Tuesday, August 14, 2018

Using Stay Interviews for Engagement by Dr. Beverly Kaye


So around this engagement and retention issue, let me ask you all a question. 
When is it that a manager says, "What can I do to keep you?" 

When it is, you all said it probably or thought it, it's at the exit interview. 
It's the time that most managers, most leaders say, "Ahh, I don't want to lose this person. 

What can I do to keep them?" And at the exit interview, it's usually too late.
 
So, what we're suggesting is instead of an exit interview, you consider a stay interview. And a stay interview merely asks the question, "Hey, you're really important to me. I don't want to lose your talent. I want you to stay on this team, and I need to know what can I do to keep you?" 
It's that question that has such great quality to it and will draw out from your employee what's important to them. 

Now, why do you think it is that most managers don't ask the question, "What can I do to keep you?" 

They don't ask it because they're afraid of what their employee might say, and they're afraid they will not be able to deliver on what that employee wants.
 
Let's say I ask an employee, and I look deeply into her eyes, and I say, "I really want to keep you on my team. Your talent is important to me. What can I do to keep you?" 
What if she says, "Twenty percent more," or "That other job," or "A move to that other department," and I can't deliver it. 
Haven't I then opened a Pandora's box?
 
What we say is ask it anyway and tell the truth if you can't deliver. So, if the request is for more money and right now salaries are frozen, you have to say that. 
You have to ask, "What else?" 
And I promise you, if you ask three what else questions, you will get four to six things that is within your control. 
I know that because that's what our research showed us that what a person wants often is more within the manager's control than one might think.
Now, there are lots of different stay interview questions, lots of different ways of asking it. 
You can ask it any way that is comfortable for you. You can say, "What's important to you in your job?" "What's most important?" "What can I do to help?" You can ask, "Hey, what makes you want to jump out of bed in the morning, and what makes you want to press the snooze button?" "What would you most miss if you won the lottery and left your job?" Or maybe even, "Think of a job you had in the past. What about that job did you really love and do you miss now?" Or maybe, "If you had a magic wand and you could change any aspect of your job that will build your engagement and build your commitment, what would it be?"
 
It's any question that really pulls from the employee some statements about what it is they need and want. 
And it's a conversation where you as a manager have to be locked in to what they're saying. 
And you have to come from real curiosity. "Tell me more." "What would that look like?" 
And then, while the buck does stop with you, it's about you and your employee talking about how that employee might get more of what they want. 
And that, my friends, is all there is to a stay interview. 
Try it.

Monday, August 13, 2018

HTML Basics

Wednesday, August 8, 2018

The Absurdity of Religions - funny

Once I saw this guy on a bridge about to jump. I said, "Don't do it!" He said, "Nobody loves me." I said, "God loves you. Do you believe in God?"

He said, "Yes." I said, "Are you a Christian or a Jew?" He said, "A Christian." I said, "Me, too! Protestant or Catholic?" He said, "Protestant." I said, "Me, too! What franchise?" He said, "Baptist." I said, "Me, too! Northern Baptist or Southern Baptist?" He said, "Northern Baptist." I said, "Me, too! Northern Conservative Baptist or Northern Liberal Baptist?"

He said, "Northern Conservative Baptist." I said, "Me, too! Northern Conservative Baptist Great Lakes Region, or Northern Conservative Baptist Eastern Region?" He said, "Northern Conservative Baptist Great Lakes Region." I said, "Me, too!"

"Northern Conservative Baptist Great Lakes Region Council of 1879, or Northern Conservative Baptist Great Lakes Region Council of 1912?" He said, "Northern Conservative Baptist Great Lakes Region Council of 1912." I said, "Die, heretic!" And I pushed him over.

-Emo Phillips

Favorite life quotes...

I'm willing to admit that I may not always be right, but I am never wrong.

Live as if you were to die tomorrow. Learn as if you were to live forever.

Live each day as if it were your last... Because one day it will be.

The biggest difference between time and space is that you can't reuse time.

Vacation: When you spend thousands of dollars to see what rain looks like in different parts of the world.

When you finally go back to your old hometown, you find it wasn't the old home you missed but your childhood.

"Success is the ability to go from one failure to another with no loss of enthusiasm."

"Even a mistake may turn out to be the one thing necessary to a worthwhile achievement."

"I have not failed. I've just found 10,000 ways that won't work."

"Failure is simply the opportunity to begin again, this time more intelligently."

"Kids, you tried your best, and you failed miserably. The lesson is: never try." (Homer Simpson)

"Communication without words is much more valuable than words without communication."

"Vision is not seeing things as they are, but as they will be."

"Wise men talk because they have something to say; fools, because they have to say something."
(Plato)

"The secret of being a bore is to tell everything." (Voltaire)

"... when you have eliminated the impossible, whatever remains, however improbable, must be the
truth." (Sir Arthur Conan Doyle)

"Loving somebody only matters to you. It's what you do to the people you love, that's what matters."

"I've never been married, but I tell people I'm divorced, so they won't think something's wrong with
me." (Unknown)

"A woman marries a man expecting he will change, but he doesn't.

A man marries a woman expecting that she won't change, and she does." (Unknown)

"When a man is single, he's incomplete. When he's married, he's finished." (Unknown)

"Marriage is give and take. You'd better give it to her, or she'll take it anyway." (Joey Adams)

"Love is a fire. But whether it is going to warm your heart or burn down your house, you can never
tell."

"I haven't reported my missing credit card to the police because whoever stole it is spending less than
my wife."

"You laugh at me because I'm different, but I laugh at you because you're all the same."

"A key to resolving any conflict is to identify a common goal."

"Experience is the name everyone gives to their mistakes."

"Good judgment comes from experience, and experience comes from bad judgment."

"Intelligence appears to be the thing that enables a man to get along without education. Education
enables a man to get along without the use of his intelligence." (Albert Edward Wiggam)

"I have the simplest of tastes. I am always satisfied with the best." (Oscar Wilde)

"To be content with little is hard; to be content with much, impossible."

"Find out what you like doing best and get someone to pay you for doing it."

"Nothing is more admirable than the fortitude with which millionaires tolerate the disadvantages of
their wealth."

"Religion is what keeps the poor from murdering the rich."

"If you are not criticized, you may not be doing much."

"To avoid criticism do nothing, say nothing, be nothing."

"Nothing is particularly hard if you divide it into small jobs." (Henry Ford)

Success will not lower its standard to us. We must raise our standard to success.

As one person I cannot change the world, but I can change the world of one person.

The tragedy in life doesn't lie in not reaching your goal. The tragedy lies in having no goal to reach.

