@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software — and how to defend against it.

https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6

🕴 @Phantasm_Lab
Forwarded from Hunter X Hunter
#Cybary #Advanced #Pentesting

Cybary - Advanced Penetration Testing

This course covers how to attack from the web using cross-site noscripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you’re breaking into to. You’ll also learn tricks for exploiting a network.

https://www.cybrary.it/course/advanced-penetration-testing/
Forwarded from SHELL SHOCK
Forwarded from SHELL SHOCK
securing-node-applications.pdf
5.3 MB
Forwarded from T.I. da Depressão (Nerd Codefail🐧)
Gambiarras + gambiarras
Why is Hong Kong the Perfect Setting for Cyberpunk?

Hong Kong is the most cyberpunk place in the world. Hong Kong has been featured in the most popular and influential Cyberpunk films. In this video I discussed why Hong Kong is such a preferred destination fro cyberpunk filmmakers.

https://www.youtube.com/watch?v=G93eQ9HXNdg

🕴 @Phantasm_Lab
Cross Site Scripting Vulnerability in Oracle

So as you already know that Cross Site Scripting is an attack in which we can inject custom JavaScript codes & the browser executes them as the part of the page. So for the proof of concept I used a simple alert(document.domain) payload, but the exploitation is not limited.

https://www.ifrahiman.com/2018/02/cross-site-noscripting-vulnerability-in.html#more

🧠 @Phantasm_Lab
Webinar: Tips on Building a World Class Bug Bounty Program From Senior Red Team Expert, Mack Staples

There’s nothing more important than protecting the lifeblood of your business: customer data. No one takes this more seriously than Zenefits, the All-in-One HR Platform. Zenefits holds sensitive personal and financial data for over 10,000 small and medium businesses. That’s a lot of high risk customer data, including Personally Identifiable Information (PII) and Protected Health Information (PHI). Thankfully, Zenefits has a world-class security program and a Red Team that knows, like many other companies with similarly sensitive data, they must be on their game 24/7. Mack Staples, Senior Manager of Zenefits' Red Team, walks through some best practices they use to enable bug bounties as a core product security strategy. He discusses tips, practical advice, and insights into how they’ve built their world-class bug bounty program into one of the top program’s on the HackerOne platform.

https://www.youtube.com/watch?v=USRi1M2mlm8

🕴 @Phantasm_Lab
Official Black Hat Arsenal Tools Github Repository