Skip to content

Latest commit

 

History

History
44 lines (25 loc) · 887 Bytes

File metadata and controls

44 lines (25 loc) · 887 Bytes

Title: Cyber Security

Description: A path to become a cyber security.

Links

Basic:

  • Linux Basics
  • Networking Basics
  • Web application basic
  • Cryptography basics

Intermediate:

Linux

  • Privilege Escalation vulnerabilities

Networking

  • Server based vulnerabilities
  • Framework based vulnerabilities

Web Application

  • OWASP Top 10 applicaion
  • Oauth vulnerabilities

Advanced:

  • Popular CVE's
  • Mobile Application Vulnerabilities

Practice

Capture the Flag (CTF) in computer security is an exercise in which "flags" are secretly hidden in purposefully-vulnerable programs or websites. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges). You can find the list of websites to practice CTF in Resources section.