Sunday, August 5, 2018

Social Engineering Techniques

The psychology of Social Engineering
 Elicitation (teasing information out of somebody)
 Framing (politicians are very good at this: they are asked a question, but they respond to it by building a frame about something else, completely ignoring the question).
 Pretexting (pretext - password reset over the phone, in a hurry, because of a report that the boss needs)
 Cold Calling
We find SE in any aspect of our lives, and not just hackers or professionals.
Bypassing physical security:
 technology cannot solve the problem
 post exploitation
 binary evasion
Social Engineering Tools:
 CEWL , CUPP, CREEPY, DRADIS, GOOGLE
 KALI LINUX, MALTEGO, RECON-NG FRAMEWORK, SCYTHE FRAMEWORK, SHODAN, SOCIAL ENGINEERING TOOLKIT (SET)
What you will learn?
 Various social engineering techniques and tools
 Proven ways to communicate
 Experience will reinforce methodology
 Let's do some labs!
What is social engineering?
The art of getting information from people, having them carry out activities, disclosing sensitive information and more, all through manipulation!
A psychological means to a technical end...
 the fundamental problem is the human problem
 understanding assumed/presumed culture, heritage and upbringing is key
The Social Engineer
In this lesson, Subject Matter Expert Dean Pompilio defines the Social Engineer as someone who influences people to take actions that may not be in their best interest.
You will learn that intrusion by a Social Engineer relies on:
 psychological manipulation
 facial expression
 body language
 misdirection
 emotional highjacking
The SME discusses why SE is performed and describes SE attacks: how and where attacks are used, who does them, how people respond, and how they result in 100 percent success in physical breaches. You will learn about categories of Social Engineers, who the “natural” Social Engineers are, and what a Social Engineer’s goals are (detailed below).
Categories of Social Engineers
 average citizens
 governments
 recruiters
 posers and scam artists
 disgruntled employees
 identity thieves
 spies
 penetration testers
 hackers
“Natural” Social Engineers
 children
 job seekers
 bar patrons
 sales and marketing personnel
 interrogators
 polygraphists
Goals of a Social Engineer
 entertainment
 ego gratification
 entrance into or enhanced status within a social group
 knowledge
 power
 social cause
 money
Social Engineering Attacks:
 Used in a high percentage of attacks by hackers, hacktivist, and nation states
 most people that are asked will provide the spelling of their names and their email addresses without confirming the identity of the person asking the questions
 many people will give out social security numbers, birth dates or employee numbers
 100% success ratio in physical breaches
Why is Social Engineering performed?
 software vulnerability discovery and exploitation is non-trivial
 defense is many-to-many
 offense is one-to-many
 a path of least resistance
 Why not?
Exploitation Life-Cycle
In this lesson, Subject Matter Expert Dean Pompilio discusses how the exploitation life-cycle is used to carry out the goals of hacking.
The SME presents the five phases of the exploitation lifecycle:
 reconnaissance (digital information gathering, network lookups, traceroutes, social engineering)
 scanning (port scanning, OS identification, social engineering?)
 gaining access (SE: phishing, spear-phishing, whaling), Watering hole (infecting sites well knows to victims), USB drop (bars &clubs, coffee shops, universities)
 maintaining access (stealthy, persistent software/hardware implant, rootkits & backdoors, adding a firewall exception, SE?)
 clearing tracks (deleting logs, disabling auditing, SE?)
You will learn the tools and methods used by hackers and Social Engineers to successfully carry out each of the five phases with the aim of gaining unauthorized access to sensitive and confidential data and information about a person, company, organization, or government entity.
Social Engineering Techniques
In this lesson, Subject Matter Expert Dean Pompilio discusses social engineering techniques that are used to manipulate people into giving out sensitive information or performing in certain ways that allow attackers to be more successful with less effort when hacking computers or stealing information.
This lesson covers the following techniques:
 Dumpster diving
 Impersonation
 Shoulder surfing
 Making malicious copies of legitimate Web sites
 Phishing
 Making a malicious copy of an Interactive Voice Response (IVR) system
 Baiting
 Quid pro quo
 Tailgating (also known as Piggybacking)
You will learn where you can legally dumpster dive, how effective impersonation can be, where shoulder surfing can be done, and how malicious copies of Web sites or IVRs can be used to obtain sensitive information. SME Pompilio discusses the differences between phishing, spearfishing, and whaling and how baiting is done with iUSB flash drives infected with malware that runs with the autorun or autoplay function when the flash drive is inserted into a victim’s computer.
This lesson covers the techniques of quid prop quo – where the attacker convinces the victim that they are each doing a favor for the other person – and tailgating, which is also known as piggybacking. An attacker uses tailgating to enter a building by surreptitiously joining a group that has legitimate entry to the building. This technique also can be carried out by dressing as a technician or delivery person to gain entrance or by impersonating someone who genuinely works in the building.
Phishing:
 obtaining private information via email
 email appears to come from legitimate business/person
 email contains malicious attachment
 email contains link to fraudulent web page that appears legitimate (spear phishing, whaling)
Interactive Voice Response (IVR):
 recreate a legitimate-sound copy of an institutions IVR system
 prompt victim with phishing email to verify information using fraudulent IVR
Baiting:
 drop USB flash drive with intriguing label in highly trafficked area
 victim inserts drive and is infected with malware via autorun or autoplay
Quid Pro Quo:
 cold call as technical support in hopes of reaching a person with significant problem
 victim discloses private information and or installs malware
Tailgating:
 attacker looks legitimate and this is allowed to walk behind the person with legitimate access to enter restricted area
 attacker may fake the action of presenting or once knowing or owning an identity token
Demos
In this lesson, Subject Matter Expert Dean Pompilio discusses the demonstrations that he will carry out in this course of the tools used by Social Engineers. The demonstrations will be done within the Kali Linux environment and will use the built-in Dradis tool. SME Pompilio goes through the menu system, how to download, and how to build your own virtual machine.
The tools used are generally used for report generating and for gathering and organizing documents. Dradis lets you use a self-contained Web site to organize your information as you gather it. It is a very useful tool for creating folders, adding notes, and adding attachments. You will be replicating the demonstrations in your own Kali environment.
 Kali Linux
 Dradis
Kali Lab
In this demonstration, Subject Matter Expert Dean Pompilio presents a basic, high-level overview of Kali Linux. He discusses what is involved in the different aspects of data gathering, digital information gathering, and electronic methods used to socially engineer someone. This first lab* explores Kali Linux, which will be used for most of the demos in this course.
During this lab, you will learn to use the private StartPage search engine that does not track your email address, being mindful of the digital breadcrumbs you leave behind. You also will learn:
 How to access the Kali Web site (kali.org)
 How to use Kali as your penetration testing platform
 How to download depending on your needs
 How to easily boot Kali
 The links for VMWare and VirtualBOX images
 About using a VM Ware player or workstation to create a new virtual machine
 How to boot up a virtual machine
 How to configure your virtual machine
 About command shell basics
 About using CTRL-SHIFT-T
 About the IceWeasel browser
SME Pompilio discusses a useful Web site for people new to Kali: tools.kali.org. You can use this Web site to
 Learn about and how to use the Kali tools
 Learn about and how to use the menu system (especially the Kali Linux menu)
 Learn about the top ten security tools
In this lab, SME Pompilio shows you how and how often to keep your instance of Kali on your virtual machine always updated, and he discusses updating the tools separately.
Dradis Lab
In this lab, Subject Matter Expert Dean Pompilio discusses Dradis, a useful tool for gathering information and generating reports on that information. Dradis is a self- contained Web application that is a repository for gathering and organizing all your information. It is very simple to use and to configure to organize output from scans and word lists for password cracking and to attach files to a folder for a particular project. SME Pompilio stresses that life is a lot easier when you are organized, and good organization leads to fewer mistakes.
This demonstration shows you how to:
 access the Kali Web site
 choose the reporting tools you will use, including Dradis
 explore other options besides Dradis
Google Hacking
In this lesson, Subject Matter Expert Dean Pompilio introduces Social Engineering tools such as Google hacking. Google hacking techniques allow you to narrow search results considerably to give answers more quickly and to reduce noise and narrow results when performing a search. Can also use these tools on other search engines.
You will learn about:
 using special syntax to narrow your search results
 using the link command to return pages that link to a specified URL
 cache searching for deleted pages
 using archive.org (the “wayback machine”)
 finding related links using operators
 using search texts to find what you are looking for
SME Pompilio also discusses valuable resources to use: 1) the dorks section of www.exploitdb.com and 2) hackersforcharity.org, the Google hacking database.
The next three lessons will present overview demonstrations of using Google hacking to save time; Maltego, which allows you to gather information about an organization and then make connections between those pieces of information; and the Recon-NG framework.
Syntax: link: , cache: , related: , http://www.exploit-db.com/google-dorks/
Information Gathering Labs: Google hacking, Maltego, Recon-NG.
Google Hacking Lab
In this lab, Subject Matter Expert Dean Pompilio discusses Google hacking techniques and presents an introduction to some of the things you can do when gathering information for a Social Engineering audit.
SME Pompilio discusses how to use Google specifically to do targeted searches. (Although this demonstration refers to the search engine Google, the search engine StartPage may be a better choice for a search engine for privacy purposes).
A review of the various search operators and their uses covers the following:
 main search operators such as sites and links
 related search operators
 special search operators such as info and cached
