November 30, 2015

Hacker Rulebook

The mission here is to help get people and organizations quickly get up to speed on cyber security since we have a huge deficiency of qualified cyber defenders in the USA right now.  Defenders (a.k.a “the Blue Team” or “Sec Ops“) need to know what the attackers (a.k.a “the Red Team” or “Hackers“) are doing in order to focus their defensive efforts.  The Gingsoft Hacker Rulebook (GHR) is actively being developed. Come along for the ride by returning frequently in 2017.

Here’s what we will be putting together for you.

  • The 1st draft is just the some of the basic rules of the hacking world, mainly just words that you can read.  A handy trick here is to go to the topics that interest you, convert the text to speech, and play it back during your commute to work.
  • Me personally, I’m a visual guy, so the 2nd draft will be covered with illustrations and videos.
  • Once version 1.0 is released the Gingsoft Hacker Rulebook (GHR) will stay free, but the Dark Red Team (DRED) material will only be available to paid members.  The funds are needed to pay for infrastructure costs.

Gingsoft’s Hacker Rulebook (GHR) Topics

Dark Red Team – Direct Action

Dark Red Team – Indirect Action

  • Bash
  • NetCat
  • NCat
  • Wireshark
  • TcpDump
  • Google Hacking
  • Netcraft
  • Whois Enumeration
  • Recon-ng
  • DNS Enumeration
  • DNS Zone Transfer
  • TCP CONNECT scans
  • SYN scans
  • UDP scans
  • Nmap
  • OS Fingerprinting
  • Banner grabbing