πŸ•ΈοΈ
Th4ntis CyberSec
  • πŸ•·οΈ>whoami_
  • πŸ–₯️General Info
    • CyberSec News
    • Getting Started and other Resources
      • CompTIA Certs
        • Security+
        • Pentest+
    • MITRE ATT&CK
    • Cyber Kill Chain
    • Docker
  • πŸ’»Networking
    • General Networking
    • Common Ports and Protocols
    • TCP/IP Model
    • OSI Model
    • Subnetting
    • Wireshark
    • NMap
    • Wireless
      • Wardriving/WiFi Sniffing
    • 3-Way Handshake
  • 🐧Linux
    • Common commands
    • Sudo
    • Files and File contents
    • Sed Awk and Grep
    • Permissions
  • πŸͺŸWindows
    • Event Codes
    • Powershell
    • Internals
    • Active Directory
  • πŸ”ŽOSINT
    • OSINT Tools
    • IP/Domain OSINT
    • Email/Username OSINT
    • URL OSINT and Sandboxing
    • Social Media OSINT
    • Website OSINT
    • Password OSINT
    • Physical Location OSINT
    • Image OSINT
    • People OSINT
    • Phone Number OSINT
    • Shodan
    • Google Dorking
  • πŸ› οΈTools
    • Brute Force
      • Hydra
    • Credential Dumping
      • Mimikatz
    • Enumeration
      • Bloodhound
      • Certipy
      • Dirb/Dirbuster
      • Enum4Linux
      • GoBuster
    • Exploitation Framework
      • Metasploit
      • Sliver
      • Cobalt Strike
    • Hash Cracking
      • Hashcat
      • JohnTheRipper
    • Methods
      • Powershell Obfuscation
      • Privilege Escalation
      • Pass-The-Hash
      • Kerberos and Kerberoasting
    • Vulnerability Scanners
      • Nessus
      • OpenVAS
    • Web App
      • BurpSuite
      • OWASP Zap
    • Wireless
      • Aircrack-ng
      • Kismet
      • Bettercap
      • HCXDumptool
      • Wifite
    • Impacket
    • Social-Engineer Toolkit (SET)
  • πŸ“”Guides and How-To's
    • Lab Setup
      • Ubuntu VM
      • Kali VM
      • Windows User VM
      • Windows Server VM
    • Wardriving
      • Pwnagotchi
    • Wireless Pentesting
      • WiFi Pineapple Basics
      • Evil-Twin Attack
    • Over The Wire
      • Bandit
      • Natas
      • Leviathan
      • Krypton
      • Narnia
      • Behemoth
      • Utumno
      • Maze
      • Vortex
      • Manpage
    • Docker and Kali Linux
    • Staying Private and goin Dark Online
  • πŸ“•Quick References
    • Tools
      • Tmux
      • NMap
      • Ffuf
      • NetExec
      • CrackMapExec
      • Proxychains
      • OneDriveUser Enum
      • Hashcat
      • Mimikatz
    • One-liners
    • Reverse Shells
    • Post Exploitation
    • Enumeration
      • Google
      • Sublist3r
      • NMap
      • DNSDumpster
    • Hashcracking
    • Wireless
  • πŸ““Courses
    • PNPT
      • Practical Ethical Hacking
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • OSINT Fundamentals
      • External Pentest Playbook
  • ☁️TryHackMe
    • Attacking Kerberos
    • Hacking with Powershell
    • Powershell for Pentesters
    • Linux PrivEsc
    • Windows PrivEsc
    • Blue
    • Kenobi
  • πŸ“¦HackTheBox
    • Starting Point
      • Tier 0
        • Meow
        • Fawn
        • Dancing
        • Redeemer
        • Explosion
        • Preignition
        • Mongod
        • Synced
      • Tier 1
        • Appointment
        • Sequel
        • Crocodile
        • Responder
        • Three
        • Ignition
        • Bike
        • Funnel
        • Pennyworth
        • Tactics
      • Tier 2
        • Archetype
        • Oopsie
        • Vaccine
        • Unified
        • Included
        • Markup
        • Base
    • Walkthroughs
      • Lame
      • Analytics
      • Manager
      • Codify
Powered by GitBook
On this page
  • TryHackMe
  • HackTheBox
  • TCM Academy
  • Lets Defend
  • CTFs
  • Learning Resources
  • Attacking/Defending Cloud
  • Hands-On
  • People(Videos and channels)
  • Videos/Courses
  • Keeping Up with Cyber/Info Sec
  • Additional
Edit on GitHub
  1. General Info

Getting Started and other Resources

TryHackMe

A great place to start is TryHackMe. I can't recommend it enough. It's a resource that has a lot of free rooms and paths, as well as CTF's(Capture The Flag) for hands on learning. If you want to upgrade is very affordable and unlocks a lot more. First is the Complete Beginner path. This will cover how to get started using TryHackMe, their VPN or in browser machine.