 use of the advanced search function page
SME Pompilio presents several examples of how to obtain confidential information about a target when you want to find some vulnerability information about a Web site, or you want to reveal a site’s debugging information. A Social Engineer can search for vulnerabilities of information that should not be available on the public Internet.
There is a considerable amount of confidential information that is available deep in the public Internet that a target probably does not know is available and that will allow you to dig deeper
into the environment in which the target company operates; you will learn more info about the company’s systems, applications, and people.
It is suggested that Social Engineers should spend time on exploitdb.com to have access to a large database of exploits organized by category. There also are more than one thousand security papers on this site that can be accessed to further your knowledge and increase your skill set. (This is the site that Dean Pompilio used to present the examples in this demonstration).
SME Pompilio also presents other aspects of Google hacking that will allow you to get the code of a page through Google without going directly to the Web page, and he discusses Google Dork, which is a preformatted search string that identifies systems that have too much information available on the public internet.
https://support.google.com/websearch/answer/2466433?hl=en
Look for the car, not the animal:
ex: jaguar speed - car
Add an asterisk as a placeholder for any unknown or wildcard terms:
"a * saved is a * earned"
Search Operators:
site:
Get results from certain sites or domains. Example: olympics site:nbc.com To get results from multiple sites or domains, combine with OR. Example: Olympics site:nbc.com OR site:.gov
related:
Find sites that are similar to a web address you already know. Example: related:time.com
OR
Find pages that might use one of several words. Example: marathon OR race
info:
Get information about a web address, including the cached version of the page, similar pages, and pages that link to the site. Example: info:google.com
cache:
See what a page looks like the last time Google visited the site. Example: cache:washington.edu
http://www.googleguide.com/advanced_operators_reference.html
Examples:
inurl:citrix/metaframeXP
site: edu|org + inurl:"faculty_login.asp| .php"
site: .edu|org + inurl:"faculty_login.asp | .php"
intitle:"Index of" intext:"iCloud Photos" OR intext:"My Photo Stream" OR intext:"Camera Roll"
intitle:"Index of" "DCIM"
inurl:CrazyWWWBoard.cgi intext:"detailed debugging information"
intitle:"Retina Report" "CONFIDENTIAL INFORMATION"
Maltego Lab
In this lab, Subject Matter Expert Dean Pompilio demonstrates Maltego for Kali Linux. (Maltego also can be installed on Windows systems). This tool allows you to visualize the relationships between and among various bits of information, which Maltego calls entities, that you discover about the target of a Social Engineering Audit.
SME Pompilio gives an example that demonstrates the various ways you can run “transforms” of the known entities about your target. The entities are connected and displayed on a graph.
There is a discussion of the various available layouts, the various modes, how things are color-coded, changing size from the default, and other options for viewing your data that are useful for organizing your data.
SME Pompilio demonstrates how to transform email address from the specific domains discovered for the Social Engineering Audit target. Then he does a search for various categories of information to filter his data. He then runs a transform of the various email addresses to uncover other emails and other profiles on other social networking sites. He then can run other transforms to correlate all the data in various ways.
Various free and paid plug-ins are available for Maltego that enhance its basic features.
Run Maltego. Services@coronacomputers.com email used to register.
Recon – NG Lab
In this lab, Subject Matter Expert Dean Pompilio provides an introduction to Recon-NG, which is an interesting framework similar to Metasploit. Recon-NG is used for gathering information that is accessed through the Kali Tools Web site. It is already built into Kali, so there is no need to worry about launching it.
SME Pompilio demonstrates how to launch a command shell to use the tool. He shows how to create a workspace to keep data organized, and he demonstrates an Interesting feature of Recon-NG: the “no check” feature that turns off version checking to avoid flagging errors because of lack of updating.
There are lots of options inside the tool. SME Pompilio discusses and demonstrates the following:
 creating and using a workspace — you can create workspaces to organize your activities on a case-by-case basis, which increases the tool’s functionality
 how to show modules by running the Show Command (he recommends that you try all of the modules separately to learn a great deal about your target)
 using the netcraft command
 using the run command
 using the load command
 using the resolve command
 using the add and delete commands to configure lists
Examples are given of using different modules to get information and to narrow it to reflect what you are looking for. You can look for sites that have interesting types of files — such as a robots.txt file — to narrow your list of targets for a Social Engineering audit. There is a discussion of the importance of having permission to use a tool like this and of knowing that some services are paid services.
SME Pompilio looks at possible types of reports generated by using the available options and shows the various exporting options.
Example:
cd /usr/share/recon-ng/ ./recon-ng --help ./recon-ng --no-check workspaces select target-company.com show modules use netcraft set source coronacomputers.com run set SOURCE cnn.com run
use ip use resolve use recon/hosts-hosts/resolve run use discovery/info_disclosure/interesting_files run use ipin run set source cnn.com run use pgp show contacts show hosts del contacts 1-12 use pwn use recon/contacts-credentials/pwnedlist run show credentials run use html show options set CREATOR AKset CUSTOMER coronacomputers.com run
#####
Targeting
In this lab, Subject Matter Expert Dean Pompilio discusses targeting techniques. Targeting techniques allow you to gather information about a target in an active way (that may be noticed by the target) or in a passive way using public sources (that may not be noticed by the target). He explains that targeting efforts need to be personal and custom crafted so that your efforts are not given away by sounding scripted when you attempt to elicit information from your target. SME Pompilio also discusses using a quid pro quo approach in which you determine what will motivate the target to help you and then you create an incentive for the target to help you.
The following targeting labs will be presented in the remaining Parts of this Module:
 Spearfishing with the Social Engineering Toolkit – this is built into Kali
 Cupp – which is the Common User Password Profiler
 Cewl – which allows you to crawl a Web site and look for clues
 Shodan – which is a search engine that lets you explore the Internet of things and the IP address space of your target
 Scythe – which is a user name enumeration tool
 Creepy – which lets you look at sites such as Twitter, Google Plus, and Flickr to find out what your target is using these web sites for and to get time stamps of your target’s activities
Information Gathering is Key!
Make it personal:
 show depth
 be authentic
 provide incentive for revealing information
Toolkit Lab
In this lab, Subject Matter Expert Dean Pompilio demonstrates the Social Engineering Toolkit (SE Toolkit) that is built into Kali Linux and can be found by going to the Kali Linux Application Menu or by launching a command shell and going to User Share.
In this Part of Module 4 you will learn how to
 run the SE Toolkit
 trick your target into signing into a malicious Web site so that you can obtain their credentials
 use Web site attack factors
 perform SE attacks such as spearfishing
 trick your target into providing credentials by using the credential harvester
 use the tab nabbing tool
 use CTRL-SHIFT-T to open a new tab in your browser
 use the various templates
 choose the proper Web server for your activity
 clone a Web site to use to trick your target
 use the tiny URL Web site to streamline your process
 understand the security risks of using the tiny URL Web site
 communicate with your target to trigger them to go to the cloned Web site
 authenticate to the target’s true Web site using their own credentials
Steps in SET:
two, three, one, your IP, two -use tinyurl site to obscure your site/link before you send to user!!-then check in the html folder, with:
more harvester* -to see harvested credentials for google.com or whatever site account!!!
Cupp Lab
In this lab, Subject Matter Expert Dean Pompilio demonstrates Cupp (Common User Password Profiler), which is an information gathering tool that you can get from GitHub.com. Enter CUPP into the site’s search feature and choose MEBUS/Cupp from the choices returned. This tool allows you to generate a list of possible passwords to use in the Dictionary file. The Dictionary file(s) can be expanded as more information is gathered.
In this Part of Module 4, SME Pompilio demonstrates using Cupp to generate password word lists for a Cupp Dictionary. You will learn to:
 open the command shell USER SHARE
 work in interactive mode
 improve an existing Dictionary
 download a Dictionary
 generate a password word list for a Dictionary by answering questions about the target
 understand the various modes in Cupp
 evaluate the password word list generated by Cupp
 use another tool to save your output as a Rainbow Table
SME Pompilio reviews the config file and discusses the various modes, parameters, repositories, and default settings you can use.
Usage: cupp.py [OPTIONS] -h this menu -i Interactive questions for user password profiling -w Use this option to profile existing dictionary, or WyD.pl output to make some pwnsauce :) -l Download huge wordlists from repository -a Parse default usernames and passwords directly from Alecto DB. Project Alecto uses purified databases of Phenoelit and CIRT which where merged and enhanced. -v Version of the program
#########
apt-get install cupp
root@kali:/usr/share/cupp# ./cupp.py -l
> Enter number: 3 > Enter number: 32 > Enter number: 29 - this is the rule based attack, which means you answer questions about the target and create a dictionary.
root@kali:/usr/share/cupp# ./cupp.py -i [+] Insert the informations about the victim to make a dictionary [+] If you don't know all the info, just hit enter when asked! ;) > First Name: jim > Surname: smith > Nickname: jimmy > Birthdate (DDMMYYYY): 07041980 > Partners) name: sue > Partners) nickname: susie > Partners) birthdate (DDMMYYYY): 12251980 > Child's name: bill > Child's nickname: billy > Child's birthdate (DDMMYYYY): 01012000 > Pet's name: boomer > Company name: walmart > Do you want to add some key words about the victim? Y/[N]: y > Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: cheapskate,religious, hunter, poker > Do you want to add special chars at the end of words? Y/[N]: y > Do you want to add some random numbers at the end of words? Y/[N]:y > Leet mode? (i.e. leet = 1337) Y/[N]: y [+] Now making a dictionary... [+] Sorting list and removing duplicates...
