship-smartphone-specs-oneplus-2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/3157595506908870298'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6697177630409920562/posts/default/3157595506908870298'/><link rel='alternate' type='text/html' href='http://localtechrepair.blogspot.com/2015/07/flagship-smartphone-specs-oneplus-2.html' title='Flagship Smartphone Specs 2015 - OnePlus 2, Galaxy S6 edge, HTC One M9, and Nexus 6 '/><author><name>Josh Millikan</name><uri>http://www.blogger.com/profile/08745152958327835484</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>