Guide Penetration Testing Resource
Guide Penetration Testing Resource
Penetration Testing
Resource Guide
Introduction
Do you know what it takes to get started as a penetration tester and break into the field? There´s a lot you
can do on your own. Many of our consultants have built their careers on development and security self-
study.In this guide, we’ll offer recommended resources for you to jumpstart your career as a pen tester from
online courses and traditional books to certifications and standard industry tools.
‒ PentesterLab: An introduction to pen testing via tutorials, plus hands-on challenges based on common vulnerabilities. pentesterlab.com
‒ Coursera: Online classes on technical and professional development topics, including programming, with certification and
specializations available. coursera.org
‒ OWASP Top 10: A regularly updated report from the Open Web Application Security Project detailing the 10 most critical risks for web
application security. owasp.org/www-project-top-ten
‒ Hacker101: A collection of free videos on YouTube that will teach you everything you need to operate as a bug bounty hunter.
bit.ly/hacker101playlist
‒ Web Hacker Basics: Offers a free introductory course on YouTube on hacking basics for web app security testing. bit.ly/webhackerbasics
‒ Web Security Academy Series: A free YouTube series that walks through each of the challenges in
Portswigger Academy. bit.ly/websecurityacademy
‒ AWS in Plain English: An easy-to-understand breakdown of each AWS cloud service. bit.ly/awsplainenglish
GUIDE
GET FAMILIAR WITH INDUSTRY STANDARD TOOLS
‒ Kali Linux: A Linux distribution that comes preloaded with security tools.
‒ Burp Community Edition: An integrated platform for performing security testing of web applications.
‒ Nmap: A security scanner used to discover hosts and services on networks.
‒ Virtual Box: An application that allows you to simultaneously run multiple operating systems inside multiple
virtual machines.
‒ Amazon Web Services (AWS): Use Amazon Elastic Computer Cloud (E2C) to create and run victual machines, or instances,
in the Cloud.
Put your skills to the test. These resources can help you hone in your skills and determine your proficiency level and where you can spend
more time learning.
‒ OWASP Broken Web Application Project: A downloadable collection of vulnerable web apps distributed on a
virtual machine. owasp.org/www-project-broken-web-applications
‒ VulnHub: A catalogue of downloadable, intentionally vulnerable, virtual machines, with walkthroughs challenging users to compromise
Windows, Linux, and other hosts. vulnhub.com
‒ Hack The Box: Host servers you can practice breaking into to the computer flag. hackthebox.com
‒ TryHackMe: Offers free hands-on cybersecurity training with guided tasks and challenges. tryhackme.com
‒ PortSwigger: Visit their Academy for free, online web security training from the creators of Burp Suite. portswigger.net/web-security
‒ PicoCTF: Free computer security education program with original content built on a capture-the-flag framework. picoctf.org
‒ OWASP Juice Shop: The open-source vulnerable web application hosted by OWASP, showcasing vulnerabilities from the entire
OWASP top 10. juice-shop.herokuapp.com
CERTIFICATIONS
If you are interested in getting a security certification, keep reading for a breakdown of some of the most popular and common certs. If you
decide, certs aren’t for you, we also dive into some alternatives (like finding a cybersecurity mentor) to earning a cert that can still help boost
your skillset and make you more appealing to potential employers.
‒ Certified Ethical Hacker (CEH): Issued by the EC-Council, CEH is a good “starter” cert, so it’s a perfect option if you’re just getting your
feet wet in security.
‒ Offensive Security Certified Professional (OSCP): Offered by the Offensive Security organization, this cert is easily the most well-known
and highly sought-after. The OSCP exam is fairly difficult for anyone who is just starting out in security, but the good news is that it doesn’t
require renewal.
‒ Certified Information Systems Security Professional (CISSP): This is a cert you’ll want to get if you aspire to be a security leader. It is
intended to teach how to effectively design, implement, and managed a best-in-class cybersecurity program. It is geared more for those in
mid-level or senior positions.
‒ GIAC Penetration Tester (GPEN): SANS GIAC Certs are some of the most reputable names in security training. The GPEN certification
focuses on technical deep dives of penetration testing.
GUIDE
FIND A MENTOR
A mentor can help you dig into technical subject matter that you want to familiarize yourself with (e.g., enhancing your network pen testing
skills), as well as soft skills to develop effective communication and management. Other skills mentors can help you improve include salary
negotiation, interviewing, and advocating for yourself in the workplace. These skills might not be as flashy as red teaming, but they are still
extremely beneficial in developing professionally!
Helpful Resources
‒ Bishop Fox’s RedSec Discord: discord.gg/redsec
‒ Women’s Society of Cyberjutsu Slack Channel: womenscyberjutsu.org/page/joinslack
‒ “How Great Leaders Inspire Action” – A Ted Talk by Simon Sinek
Some of the best ways to learn is from peers around you. Consider attending local meetups or national conferences, as well as participating
in Capture the Flag (CTF) events.
CONFERENCES
There are many security conferences out there to attend, and we love so many! Since there are simply too many to share here, we’ve chosen
to highlight some of our favorites that bring us back year after year.
CTFs are a gamified exercise designed to test cybersecurity skills, with the goal, much like in the live-action, outdoor game, of obtaining the
highest score by capturing the most flags.
There are hundreds of CTF events taking place every year, which means ample opportunity to find some that fit your timing and needs just right.
Some CTFs are virtual, while others happen on-site at a conference or meeting. A few we recommend:
‒ PicoCTF: Perfect for young minds in STEM who want to take their coding hobby to the next level, PicoCTF provides year-round cybersecurity
education content (PicoGym practice challenges) for learners of all skill levels. picoctf.org
‒ Red Team Village: Offers a couple of events per year, plus Red Team stations where attendees can practice their skills and interactive
workshops focused on web attack training, HackerOps, hacker APIs, OSINT skills lab, and more. redteamvillage.io
‒ DEF CON: One of the most elite competitions available to hackers. The teams conduct reverse engineering, pwning, and pushing other
hackers off their boxes in the head-to-head competition to directly demonstrate effective exploitation for the future. forum.defcon.org
GUIDE
GUIDE
We have even more free tools, style guides, and resources on our website. bishopfox.com
C O NNE C T W ITH U S