@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from DARKNET BR
Stealing the Network How to Own a Shadow.pdf
9.1 MB
Forwarded from @Phantasm_Lab ([L]uŧh1er)
#Documentario #CyberCrime #Hackerville

Assista o documentário sobre cibercrime que apresenta a cidade romena chamada “Hackerville” ou a “Cidade mais perigosa da Internet”. Hackers blackhat condenados, como Guccifer (nome real), falam sobre worms, vírus, engenharia social, roubo de identidade e até sobre invadir o e-mail de Hillary Clinton.

https://m.youtube.com/watch?v=mJ0bN6Nq0PE

🕴 @Phantasm_Lab
Red Team Infrastructure Wiki

This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh (@424f424f) and Jeff Dimmock's (@bluscreenofjeff) BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure"

https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki

🕴 @Phantasm_Lab
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software — and how to defend against it.

https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6

🕴 @Phantasm_Lab
Forwarded from Hunter X Hunter
#Cybary #Advanced #Pentesting

Cybary - Advanced Penetration Testing

This course covers how to attack from the web using cross-site noscripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you’re breaking into to. You’ll also learn tricks for exploiting a network.

https://www.cybrary.it/course/advanced-penetration-testing/
Forwarded from SHELL SHOCK
Forwarded from SHELL SHOCK
securing-node-applications.pdf
5.3 MB
Forwarded from T.I. da Depressão (Nerd Codefail🐧)
Gambiarras + gambiarras
Why is Hong Kong the Perfect Setting for Cyberpunk?

Hong Kong is the most cyberpunk place in the world. Hong Kong has been featured in the most popular and influential Cyberpunk films. In this video I discussed why Hong Kong is such a preferred destination fro cyberpunk filmmakers.

https://www.youtube.com/watch?v=G93eQ9HXNdg

🕴 @Phantasm_Lab
Cross Site Scripting Vulnerability in Oracle

So as you already know that Cross Site Scripting is an attack in which we can inject custom JavaScript codes & the browser executes them as the part of the page. So for the proof of concept I used a simple alert(document.domain) payload, but the exploitation is not limited.

https://www.ifrahiman.com/2018/02/cross-site-noscripting-vulnerability-in.html#more

🧠 @Phantasm_Lab