• Wireshark (https://www.wireshark.org/) – A free and open-source packet analyzer
• tcpdump (http://www.tcpdump.org/) – A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
• mitmproxy (https://github.com/mitmproxy/mitmproxy) – An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
• Charles Proxy (https://charlesproxy.com/) – A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
• usbmon (https://www.kernel.org/doc/Documentation/usb/usbmon.txt) – USB capture for Linux.
• USBPcap (https://github.com/desowin/usbpcap) – USB capture for Windows.
• dynStruct (https://github.com/ampotos/dynStruct) – structures recovery via dynamic instrumentation.
• drltrace (https://github.com/mxmssh/drltrace) – shared library calls tracing.
Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker official Kali Linux (https://hub.docker.com/r/kalilinux/kali-linux-docker/)
docker pull metasploitframework/metasploit-framework – Official Metasploit (https://hub.docker.com/r/metasploitframework/metasploit-framework/)
docker pull noncetonic/archlinux-pentest-lxde – Arch Linux Penetration Tester (https://hub.docker.com/r/noncetonic/archlinux-pentest-lxde)
docker pull citizenstig/nowasp – OWASP Mutillidae II Web Pen-Test Practice Application (https://hub.docker.com/r/citizenstig/nowasp/)
Some vocabulary
Infosec: Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Infosec can also be a person who practices ethical security. Wikipedia (https://en.wikipedia.org/wiki/Information_security)
Opsec: Operations security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. Wikipedia (https://en.wikipedia.org/wiki/Operations_security)
Black/grey/white hat hacker: Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if they’re a black, grey or white hat hacker. A black hat is just someone malicious that does not wait permission to break into a system or application. A white hat is usually a security researcher who practice ethical hacking. A grey hat is just in the middle of these two kind of hackers, they might want to be malicious if it can be benefit (data breach, money, whistleblowing …).
Red team: According to Wikipedia, a red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective in organizations with strong cultures and fixed ways of approaching problems. The United States intelligence community (military and civilian) has red teams that explore alternative futures and write articles as if they were foreign world leaders. Little formal doctrine or publications about Red Teaming in the military exist. In infosec exercises, Red teamers are playing the role of attackers. Wikipedia (https://en.wikipedia.org/wiki/Red_team)
Blue team: A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation. As a result, blue teams were developed to design defensive measures against red team activities. In infosec exercises, Blue teamers are playing the role of defenders. Wikipedia (https://en.wikipedia.org/wiki/Blue_team_(computer_security))
Penetration tester: An ethical hacker who practices security, tests applications and systems to prevent intrusions or find vulnerabilities.
Security researcher: Someone who practices pen testing and browses the web to find phishing/fake websites, infected servers, bugs or vulnerabilities. They can work for a company as a security consultant and are most likely a Blue teamer.
Reverse engineering: Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object. Similar to scientific research, the only difference being that scientific research is about a natural phenomenon. Wikipedia (https://en.wikipedia.org/wiki/Reverse_engineering)
Social engineering: In the context of information security, it refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme. The term “social engineering” as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught on among computer and information security professionals. Wikipedia (https://en.wikipedia.org/wiki/Social_engineering_(security))
Threat analyst: A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.
Network Tools
NetworkMiner (http://www.netresec.com/?page=NetworkMiner) – A Network Forensic Analysis Tool (NFAT)
Paros (http://sourceforge.net/projects/paros/) – A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
pig (https://github.com/rafael-santiago/pig) – A Linux packet crafting tool
findsubdomains (https://findsubdomains.com/) – really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
cirt-fuzzer (http://www.cirt.dk/) – A simple TCP/UDP protocol fuzzer.
ASlookup (https://aslookup.com/) – a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org…)
ZAP (https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) – The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
mitmsocks4j (https://github.com/Akdeniz/mitmsocks4j) – Man-in-the-middle SOCKS Proxy for Java
ssh-mitm (https://github.com/jtesta/ssh-mitm) – An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
nmap (https://nmap.org/) – Nmap (Network Mapper) is a security scanner
Aircrack-ng (http://www.aircrack-ng.org/) – An 802.11 WEP and WPA-PSK keys cracking program
Nipe (https://github.com/GouveaHeitor/nipe) – A script to make Tor Network your default gateway.
Habu (https://github.com/portantier/habu) – Python Network Hacking Toolkit
Wifi Jammer (https://n0where.net/wifijammer/) – Free program to jam all wifi clients in range
Firesheep (https://codebutler.github.io/firesheep/) – Free program for HTTP session hijacking attacks.
Scapy (https://github.com/secdev/awesome-scapy) – A Python tool and library for low level packet creation and manipulation
Amass (https://github.com/OWASP/Amass) – In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
sniffglue (https://github.com/kpcyrd/sniffglue) – Secure multithreaded packet sniffer
Netz (https://github.com/spectralops/netz) – Discover internet-wide misconfigurations, using zgrab2 and others.
RustScan (https://github.com/rustscan/rustscan) – Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.
How to Know that that your account has been Breached/Compromised
Yes There is way to know that is your account anytime has been include in leaked database .
Link:– https://haveibeenpwned.com
This website is the biggest website who collect all the data breached or leaked by a hacker
You can put your email in this website and can check is your email has been in data breach
You can also check is your password has been compromised or has been in that leaked database