!!!!!FOR INSTRUCTIONAL PURPOSES ONLY!!!!
I want to take a moment and remind all coders and scriptors that inserting and running of malicious files or data on anyone’s computer besides your own is ILLEGAL! And, depending on your age, can end you up in Prison!
These tutorials are intended for computer forensic students, network professionals or network professional students, white hat hackers and the like… They are not meant for harm or ill… File it under “know thy enemy”… Before trying anything written here it is recommended that you install a virtual machine on a test pc that is not connected to your network or the internet and test your knowledge in that environment. Even so, it is still possible to turn your computer into a brick. So get yourself a cheapie computer for such testing…
TYPES OF CYBER ATTACKS
ISOLATED TEST ENVIRONMENT
SITES FOR INFO ON CYBER SECURITY
SITES FOR INFO ON HACKING