Learn Tech by Hacking Things - it’s easier than you think.
In today’s video I’m going to share a personal story and how that relates to the Missouri governor's definition of hacking, as well as web application penetration testing, bug bounty, and how no matter what role you are in I.T. you can benefit from learning scripting languages and a great way of doing that is through learning from other people and the repositories that they share on GitHub.
To be clear I am by no means condoning or advocating for malicious hacking in any way. The information shared in this video was left as vague as possible to please the YouTube overlords, but I will share some links below that can be helpful towards your ethical journey into cybersecurity.
Here are links to resources mentioned in this video:
The Missouri Governor story: https://www.theverge.com/2021/12/31/22861188/missouri-governor-mike-parson-hack-website-source-code
The TCM Security website: https://www.tcm-sec.com
To learn more about what websites are built with: https://builtwith.com/
OWASP Top 10: https://owasp.org/Top10/
OWASP Top 10 Injection: https://owasp.org/Top10/A03_2021-Injection/
OWASP explained from Heath Adams and Hacker 1: https://www.youtube.com/watch?v=AO_sqXb-gKE
Learn OWASP through the Practical Ethical Hacking course on TCM Academy here: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course?affcode=770707_bgmi9el_ (this is an affiliate link)
SQL Injection examples & explanations with PortSwigger: https://portswigger.net/web-security/sql-injection
SQL Injection
s with OWASP: https://owasp.org/www-community/attacks/SQL_Injection#:~:text=SQL%20injection%20attacks%20allow%20attackers,administrators%20of%20the%20database%20server.
The following resources are great if you’re interested in Bug Bounty.
A great resource to learn more about Bug Bounty and just an overall really amazing person would be STÖK on YouTube: https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg
The next two websites will help you discover websites out on the internet where you can potentially find vulnerabilities and get paid for finding them. If this is something you are interested in please take the time to read into it and be sure to understand the rules/regulations/laws that you need to abide by.
Hacker One: https://www.hackerone.com/
Bug Crowd: https://www.bugcrowd.com/
GitHub, Repositories, & other resources: https://github.com/
0xBEN has amazing tutorials for beginners on PowerShell: https://benheater.com/
Graham Helton is another great creator to check out: https://github.com/grahamhelton
Bash Repo: https://github.com/awesome-lists/awesome-bash
Go Repo: https://github.com/avelino/awesome-go
Python Repo: https://github.com/vinta/awesome-python
Видео Learn Tech by Hacking Things - it’s easier than you think. канала I.T. Career Questions
To be clear I am by no means condoning or advocating for malicious hacking in any way. The information shared in this video was left as vague as possible to please the YouTube overlords, but I will share some links below that can be helpful towards your ethical journey into cybersecurity.
Here are links to resources mentioned in this video:
The Missouri Governor story: https://www.theverge.com/2021/12/31/22861188/missouri-governor-mike-parson-hack-website-source-code
The TCM Security website: https://www.tcm-sec.com
To learn more about what websites are built with: https://builtwith.com/
OWASP Top 10: https://owasp.org/Top10/
OWASP Top 10 Injection: https://owasp.org/Top10/A03_2021-Injection/
OWASP explained from Heath Adams and Hacker 1: https://www.youtube.com/watch?v=AO_sqXb-gKE
Learn OWASP through the Practical Ethical Hacking course on TCM Academy here: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course?affcode=770707_bgmi9el_ (this is an affiliate link)
SQL Injection examples & explanations with PortSwigger: https://portswigger.net/web-security/sql-injection
SQL Injection
s with OWASP: https://owasp.org/www-community/attacks/SQL_Injection#:~:text=SQL%20injection%20attacks%20allow%20attackers,administrators%20of%20the%20database%20server.
The following resources are great if you’re interested in Bug Bounty.
A great resource to learn more about Bug Bounty and just an overall really amazing person would be STÖK on YouTube: https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg
The next two websites will help you discover websites out on the internet where you can potentially find vulnerabilities and get paid for finding them. If this is something you are interested in please take the time to read into it and be sure to understand the rules/regulations/laws that you need to abide by.
Hacker One: https://www.hackerone.com/
Bug Crowd: https://www.bugcrowd.com/
GitHub, Repositories, & other resources: https://github.com/
0xBEN has amazing tutorials for beginners on PowerShell: https://benheater.com/
Graham Helton is another great creator to check out: https://github.com/grahamhelton
Bash Repo: https://github.com/awesome-lists/awesome-bash
Go Repo: https://github.com/avelino/awesome-go
Python Repo: https://github.com/vinta/awesome-python
Видео Learn Tech by Hacking Things - it’s easier than you think. канала I.T. Career Questions
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
BEST BEGINNER NETWORKING CERTIFICATION 20222022 Cybersecurity roadmap: How to get started?Basic Skills for Entry Level I.T. Jobs - Command Prompt Part 1HakByte: How to find anything on the internet with Google DorksWhat is a HomeLab? How can you build your own and why it's useful!How to use TryHackMe for beginners, Start learning Ethical HackingWhere Do You Start in I.T.? Discover Your Roadmap to Information TechnologyFind Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]The Best Guide to Entry Level Cyber Security Jobs - The Roadmap to InfoSecRussian GPS targeted by volunteer hackers | cybernews.comSTAND OUT & LAND YOUR DREAM I.T. JOB IN 2022!watch how Hackers Remotely Control Any phone?! protect your phone from hackers now!Can Wireshark Spot Hidden Cameras For Free?What You Should Learn Before Cyber Security | Skills You NeedHow to Teach Yourself I.T. - Self Taught Information TechnologyBug Bounty 2022 Guide: Where to focus // How to make money // How to get started todaySearch for Someone's Leaked Email Passwords Online [Advanced OSINT]How Do You Start Your Career in Cyber Security in 2018 - Careers in CybersecurityDDoS Attack Size Breaks Historical Records - ThreatWire