[+] Saving dictionary to jim.txt, counting 68372 words. [+] Now load your pistolero with jim.txt and shoot! Good luck!
Cewl Lab:
In this lab, Subject Matter Expert Dean Pompilio demonstrates Cewl, a simple and useful tool for generating word lists for use with a password cracking tool. Cewl is built into Kali, or it can be downloaded and run from other UNIX systems. SME Pompilio gives an example of how a Social Engineer would use Cewl’s spidering process to generate a word list for password cracking and how the output is evaluated.
You will learn to
 run the program
 examine the Help function
 understand the various options in Cewl
 specify the spidering depth
 specify word length
 specify an output file
 specify a proxy
 determine whether to use the offsite parameter
 search for metadata and save to a file
 search for email addresses and save to a file
The large number of words (13,325) and email addresses (82) discovered by the process run in the example can be used with a password cracking tool, and those results will be used in your Social Engineering audit.
cd /usr/share/cewl ./cewl.rb --write outputfile.txt --email --email_file email.txt http://tools.kali.org --verbose
Shodan Lab:
In this lab, Subject Matter Expert Dean Pompilio demonstrates the features and the uses for a Web site called Shodan (www.shodan.io). You need to register and create an account to fully use this Web site. Shodan crawls the Internet and identifies IP addresses that have a service running. Then it does a banner grab of the service that is running, and it saves the banner information. You can search on a keyword or an IP address to find the services that are running.
You will learn how to use the explore link to find out more about popular recent searches, and you are encouraged to read the site’s blog. The blog is for people who want more information or who want to share their projects
SME Pompilio describes the idea of gathering IP addresses of your target in the context of Shodan. He demonstrates using the Web site for a penetration test or audit by identifying your target organization and their IP addresses. Then Shodan can be used to find the location and all the services that are running.
You will be working within the IP address range that your target is using and you will not be working randomly. Shodan helps to define the attack surface for your particular penetration test of an audit target.
Popular searches: webcam, cams, Netcam, dreambox, default password, spy, Hidden camera, Matrix VoiPServer
Scythe Lab:
In this lab, Subject Matter Expert Dean Pompilio demonstrates Scythe, an interesting account enumerator tool that allows you to do account harvesting. You will use this tool to find out where your target has accounts on various Web sites.
You install Scythe into your Kali instance from GitHub using the following steps:
· Go to www.GitHub.com
· Enter Scythe into the site’s search function
· Choose ChrisJohnRiley/Scythe from the list that is returned
In this lesson, you will learn:
 how to run the program and understand the list of modules it supports
 what the current settings are
 how to set a directory for where all the modules are located
 about the different modules
 how to search on user name and/or email address
 how to edit the account file
 about options you can specify, such as the list option, directory for the modules, sorting by category
 how to specify the ability to run threads
 how to specify the retry time
 how to specify how the summary is shown
 how to specify how to save the output
SME Pompilio demonstrates the system with two different sets of specifications and notes that the summary gives information on where the accounts are located on all the various Web sites. He notes that it is important to consider the value of aggregation – that a Social Engineer gathers bits and pieces about the target from various places around the Internet and then may be able to infer certain information about their target’s interests. This can provide fodder for engaging in Social Engineering techniques such as phishing and spearphishing.
./scythe.py --category social --summary --output outfile.txt
./scythe.py --single slideshare.net --summary
Creepy Lab:
In this lab, Subject Matter Expert Dean Pompilio demonstrates a tool called Creepy. The Web site www.geocreepy.com provides a useful tool that allows you to do geolocation for a target by using various social networking platforms to track individuals. Creepy works with Twitter, Flickr, Instagram, and Google Plus. Creepy is available to use within Kali, but Windows is used for this demonstration.
SME Pompilio demonstrates a person-based geolocation using himself as the target. (You need to be aware when using this tool that a target may have disabled geolocation).
In this lesson you will learn:
 how to launch the tool
 the need to configure the plug-ins for the Web sites you want to use
 the need to create accounts on the platforms you want to use
 how to log in and get a pin number that authorizes sites to allow Creepy read-only access
 how to select multiple targets and select a project
 the available options such as including re-tweets and including replies in the information Creepy returns
 that the program sends the geolocation data to Google Maps
 that a map is returned showing the target’s tweet locations and showing the tweets with a date and time stamp
 how to use the analysis link, which will give other statistics and further information about the tweets
 other things you can do such as filter by location, date, or position (distance from the point of interest) to narrow things down
 how to remove your filters
SME Pompilio states that Creepy is one tool to add to your bag of tricks to correlate information and to use with the built-in features of many social networking sites to get information about
your target. He also says that the information returned by Creepy may not be 100 percent correct and may need to be correlated with other information to verify it.
In order to use this tool with its APIs, you need to create accounts on those platforms that you will interrogate with Creepy, so that they can give you Read access to their database to interrogate it!
A person can have GeoLocation (in Twitter) disabled or enabled, it depends on how security minded they are.
Detection and Prevention:
In this lesson, Subject Matter Expert Dean Pompilio discusses ways to detect and prevent Social Engineering. Not everything about Social Engineering is in offensive mode; some of it is defensive — if you are the victim, you need to know how to take defensive measures.
SME Pompilio explains that while effective Social Engineers do not want their target to feel suspicious, potential Social Engineering victims need to be suspicious of anything out of the ordinary, especially when their gut tells them something is not right. Victims need to perform due diligence, trust but verify, and become digitally quiet – adhering to the Kali slogan that the quieter you are the more you are able to hear.
In this lesson, you will learn techniques to lessen your exposure to Social Engineering (such as enabling privacy settings on all social networking sites), and you will learn:
 that becoming unpredictable can benefit the Social Engineer and the target
 the kind of physical security controls that can thwart the Soc Eng
 how User Awareness training should be required for everyone in an organization
 that Advanced Security Awareness training is necessary for some employees
 that it is important to pay attention to the legal aspects of ethical Social Engineering
 that proper documentation is necessary for carrying out ethical Social Engineering
 how Search Engine Optimization can elicit good clues for the Social Engineer
 the definitions of and the differences between all of the “—bie” (eg: newbie, koolbie, maturbie) classifications of Social Engineers
 become digitally quiet
 be suspicious of anything out of the ordinary (always perform due diligence)
 maintain sent items folder
 enable all Facebook privacy settings
 un-tag all photos
 delete Google blogspots, Tumblr, Wordpress, etc
 Consider DuckDuckGo, StartPage and another search alternative
 use anonymizer or proxy websites
New-bie:
"Hang around web based chat, watches what hackers are doing to befriend them and intelligence on how they hack."
Concluding this course on Social Engineering, SME Pompilio reiterates that Social Engineering is an art and a science. He reminds us that our use of language maps to our experiences that can be manipulated by a Social Engineer. He suggests that to not be a victim of Social Engineering it is necessary to learn the thresholds for a Human Buffer Overflow and to practice becoming vague in a deliberate way.
Curious-bie:
"Starts wanting to dismantle the tools they've been using; wants to have the popularity, and respect the real-bies have in the scene."
Real-bie:
"Real hacker, has finally been reading mailing lists and news articles for a while, starts thinking about Linux distros, joining internet relay chat (IRC), joining real discussion about technical emphasis of vulnerabilities, wants to start hacking."
True-bie:
"Has successfully penetrated an online application; gets interested in forming views. The industry discovers the person, the true-bie becomes vocal on online communities."
Student-bie:
"Has formed strong views and believes, now wants to make money in a career of information security. Goes to college to become professional. Hides hacking background from student peers, feels guilty about part of the underground, keeps it secret."
Pro-bie:
"Graduates from university, expect a full pay and a successful life, end up just working in the local supermarket, starts acting as a security professional online anyway, at this point the government become concerned."
Job-bie:
"Through exposure of releasing vulnerabilities and getting talked about in news articles, is offered a job at a real vendor company."
Mature-bie:
"Is known names company for a while; known as an expert; may start a blog; commentary is often seen in quotes in news articles; the government actually listens to what mature-bie says in his/her blog."
In conclusion:
 social engineering is an art and a science
 our use of language maps to our experiences, which can be manipulated by a skilled SE
 learn the thresholds for a Human Buffer Overflow
 practice becoming vague in a deliberate way
Advanced Social Engineering
In this lesson, Subject Matter Expert Dean Pompilio discusses the next series of videos for this course: Advanced Social Engineering. In those lessons he will cover system access techniques and tools including Metasploit and Veil. He will talk more about physical security considerations, and he will present live demonstrations of physical security methods.
You may contact Dean Pompilio (username Polymath) through the Cybrary blog to let him know what techniques and tools you are using and what might be useful to the community.
Learn system access techniques and tools:
 Metasploit
 Veil
 Physical security
Stay tuned for the next class in the series!

