๐Ÿ‘จโ€๐Ÿซ
Mosse CyberSec Institute.
  • Preface
  • ๐Ÿ‘ฉโ€๐Ÿ’ปInternet Searching
    • Using Elicit, search through Academic Papers
    • Use Google To Identify Open FTP Servers That Hold Confidential Materials Available For Download
    • Use Bing To Find Cybersecurity Feeds In A Specific Language
    • Use Google's Cache Capability to Retrieve Deleted Web Pages
    • Use Web Archives to View Old Versions of Websites.
    • Use Advangle To Generate Complex Google Search Queries
  • ๐ŸงTechnical Concepts
    • Research The Top Penetration Testing Tools
    • Research The Cyber Kill Chain Model And The MITRE Matrix
      • Lockheed Martin Kill Chain
      • MITRE ATT&CK MATRIX
    • Research The Major Types Of Enterprise Security Software
    • Research The Most Common Network Protocols
  • ๐Ÿ•ต๏ธPassive Network Reconnaissance
    • Use Dnsdumpster.com To Passively Map An Organization's External Facing Assets
    • Use Shodan.io To Passively Map An Organization's External Facing Assets
    • Use Crt.Sh To Identify Domains And Sub-Domains That Belong To An Organization
    • Search For Information Leaks On Github Using Grep.App
  • ๐ŸงจDiscovering Attack Campaigns
    • Detect Typo Squatting And Phishing With Dnstwist.it
    • Use Urlscan.Io To Identify Phishing And Spear-Phishing Websites
  • ๐Ÿ”Security Tools
    • Use sslscan To Assess The SSL Configuration Settings Of HTTPS Websites
    • NMAP SCANS
    • Brute Force Web Directories And Files Using DIRB/WFUZZ
  • Penetration Testing with Tools
  • Digital Investigations
  • Malware Development
Powered by GitBook
On this page

๐Ÿ”Security Tools

Security tools are essential in cybersecurity, protecting networks, devices, and data from various threats.

Use sslscan To Assess The SSL Configuration Settings Of HTTPS WebsitesNMAP SCANSBrute Force Web Directories And Files Using DIRB/WFUZZ
PreviousUse Urlscan.Io To Identify Phishing And Spear-Phishing WebsitesNextUse sslscan To Assess The SSL Configuration Settings Of HTTPS Websites

Last updated 2 years ago