This media is not supported in your browser
VIEW IN TELEGRAM
You can now passively enumerate all endpoints of a website with katana. (No need waybackurls)
Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | tee endpoints
You can then check the status of these endpoints or filter in order to find new vulnerabilities:
Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | httpx -mc 200 | grep -E '\.(js|php)$' | tee specificEndpoints
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | tee endpoints
You can then check the status of these endpoints or filter in order to find new vulnerabilities:
Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | httpx -mc 200 | grep -E '\.(js|php)$' | tee specificEndpoints
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🔥2👍1
دزدی داده از طریق ICMP
https://blog.bwlryq.net/posts/icmp_exfiltration
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer/
https://blog.bwlryq.net/posts/icmp_exfiltration
Please open Telegram to view this post
VIEW IN TELEGRAM
bWlrYQ | Blog
[Network] ICMP Exfiltration (Wrapped Gift)
Technical blog detailing the ICMP protocol and ICMP exfiltration through the WriteUp of a CTF challenge
😱3❤2👍1🔥1
Strategic Cybersecurity Talent Framework.pdf
33.2 MB
پرورش استعداد ها در امنیت سایبری
راهکار استراتژیک
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
راهکار استراتژیک
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🎉1
Infographics
The DoD Cybersecurity Policy Chart,
October 2024.
https://csiac.org/resources/the-dod-cybersecurity-policy-chart
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
The DoD Cybersecurity Policy Chart,
October 2024.
https://csiac.org/resources/the-dod-cybersecurity-policy-chart
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1
Infosec Standards
NIST SP 800-63B-4:
"Digital Identity Guidelines. Authentication and Authenticator Management", August 2024.
NIST SP 800-63-4:
"Digital Identity Guidelines"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.2pd.pdf
NIST SP 800-63A-4:
"Identity Proofing and Enrollment"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63A-4.2pd.pdf
NIST SP 800-63C-4:
"Federation and Assertions"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63C-4.2pd.pdf
National Institute of Standards and Technology (NIST)
——————————————————
#CyberSecurity #vCISO #NIST #AAA
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
NIST SP 800-63B-4:
"Digital Identity Guidelines. Authentication and Authenticator Management", August 2024.
NIST SP 800-63-4:
"Digital Identity Guidelines"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.2pd.pdf
NIST SP 800-63A-4:
"Identity Proofing and Enrollment"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63A-4.2pd.pdf
NIST SP 800-63C-4:
"Federation and Assertions"
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63C-4.2pd.pdf
National Institute of Standards and Technology (NIST)
——————————————————
#CyberSecurity #vCISO #NIST #AAA
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1
Hardening
Enhanced Visibility and Hardening Guidance for Communications Infrastructure 2024.:
Network Infrastructure Security Guide, ver.1.2
https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF
Cisco Guide to Securing NX-OS Devices
https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html
Cisco IOS XE Hardening Guide, 2024
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html
——————————————————
#CyberSecurity #vCISO #CISA #Hardening
#SecureBusinessContinuity
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Enhanced Visibility and Hardening Guidance for Communications Infrastructure 2024.:
Network Infrastructure Security Guide, ver.1.2
https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF
Cisco Guide to Securing NX-OS Devices
https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html
Cisco IOS XE Hardening Guide, 2024
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html
——————————————————
#CyberSecurity #vCISO #CISA #Hardening
#SecureBusinessContinuity
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1🤩1👨💻1
API_Sec_White_Hackers.pdf
35.4 MB
Tech book
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1👏1😱1🤩1
macsec.pdf
17.7 MB
Research
Unveiling Mac Security:
A Comprehensive Exploration of Sandboxing and AppData TCC 2024.
https://github.com/guluisacat/MySlides/tree/main/BlackHatUSA2024_KCon2024
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Unveiling Mac Security:
A Comprehensive Exploration of Sandboxing and AppData TCC 2024.