Course Links!!!!

                                                            
     /\                                                     
    /  \   _ __   ___  _ __  _   _ _ __ ___   ___  _   _ ___
   / /\ \ | '_ \ / _ \| '_ \| | | | '_ ` _ \ / _ \| | | / __|
  / ____ \| | | | (_) | | | | |_| | | | | | | (_) | |_| \__ \
 /_/    \_\_| |_|\___/|_| |_|\__, |_| |_| |_|\___/ \__,_|___/
                              __/ |                         
                             |___/                          

Courses pirated & dumped by Case, S1rlancelot & dave + some random contributions                                                              
irc.anonops.com/6697
#learninghub

* This series of videocourses will guide you through the core material that an entry-level "ethical" hacker needs.
* Go to pluralsight.com (most links here are from there) and search the course if you want to see the table of contents.
* You may want to use a media player that allows you to increase the speed of the videos
* The number does not mean the order in which you should follow the courses, its just the order in which they were added.
* Use ?desc <coursenumber> to check the description of a course. Eg: ?desc 81
* Special thanks to ClaudiaD who haxed her way and made downloading the videos a lot easier, you rock. I also reused the code of her IRC bot which lead to the birth of SexyTeacherBot. Thanks ;)
* Special thanks to S1rlancelot who has also dumped a great deal of courses as well and helps more than I could ever ask for in #learninghub and is also leet as fuck

Don't know where to start? <-------------------------------------------------------------------------> Don't know where to start? <------------------------------------------------------------------------------------------------------------------------------------------------

-> BEGINNERS MUST WATCH: 10,000 foot view of penetration testing:                                        81. http://www.mediafire.com/download/b71c8v6tbqxzure/Introduction+to+Pentesting.rar

-> The top 10 OWASP vulnerabilities explained & exploited. Good for getting a big picture of present day web hacking:                2. http://www.mediafire.com/download/zodyqcqoecka4yi/Web+Security+and+the+OWASP+Top+10%3B+The+Big+Picture.rar

-> A ~9 hour long course on website vulnerabilities and how to exploit/secure them:                                1. http://www.mediafire.com/download/7dgfkktgyxlqx5u/Hack+Yourself+First%3B+How+to+go+on+the+Cyber-Offense.rar (Hack Yourself First; How to go on the Cyber-Offense)

-------------------------------------------------------------------------------> The rest of the courses listed below will go deeper into each step of hacking and the different attack techniques. <-------------------------------------------------------------------------------

*** IF YOU FEEL THAT YOU NEED TO KNOW MORE BASICS ABOUT COMPUTERS BEFORE GETTING TO HACKING CHECK BELOW WHERE IT SAYS "BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW"
*** IT IS ADVISED THAT YOU LEARN A LOW LEVEL PROGRAMMING LANGUAGE SUCH AS C++ BEFORE GETTING TO HACK
*** TRY NOT TO GET OVERWHELMED BY THE AMOUNT OF CONTENT!!

