Popular Cybersecurity Certifications 2018
Offensive Security: OSCP, OSCE
EC-Council: CEH
GIAC: GREM, GCFA, GCFE, GNFA, GASF, GCTI, GSEC, GPEN
ISC(2): CISSP, SSCP, CCSP
ISACA: CISM, CRISC, CGEIT
CompTIA: Security+
SABSA Institute: SABSA
CESG: CCP IA
Cisco: CCNA Security, CCNP Security, CCIE Security, CCAr
Note: not a definitive list.
My List of IRC Channels
chat.freenode.net:
- ##crypto
- #re
- #blackhat
- #debian
- #kali-linux
- #linux
- #python
- #r_netsec
- #vulnhub
My List of Security Podcasts
Kali Linux: Ruby Gem Bundler Errors (Ruby libraries) for Metasploit
An error occurred while installing pcaprub (0.12.4), and Bundler cannot
continue.
Make sure that `gem install pcaprub -v '0.12.4'` succeeds before bundling.
This occurs during the installation process for Bundled Gems in Metasploit and within its local Git repository, e.g.:
cd ~/git/metasploit-framework/
bundle install
Note, ~/git/metasploit-framework/
is my locally defined directory for my Github repository in Kali Linux.
In the top example (see above), the error effects the “pcaprub” Gem. To fix this issue, run the following command:
sudo apt-get install libpcap-dev
This will install the package for libpcap-dev (development library for libpcap) – libpcap-dev Debian package
Once the libpcap-dev package has been installed, the bundle install command can be ran:
cd ~/git/metasploit-framework/
bundle install
Note, for other Gem installation errors during bundle install, it is likely to be an issue with missing packages in your system. The missing packages can be installed via sudo apt-get install [package_name]
.
Connecting to GitHub with SSH
Setting Up a Metasploit Development Environment
Exploit Ranking
How to get started with writing an exploit
Metasploit Exploit Module Template (Ruby)
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
def initialize(info={})
super(update_info(info,
'Name' => "[Vendor] [Software] [Root Cause] [Vulnerability type]",
'Description' => %q{
Say something that the user might need to know
},
'License' => MSF_LICENSE,
'Author' => [ 'Name' ],
'References' =>
[
[ 'URL', '' ]
],
'Platform' => 'win',
'Targets' =>
[
[ 'System or software version',
{
'Ret' => 0x41414141 # This will be available in `target.ret`
}
]
],
'Payload' =>
{
'BadChars' => "\x00"
},
'Privileged' => false,
'DisclosureDate' => "",
'DefaultTarget' => 0))
end
def check
# For the check command
end
def exploit
# Main function
end
end