@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from Hacking Brasil ()
Pesquisadores da Symantec informaram sobre a expansão das operações de hacking realizadas pelo grupo iraniano de hackers Chafer. O grupo está ativo desde 2015 e, desde então, aumentou significativamente o seu arsenal de utilitários hackers.

https://hackingbrasil.wordpress.com/2018/03/02/o-grupo-hacker-que-reabasteceu-seu-arsenal-com-a-exploracao-da-nsa/
Hacker Documentary: Unauthorized Access by Annaliza Savage [1994]

This is a nostalgic hacker documentary about the early to mid 90s computer underground. Featuring old skool alpha geeks like Phiber Optik, once a member of the legendary hacker groups Legion of Doom and Masters of Deception. Plenty of cool interviews with the early 2600 crew in NYC, the l0pht, and even a bit on Agent Steal aka Justin Tanner Petersen who snitched on Kevin Poulsen. Also phone phreaking with a red box! Brace for lulz.

https://www.youtube.com/watch?v=fDk82bLYscg

🕴 @Phantasm_Lab
[glance] Path Traversal in glance static file server allows to read content of arbitrary file

Denoscription

glance serves files from the server where was installed. No path sanitization is implemented, thus malicious user is able to read content of any file from the server using simple curl command (adjust number of ../ to reflect your system):

https://hackerone.com/reports/310106

🕴 @Phantasm_Lab
Forwarded from Hacking Brasil (Ryoon Ivo)
Forwarded from Hacking Brasil (Ryoon Ivo)
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort


Os administradores de sistemas precisam ficar à frente de novas vulnerabilidades de segurança que deixam suas redes expostas todos os dias. Um firewall e um sistema de detecção de intrusão(IDS) são duas armas importantes nessa batalha, o que lhe permite negar proativamente o acesso e monitorar o tráfego da rede para detectar sinais de um ataque.

No livro Linux Firewalls discute os detalhes técnicos do firewall iptables e do framework Netfilter incorporados ao kernel do Linux, e explica como fornecem recursos sólidos de filtragem, conversão de endereços de rede(NAT), controle de estado e capacidades de inspeção de camada de aplicativos que rivalizam com muitos ferramentas comerciais. Você aprenderá a implantar iptables como um IDS com psad e fwsnort e também como construir uma camada de autenticação passiva forte em torno de iptables com fwknop.
Forwarded from Hacking Brasil (Ryoon Ivo)
9781593271411(1).pdf
6.5 MB
Joomla Joomanager 2.0.0 Joomanager Arbitrary File Download Exploit

https://0daydb.com/exploit/16348

🕴 @Phantasm_Lab
Channel photo updated
Forwarded from @Phantasm_Lab (Deleted Account)
Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ

Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0

Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg

Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc

Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0

Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc

Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU

RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00

The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU

The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU

Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Forwarded from Hacking Brasil (Ryoon Ivo)
No plano foi sugerido que a Agência de Segurança Nacional(NSA) realizasse ataques cibernéticos para neutralizar sites russos e o hacker Guccifer 2.0 que hackearia o email da sede da campanha de Hillary Clinton e do Comitê Nacional do Partido Democrata.

https://hackingbrasil.wordpress.com/2018/03/11/a-casa-branca-planejava-um-ataque-cibernetico-massivo-contra-a-russia/