# EC-Council's Certified Ethical Hacker (CEH)
3. http://www.mediafire.com/download/5tex1gndiis0rz3/Reconnaissance+-+Footprinting.rar                     -- Reconnaissance/Footprinting
4. http://www.mediafire.com/download/1bap7hf82clm9dy/SQL+Injection.rar                             -- SQL Injection
5. http://www.mediafire.com/download/22t74lyof149u41/Scanning+networks.rar                         -- Scanning Networks
6. http://www.mediafire.com/download/h285291nt7w8trh/Enumeration.rar                             -- Enumeration
7. http://www.mediafire.com/download/g4di658xb9stz8g/Pentesting+Web+Servers.rar                     -- Hacking Web Servers
8. http://www.mediafire.com/download/waqslt6jhk6ph1a/Pentesting+Web+Applications.rar                     -- Hacking Web Applications
9. http://www.mediafire.com/download/1cujirp51m911k8/Cryptography.rar                             -- Cryptography
10. http://www.mediafire.com/download/fzbq3zzzqspzw15/Sniffing.rar                             -- Sniffing
11. http://www.mediafire.com/download/5irzrhub4r6mva3/Session+Hijacking.rar                         -- Session Hijacking
12. http://www.mediafire.com/download/2xqgt9g7044n683/Social+Engineering.rar                         -- Social Engineering
13. http://www.mediafire.com/download/zf2d20969azd887/System+hacking.rar                         -- System Hacking
14. http://www.mediafire.com/download/x5zxdvv1h3k54nk/Denial+of+Service.rar                         -- Denial of Service
15. http://www.mediafire.com/download/r9hrz8zotis74f1/Hacking+wireless+networks.rar                     -- Hacking Wireless Networks
16. http://www.mediafire.com/download/8caooodccdnc608/Malware+threats.rar                         -- Malware Threats
17. http://www.mediafire.com/download/33z5epburhu1xgy/Evading+IDS%2C+Firewalls%2C+and+Honeypots.rar             -- Evading IDS, Firewalls, and Honeypots
18. http://www.mediafire.com/download/l45v3ne52qr9llw/Mobile+platforms.rar                         -- Hacking Mobile Platforms

# Offensive Security Certification - by mickers, you rock dude!
http://www.mediafire.com/file/8w35cc04z4q26bj/oscp-training-videos.rar

# More hacking courses
 0. http://www.mediafire.com/download/492h7o887yxexha/PT+and+EH+with+Kali+Linux.rar                      -- Introduction to Pentesting and Ethical Hacking with Kali Linux
19. http://www.mediafire.com/download/2kczrn29gt6fdp3/Introduction+to+Firewalls.rar                     -- Introduction to Firewalls
20. http://www.mediafire.com/download/t98r47bpo9hy5n1/Introduction+to+browser+security+headers.rar             -- Introduction to browser security headers
21. http://www.mediafire.com/download/ou45m7o4xqt1qdu/Introduction+to+Wireshark.rar                     -- Introduction to Wireshark
22. http://www.mediafire.com/download/n5exc1bomahud9m/Troubleshooting+with+Wireshark+Fundamental+Protocol+Analysis.rar     -- Troubleshooting with Wireshark
80. http://www.mediafire.com/download/n98viipaz131fhq/Wireshark+2.0.rar                            -- Wireshark 2.0
82. http://www.mediafire.com/download/3guhkfrhfbvs01b/NMAP.rar                                -- Network Security Testing with Nmap
23. http://www.mediafire.com/download/sbst1evvisywe62/Buffer+Overflow.rar                        -- All about buffer overflows           
24. http://www.mediafire.com/download/7rq1ujn9424d3hb/Network+PT+Using+Python+and+K_4li+Linux.rar             -- Network Pentesting using Python and Kali linux
25. http://www.mediafire.com/download/mnulcdbw817f9q0/Metasploit+Basics.rar                         -- Metasploit Basics
26. http://www.mediafire.com/download/qchaazzxrdsmwja/CloudFlare+Security.rar                         -- CloudFlare Security
27. http://www.mediafire.com/download/1qqm5pcj6pz37wn/Hack+your+API+First.rar                        -- Hack your API first
28. http://www.mediafire.com/download/roaeau041zx8byx/SSCP%3B+Risk+Identification%2C+Monitoring%2C+and+Analysis.rar    -- SSCP: Risk Identification, Monitoring, and Analysis
29. http://www.mediafire.com/download/ysvx972ymd57gme/Check+Point+Certified+Security+Administrator%3B+Install+%26+Deploy.rar-- Check Point Certified Security Administrator; Install & Deploy
73. http://www.mediafire.com/download/ka9qu9136x8on4j/Cloud+security.rar                        -- Cloud Security
79. http://www.mediafire.com/download/6ctvkguxr9g4609/Cloud+computing.rar                        -- Cloud Computing
74. http://www.mediafire.com/download/5ut59in0l6okeaq/Introduction+to+Penetration+Testing+Using+Metasploit.rar        -- Introduction to Pentesting using Metasploit

# Computer Hacking Forensic Investigator (CHFI)
88. http://www.mediafire.com/file/yinvs2vtn4ix9z0/CHFI_Module_1_Introduction.rar                    —- 1 Introduction
89. http://www.mediafire.com/file/9yai0s961xkb7p3/CHFI_Module_2_Forensics_Investigation_Process.rar            —- 2 Forensics & Investigation Process
90. http://www.mediafire.com/file/l16n7as0zc5fgb4/CHFI_Module_3_Searching_%26_Seizing.rar                —- 3 Searching & Seizing
91. http://www.mediafire.com/file/3ajk8erktw1a4ug/CHFI_Module_4_Digital_Evidence%282%29.rar                —- 4 Digital Evidence
92. http://www.mediafire.com/file/8oarrkysj2pyymo/CHFI_Module_5_Responder_Procedures.rar                —- 5 Responder Procedures
93. http://www.mediafire.com/file/jqqoiy6ko91ov5c/CHFI_Module_6_Forensic_Lab.rar                    —- 6 Forensic Lab
94. http://www.mediafire.com/file/unk51i52idt53ay/CHFI_Module_7_Hard_Disks_%26__File_Systems.rar            —- 7 Hard Disks & File Systems
95. http://www.mediafire.com/file/6azb12untw5itww/CHFI_Module_8_Windows_Forensics.rar                    —- 8 Windows Forensics
96. http://www.mediafire.com/file/3dzf4qdln3pn6qi/CHFI_Module_9_Data_Acquisition_and_Duplication.rar            —- 9 Data Akquisition & Duplication
97. http://www.mediafire.com/file/ifl18p77a10c2az/CHFI_Module_10_Recovering_Deleted_Files_and_Partitions.rar        —- 10 Recovering deleted Files & & partitions
98. http://www.mediafire.com/file/2zabeg7axi7cwdd/CHFI_Module_11_Using_Access_Data_FTK.rar                —- 11 Using Access Data FTK
99. http://www.mediafire.com/file/m1nop2yk6pwsvn0/CHFI_Module_12_Using_EnCase.rar                    —- 12 Using EnCase
100. http://www.mediafire.com/file/5aay0ed5uzt8y97/CHFI_Module_13_Steganography.rar                    —- 13 Steganography
101. http://www.mediafire.com/file/k16714g10alwwkb/CHFI_Module_14_Password_Crackers.rar                    —- 14 Password Crackers
102. http://www.mediafire.com/file/990ili11icinm5c/CHFI_Module_15_Log_Correlation.rar                    —- 15 Log Correlation
103. http://www.mediafire.com/file/qsrr2yn0ptreyre/CHFI_Module_16_Network_Forensics.rar                    —- 16 Network Forensics
104. http://www.mediafire.com/file/ip1ded3iumcr3dg/CHFI_Module_17_Wireless_Attacks.rar                    —- 17 Wireless Attacks
105. http://www.mediafire.com/file/ldrew3v8x298htu/CHFI_Module_18_Web_Attacks.rar                    —- 18 Web Attacks
106. http://www.mediafire.com/file/82xh758lt2by927/CHFI_Module_19_Email_Crimes.rar                    —- 19 Email Crimes
107. http://www.mediafire.com/file/8lu73yi1s79iw1b/CHFI_Module_20_Mobile_Investigation.rar                —- 20 Mobile Investigation
108. http://www.mediafire.com/file/jz70shpdzso40ne/CHFI_Module_21_Investigative_Reports.rar                —- 21 Investigative Reports
109. http://www.mediafire.com/file/926yco1rhqo2ow2/CHFI_Module_22_Expert_Witness.rar                    —- 22 Expert Witness
   
