Search tools

  • Use different search engines
  • Banner grab
  • httrack
  • inspy
  • metagoofil
  • intitle:“index of”
  • DNS poison/spoof

Infosec websites

Considerations

  • Language vulnerabilities
  • Common cyber attacks
  • Tor
  • Crypto attacks - frequency analysis
  • Data encryption standard
  • AES advanced encryption standard
  • Substitution permutation network
  • Kali Linux
  • Vulnerability research with reverse engineering, penetration testing and ethical hacking
  • Low level Linux programming and/or comprehensive knowledge in operating system security and associated network/platform design, hardening and deployment.
  • Cyber-security and certification such as such as CISSP, SANS GIAC, Security+, Network+, Linux+, MCSE, CCNA or SSCP.
  • Capture and decomposition through to integration, acceptance and customer sign off and associated toolsets.

References