https://github.com/guluisacat/MySlides/tree/main/BlackHatUSA2024_KCon2024
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🤩2👍1🔥1🎉1
Eth_psw_crack.epub
20.3 MB
Tech book
Ethical Password Cracking:
Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Ethical Password Cracking:
Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1😁1😱1🤩1
MD_MZ.pdf
70.4 MB
Techbook
Malware Development:
The result of self-research and investigation of malware development tricks, evasion techniques and persistence 2022.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Malware Development:
The result of self-research and investigation of malware development tricks, evasion techniques and persistence 2022.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🔥1🤩1
DB_Forensics.pdf
13.2 MB
DFIR
Techbook
A Practical Hands-on Approach to Database Forensics.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Techbook
A Practical Hands-on Approach to Database Forensics.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🔥1😱1
Cloud_Hacking.pdf
17.7 MB
Techbook
CloudSecurity
Cloud Hacking Playbook 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
CloudSecurity
Cloud Hacking Playbook 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
👏3👍1🔥1😱1🕊1
eBPF_Sec_Model.pdf
1.5 MB
Whitepaper
ThreatResearch
eBPF Security Threat Model 2024.
eBPF Verifier Code Review (.pdf)
https://github.com/ebpffoundation/publications
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
ThreatResearch
eBPF Security Threat Model 2024.
eBPF Verifier Code Review (.pdf)
https://github.com/ebpffoundation/publications
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍1🔥1👏1😱1
اسپلانک ؛ پیاده سازی UF با GPO
https://blog.edie.io/2020/03/28/deploying-splunk-universal-forwarders-via-gpo/amp/
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
https://blog.edie.io/2020/03/28/deploying-splunk-universal-forwarders-via-gpo/amp/
Please open Telegram to view this post
VIEW IN TELEGRAM
Michael Edie
Deploying Splunk Universal Forwarders via GPO
When you want to get security event data from your Windows endpoints, there exists a myriad of ways to achieve that objective. Here I am going to outline how to deploy the Splunk Universal Forwarde…
❤4👍1🔥1👏1🎉1
بیایم از یک الگوریتم داده کاوی data mining برای کمک در شکار تهدیدات استفاده کنیم.
شناخت اوضاع غیر نرمال
https://www.huntandhackett.com/blog/kmeans-clustering-for-lateral-movement-detection
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
شناخت اوضاع غیر نرمال
https://www.huntandhackett.com/blog/kmeans-clustering-for-lateral-movement-detection
Please open Telegram to view this post
VIEW IN TELEGRAM
Huntandhackett
K-means Clustering for Lateral Movement Detection
Hunt & Hackett's cybersecurity experts explain how K-means clustering algorithms can be used to detect lateral movement in a network.
❤4👍1🔥1😱1🎉1
گزارش تحلیلی
وقتی کاربران ایرانی نمیتوانند ادوبی را به روز کنند ممکن است در این دام بیفتند
https://blogs.jpcert.or.jp/en/2024/12/watering_hole_attack_part1.html
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
وقتی کاربران ایرانی نمیتوانند ادوبی را به روز کنند ممکن است در این دام بیفتند
https://blogs.jpcert.or.jp/en/2024/12/watering_hole_attack_part1.html
Please open Telegram to view this post
VIEW IN TELEGRAM
JPCERT/CC Eyes
Recent Cases of Watering Hole Attacks, Part 1 - JPCERT/CC Eyes
Nowadays, many people probably recognize exploit of vulnerabilities in publicly exposed assets such as VPN and firewalls as the attack vector. In fact, many security incidents reported to JPCERT/CC also involve such devices. This is because vulnerabilities…
❤4😁2😱1🎉1🤣1
فارنزیکی متفاوت
https://www.mailxaminer.com/blog/gmail-email-forensics
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
https://www.mailxaminer.com/blog/gmail-email-forensics
Please open Telegram to view this post
VIEW IN TELEGRAM
MailXaminer Official Blog
Gmail Email Forensics Analysis to Find Relevant Information
Gmail Email Forensics analysis helps to examine Gmail email information. Forensics detection of the detailed analysis of the Gmail mailbox.
❤3👍2🗿2🎉1👨💻1
CleanCode_v2.pdf
30.3 MB
DevOps
Techbook
Seccode review
Clean Code Principles and Patterns: A Software Practitioner’s Handbook",
2nd Edition, 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Techbook
Seccode review
Clean Code Principles and Patterns: A Software Practitioner’s Handbook",
2nd Edition, 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5👍1🔥1🕊1
Pract_Forensic_IOS_Android.pdf
20.4 MB
DFIR
Tech book
Mobile Security
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Tech book
Mobile Security
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices.
Please open Telegram to view this post
VIEW IN TELEGRAM
🕊3🔥2❤1🤯1🤩1
LLM_Cybersecurity.pdf
11.8 MB
MLSecOps
Tech book
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation", 2024.
🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Tech book
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation", 2024.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍2🎉1🤩1