# Certified Information Systems Security Pro (CISSP)
110. http://www.mediafire.com/file/x3zeprhl92pad8v/CISSP_Module_1_Security_and_Risk_Management.rar            —- 1 Security and Risk Management
111. http://www.mediafire.com/file/d9acozildd28f5b/CISSP_Module_2_Asset_Security.rar                    —- 2 Asset Security
112. http://www.mediafire.com/file/bn8xf99fe3obo37/CISSP_Module_3_Security_Engineering.rar                —- 3 Security Engineering
113. http://www.mediafire.com/file/znr4pbbbn9qcges/CISSP_Module_4_Communication_and_Network_Security.rar        —- 4 Communication and Network Security
114. http://www.mediafire.com/file/gdppws5602q99m6/CISSP_Module_5_Identity_and_Access_Management.rar            —- 5 Identity and Access Management
115. http://www.mediafire.com/file/wpwwr58ba2cpva3/CISSP_Module_6_Security_Assessment_Testing.rar            —- 6 Security Assessment Testing
116. http://www.mediafire.com/file/1yn1ilhrrxj3ci9/CISSP_Module_7_Security_Operations.rar                —- 7 Security Operations
117. http://www.mediafire.com/file/l35bcalku7d225c/CISSP_Module_8_Software_Development_Security.rar            —- 8 Software Development Security   

# Certified Information Systems Auditor (CISA)
118. http://www.mediafire.com/file/7cb389z90ajw6zm/CISA_-_Lesson_1.rar                            —- CISA Lesson 1
119. http://www.mediafire.com/file/g5ajbgf8prna3kw/CISA_-_Lesson_2.rar                            —- CISA Lesson 2
120. http://www.mediafire.com/file/6fosq372h74fm85/CISA_-_Lesson_3.rar                            —- CISA Lesson 3
121. http://www.mediafire.com/file/t05o81gzv2r7w3i/CISA_-_Lesson_4.rar                            —- CISA Lesson 4
122. http://www.mediafire.com/file/p46jtleg2rj5nhr/CISA_-_Lesson_5.rar                            —- CISA Lesson 5
123. http://www.mediafire.com/file/cpdin9zuk2p349s/CISA_-_Lesson_6.rar                            —- CISA Lesson 6
124. http://www.mediafire.com/file/icqjn9oli47k7o3/CISA_-_Lesson_7.rar                            —- CISA Lesson 7

# Certified Information Security Manager (CISM)
125. http://www.mediafire.com/file/aglbuk1ru1vkqv6/CISM_-_Domain_1_Information_Security_Governance.rar            -- Information Security Governance
126. http://www.mediafire.com/file/ljs5q7buasy02fg/CISM_-_Domain_2_Risk_Management.rar                    -- Risk Management
127. http://www.mediafire.com/file/ii40g1jk2ubla8x/CISM_-_Domain_3_Information_Security_Program.rar            -- Information Security Program
128. http://www.mediafire.com/file/6vkgyp69hvjmy65/CISM_-_Domain_4_Information_Security_Program_Implementation.rar    -- Information Security Program Implementation
129. http://www.mediafire.com/file/hm5971p1wgv39fg/CISM_-_Domain_5_Information_Security_Program_Management.rar        -- Incident Management and Response
130. http://www.mediafire.com/file/pz4idc39dy83mzd/CISM_-_Domain_6_Incident_Management_and_Response.rar

# Coursera
30. http://www.mediafire.com/download/mvk782rt6k28yha/Software+Security.rar                         -- Software Security
31. http://www.mediafire.com/download/vxd0998dmniuccz/Hardware+Security.rar                         -- Hardware Security
32. http://www.mediafire.com/download/mehi7uxazp5f6g6/Bitcoin+and+Cryptocurrency+Technologies+[Princeton+University].7z    -- Bitcoin & Cryptocurrency tech, by anominous - thanks!

=== OTHER VIDEO COURSES ===

# Programming
33. http://www.mediafire.com/download/su02297mbmlxq27/C%2B%2B+Fundamentals.rar                         -- C++ Fundamentals
34. http://www.mediafire.com/download/9tgfpx8pzwakrjc/C%2B%2B_Advanced_Topics.rar                     -- C++ Advanced topics
75. http://www.mediafire.com/download/com5mg5fda6mwd6/C+Fundamentals.rar                        -- C Fundamentals
76. http://www.mediafire.com/download/dzr3d2jymdhdqs6/C+in+Action.rar                            -- C in Action
77. http://www.mediafire.com/download/t5rygwbb45izg71/Java+Fundamentals.rar                        -- Java Fundamentals
35. http://www.mediafire.com/download/rr8kjao0zaxld3o/JavaScript+from+Scratch.rar                     -- Javascript from Scratch
36. http://www.mediafire.com/download/fd9r8hc6u6zouga/SitePoint-Introduction.to.JavaScript.7z                -- Introduction to Javascript, by anominous - thanks dude, you rock!
37. http://www.mediafire.com/download/w37r7339ouih7lg/Introduction+to+HTML+for+Designers.rar                 -- Introduction to HTML (for designers - you don't really need to be a designer)
38. http://www.mediafire.com/download/0j09qr98vtbdjab/Introduction+to+jQuery+for+Designers.rar                 -- Introduction to JQuery
39. http://www.mediafire.com/download/jj466s79n75ns46/Introduction+to+CSS+for+Designers.rar                 -- Introduction to CSS
84. http://www.mediafire.com/download/pvmstcc4abura43/Arduino.rar                            -- Introduction to Arduino
40. http://www.mediafire.com/download/sbrgwwksehmz8rc/Angular_Js_-_Get_Started.rar                     -- Get started with AngularJS
41. http://www.mediafire.com/download/e5ynwz4th5g3bvo/Building+Angular+and+Node.js+Apps+with+the+MEAN+Stack.rar     -- Building Angular and Node JS Apps with the MEAN Stack
42. http://www.mediafire.com/download/ooulsej4ui421q6/ExtJS+Desktop+Fundamentals.rar                     -- ExtJS Desktop Fundamentals
43. http://www.mediafire.com/download/gsc0epd3jvgayfb/Python+Fundamentals.rar                        -- Python Fundamentals
44. http://www.mediafire.com/download/dbn6i84zfsb8566/Python_%E2%80%93_Beyond_the_Basics.rar                 -- Python Beyond the basics
87. http://www.mediafire.com/file/ucv1l1j9y73i8cc/Django+Fundamentals.rar                        -- Django Fundamentals
45. http://www.mediafire.com/download/p9oappfwmb5mdvb/SitePoint-Ruby2.7z                        -- Ruby 2.0, by anominous - thanks dude!
46. http://www.mediafire.com/download/9anvrv6dxaaacbn/SitePoint-Getting.Started.with.BackBone.js.7z            -- Getting started with BackBone.js, by anominous - thanks dude!
83. http://www.mediafire.com/download/8b63ljih3cjl426/PowerShell_-_Getting_Started.rar                    -- Introduction to PowerShell
85. http://www.mediafire.com/download/sl36dmuomdld4qa/RaspberryPi+HomeServer.rar                    -- Raspberry Pi Home Server
86. http://www.mediafire.com/download/5u2g1svecr1iukm/Raspberry+for+Devs.rar                        -- Raspberry Pi for Developers

[We need feedback on the following courses]

132. Code-Clinic-Python,
     Programming-Fundamentals-Real-World,
     Python-3-Essential-Training.zip,
     Python-GUI-Development-Tkinter.zip
     Up-Running-Python.zip
     Up-Running-Python-Django.zip -> https://gofile.io/?c=1qWeyt

133. Penetration-Testing-Essential-Training https://gofile.io/?c=QEpfvW
134. Become a C++ developer (6 courses): https://gofile.io/?c=J5R0F8