There is a good path called Pre Security. This will go over intros to Offensive and Defensive Security, various Careers within CyberSec, and more. Overall TryHackMe if a great place to start as it is hands on. It allows you to use your own VirtualMachine (VM) or if you don't have that ability or don't know how to yet, you can use their in browser machine to do everything from.

If you would like to know more on setting up VMs, I have guides here.

My recommendations for beginner TryHackMe modules are:

  • Intro to CyberSecurity

  • Network Fundamentals

  • Windows Fundamentals

  • Linux Fundamentals

  • How The Web Works

  • Nmap

HackTheBox

HackTheBox is a great hands-on learning place to go after you feel comfortable with what you have learned from TryHackMe. Though this is geared more toward Offensive security, they do have a smaller handful of Defensive Security. It is free, but they also offer paid versions to get more access. They have more CTFs but also offer their learning platform HackTheBox Academy.

Similar to TryHackMe you can run it in your own VirtualMachine(VM) or they offer an in browser machine to use as well. A great place to start here is Starting Point, as it covers the basics and getting started. Then after that they have Tracks, such as the Beginner Track, that is for easy machines. They also offer Official Write-ups of the machines if you need help or get stuck, as well as their forums and a discord channel.

TCM Academy

TCM Academy is a great place as well as the options are affordable for their courses and they offer some hands-on training to get their industry recognized certifications. Offering Live-Trainings and a great community discord.

Lets Defend

Lets Defend is more for the hands-on learning Defensive side of things. They offer free plan as well as paid ones to get more access. A list of their trainings can be found here as well as their own CTFs here. I haven't used much of this myself BUT I have heard great things and it's been recommended a lot.

CTFs

There are plenty of CTFs out there but some range from beginner to advanced. These are very nice and helpful for hands on as well as learning. When it comes to a CTF the objective is to of course, Capture The Flag, but it's more important to make sure you learn. Understand the tactics and techniques you're using and learning. Other than just TryHackMe or HackTheBox here's some additional CTFs to get started with as well:

  • Over The Wire

  • PicoCTF

  • RootMe

Learning Resources

There are a lot of learning resources out there and some are free, some paid, some subscription based. Here are some I know of, use some I use, and others that that are helpful overall.

Attacking/Defending Cloud

  • CloudBreach (AWS and Azure)

  • AlteredSecurity (Azure)

  • Attacking and Defending Azure

  • TryHackMe Attacking and Defending AWS

  • Pwnedlabs

  • Pluralsight

    • Pentesting Skills

    • CyberSec Skill Paths

  • Beau Bullock's Breaching the cloud

    • On Antisyphon

  • HackTricks Cloud

    • AWS Pentesting

    • Azure Pentesting

    • Digital Ocean Pentesting

Hands-On

  • TryHackMe <-- CTF and Courses

  • HackTheBox <-- CTF and Courses

  • Offensive Security

  • Cybrary - Online learning courses

  • VulnHub - Download Vulnerable VMs to run and attack

  • PentesterLab <-- Downloads VMs to attack

  • VulnHub <-- Downloads VMs to attack

  • EchoCTF

  • LetsDefend

  • Over The Wire <-- CTF

  • PicoCTF <-- CTF

  • RootMe <-- CTF

People(Videos and channels)

  • John Hammond

  • The Cyber Mentor

  • InfoSecEDU

  • Hackersploit

  • IppSec

  • Joe Helle

  • NahamSec

  • Hak5

  • Sans Institute

  • DefCON

  • DC CyberSec

  • Network Chuck

  • David Bombal

Videos/Courses

  • TCM Security Academy

  • Udemy

  • Coursera

  • HackingThe.Cloud - It’s not quite a course, but has a ton of educational content on cloud pentesting. Leans more toward AWS.

Keeping Up with Cyber/Info Sec

There's multiple ways to do this, I have my recommendations over in the CyberSec News section of this.

Additional

Additional resources thanks to: 7h3h4ckv157 and danielmakelley. Twitter list here

Last updated 1 year ago

πŸ–₯️