Jump to ratings and reviews
Rate this book

Breaking into Information Security: Learning the Ropes 101

Rate this book
All of the basic topics to get you from zero to junior pentester level - covering off everything you need to know to start breaking into web application penetration testing industry or looking for flaws on bug bounties. (LTR101)

85 pages, Kindle Edition

Published December 6, 2017

11 people are currently reading
119 people want to read

About the author

Andy Gill

28 books2 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
7 (24%)
4 stars
12 (41%)
3 stars
8 (27%)
2 stars
2 (6%)
1 star
0 (0%)
Displaying 1 - 4 of 4 reviews
46 reviews1 follower
September 13, 2024

At first, I expected this book to be sort of a tutorial on how to be a script kiddie - I usually prefer low level technical details instead of the superficial concept, but luckily, the book provides not only different tools for the job as I'd anticipated, but also points to some links that I hope are going to be useful. Furthermore, the author advocates for trying to develop the tools yourself. Frankly, I wanted more guidance on that, not on familiarizing myself superficially with Burp's UI.



I summarized a few lists on cool tools/attacks that the author mentions throughout the book. Most of them I've never heard of, which is great, since it means the book served some purpose :)



Tools:
- Empire
- Poshc2
- Powersploit
- Nmap
- Massscan
- Metasploit
- Nikto
- Sqlmap
- Eyewitness
- Dirb
- Spiderfoot
- Maltego
- Recon-NG
- Subbrute
- Sublist3r
- Knockpy
- DNS Parallel Prober

- Theharvester



Terminology:
IDS - Intrusion detection system
IPS - Intrusion prevention system
Proxy chaining - Forwarding traffic from one proxy server to another
Google hacking - using operators in the Google search engine to locate specific sections of text on websites that are evidence of vulnerabilities



Vulnerabilities:
- Username enumeration
- Stealing/replaying session cookies
- Cross site request forgery
- Open redirection
- Reflected XSS
- Http header injection
- Arbitrary redirection
- Stored attacks
- OS command injection
- Path traversal
- File inclusion (remote, local)
- SOAP, LDAP, XPath, XXE, SMTP injection



Lastly, I really appreciate the links provided by the author to blogs and users posting content relevant to the book on their social media, because finding a community you can learn from and observe is hard, but immensely useful and encouraging.

613 reviews11 followers
September 25, 2019
A good basic introduction into the topic of Information Security. It starts with Boolean logic, makes a small introduction to programming, goes up to security scanners and explains how you should document your work for bug bounty programs and good bug reports. It is a short book and can therefore only give a short introduction. However, there are many links and references to learn more about this topic.
Profile Image for ZINEB SKARABI.
7 reviews3 followers
December 31, 2017
Best Book for newbies, who really want to understand the basics of Information Security.
Displaying 1 - 4 of 4 reviews

Can't find what you're looking for?

Get help and learn more about the design.