# Cisco CCNA Security (640-554)
47. http://www.mediafire.com/download/yraijpmuzoa1zpn/Cisco+CCNA+Security%3B+Introduction+to+Network+Security.rar     -- Introduction to Network Security
48. http://www.mediafire.com/download/lmj3ri990ou3j64/Cisco_CCNA_Security%3B_AAA_and_IP_Security.rar             -- AAA and IP Security
49. http://www.mediafire.com/download/lhajdkufn9oi5ta/Cisco+CCNA+Security%3B+Firewalls+and+VPNs.rar             -- Firewalls and VPNs


## BASIC STUFF ABOUT COMPUTERS YOU SHOULD KNOW

# CompTIA A+ (220-801)
50. http://www.mediafire.com/download/f5013b98tc40fj8/CompTIA+A%2B+Part+1%3B+Computer+Hardware.rar             -- CompTIA A+ Part 1: Computer Hardware
51. http://www.mediafire.com/download/38q520p66a5a68q/CompTIA+A%2B+Part+2%3B+Networking.rar                 -- CompTIA A+ Part 2: Networking
52. http://www.mediafire.com/download/psmkodtkcy440rz/CompTIA+A%2B+Part+3%3B+Peripherals+and+best+practices.rar     -- CompTIA A+ Part 3: Peripherals and best practices
53. http://www.mediafire.com/download/mi3mvleyyd8ayu4/CompTIA+A%2B+Part+4%3B+Operating+Systems.rar             -- CompTIA A+ Part 4: Operating System
54. http://www.mediafire.com/download/5scd91h4gkaefoa/CompTIA+A%2B+Part+5%3B+Mobile+Devices+and+Troubleshooting.rar     -- CompTIA A+ Part 5: Mobile Devices and Troubleshooting

# CompTIA Security+ (SY0-401)
55. http://www.mediafire.com/download/wbdho927tnl1p26/CompTIA+Security%2B.rar                        -- CompTIA Security+ Domain 1 - Network Security.

# CompTIA Network+ (N10-006)
56. http://www.mediafire.com/download/2j9vbybrqab3x5q/Network+Architecture+for+CompTIA+Network%2B.rar             -- Network Architecture
57. http://www.mediafire.com/download/y65xsb8n6rfdcp8/Network+Operations+for+CompTIA+Network%2B.rar               -- Network Operations
58. http://www.mediafire.com/download/d4qdr3jwh337033/Network+Security+for+CompTIA+Network%2B.rar               -- Network Security

# Linux
59. http://www.mediafire.com/download/xxz33o4tq1obpzk/Linux+Installation+and+Initial+Configuration.rar             -- Linux Installation and Initial Configuration
60. http://www.mediafire.com/download/i24oogco4ch9ma4/Introduction+to+the+Bash+Shell.rar                 -- Introduction to the Bash Shell
61. http://www.mediafire.com/download/t5eha9cr4eckayb/Shell+Scripting+with+Bash.rar                     -- Shell Scripting with Bash
62. http://www.mediafire.com/download/27hfeldyqrs2ae8/Linux+Command+Line+Interface+%28CLI%29+Fundamentals.rar         -- Linux Command Line Interface Fundamentals

# Video editing
63. http://www.mediafire.com/download/6pn0jr7nlb7rmc0/Adobe+Premiere+Pro+CC+Fundamentals.rar                 -- Adobe Premiere Pro CC Fundamentals
64. http://www.mediafire.com/download/ys44ptebw6tk4o8/Animation+and+Video+Editing+in+Photoshop+CS6.rar             -- Animation and Video Editing in Photoshop CS6
65. http://www.mediafire.com/download/evuudd9t6dtc3ej/Color+Correction+and+Grading+in+Adobe+Premiere+Pro+and+SpeedGrade.rar -- Color Correction and Grading in Adobe Premiere Pro and SpeedGrade
66. http://www.mediafire.com/download/0gu7x007mpaclwd/Action+Scene+Editing+Techniques+in+Adobe+Premiere+Pro.rar     -- Action Scene Editing Techniques in Adobe Premiere Pro
67. http://www.mediafire.com/download/u6dko8ug5ysbrw2/Adobe+Premiere+Pro+CS6.rar                     -- Adobe Premiere Pro CS6 Setup [This is the software, not a course]

# Others
68. http://www.mediafire.com/download/6ny3ybv2ojzr6vt/Clean+Code.rar                             -- Clean Code
69. http://www.mediafire.com/download/cc6ibqxbhdcivea/TDD+with+Brad+Wilson.rar                         -- Test Driven Development with Brad Wilson
70. http://www.mediafire.com/download/cp8w28mcl1258o4/ScrumFundamentals.rar                         -- The fundamentals of Scrum methodology
71. http://www.mediafire.com/download/0u690ecz1q8lj1k/1.+Building+a+successful+blog.rar                 -- Building a successful blog
72. http://www.mediafire.com/download/653jtq5261zuapx/2.+Building+a+High+Traffic%2C+Profitable+Blog.rar         -- Building a high traffic profitable blog
78. http://www.mediafire.com/download/xvgjnq2ispauz3v/Fiddler.rar                            -- Fiddler

=== Other Resources ===
http://www.mediafire.com/download/0i9b46gjcqzr2jc/root-me-docs.rar     -- Useful PDFs about a huge amount of topics regarding hacking, extracted from repository.root-me.org
http://www.mediafire.com/file/02om55j9itey5x6/Perl.rar            -- Perl documents
http://www.mediafire.com/file/g83pv4ov2v139ha/RedHat.rar        -- Red hat documents
http://www.mediafire.com/file/j6bgke83y4eyo2x/Reverse+Engineering.rar   -- Reverse Engineering
http://www.mediafire.com/file/zfnt7r9gkmasrjd/Assembly.rar              -- Assembly

https://cybersecuritybase.github.io/                     -- Free course series by University of Helsinki in collaboration with F-Secure
https://www.mediafire.com/folder/y952n2935ocnf/Documents        -- 160 books on security stuff
https://github.com/onlurking/awesome-infosec                -- A curated list of awesome information security resources
http://github.com/juandecarrion/awesome-self-hosted            -- A curated list of awesome self hosted alternatives to cloud services.
https://github.com/paragonie/awesome-appsec                -- A curated list of resources for learning about application security. Contains books, websites, blog posts, and self-assessment quizzes.
https://jivoi.github.io/2015/06/19/oscp-prepare/            -- OSCP Prepare
https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/    -- All you need to pass OSCP
https://github.com/kurobeats/pentest-bookmarks/                -- A collection of handy bookmarks

** Ask Case for PDFs and other stuff on a specific topic. There are also the following courses available which have not been categorized yet:
Introduction to game development with Unity http://www.mediafire.com/file/i7cam1iydph3q6c/Introduction+to+Game+Development+with+Unity.rar
FMOD http://www.mediafire.com/file/bsix3j259btgr3j/FMOD.rar
Digital audio fundamentals http://www.mediafire.com/file/i23kxm6zgo2nkva/Digital+Audio+Fundamentals.rar
Alchemy synth http://www.mediafire.com/file/x301h7qxz7jxpyz/Alchemy+Synth+Fundamentals+in+Logic+Pro.rar


=== Practice what you learn ===
* https://pentesterlab.com/exercises
* root-me.org -> webclient and webserver challenges can be done on the go, Capture The Flag, etc.
* hackerrank.com -> Very good for learning programming, has on-the-go exercises
* codeacademy.com
* use fucking google
* hacksplaining.com
* vulnhub.com

Other free hacking/IT videos: www.cybrary.it
Interesting github: https://github.com/hackedteam/ -- Check out Hacking Team if you haven't!
About Us