#Perfil #HackerOne #Series
Dr.Jones (sp1d3rs)
https://hackerone.com/sp1d3rs
Dr.Jones (sp1d3rs)
Reputation: 3875 Rank: 78th Spiders are the only web developers that enjoy finding bugshttps://hackerone.com/sp1d3rs
HackerOne
HackerOne profile - sp1d3rs
The world tried to catch me, but it couldn't. - https://r1p.xyz
How Russia Hacked America—And Why It Will Happen Again
https://www.youtube.com/watch?v=GYIgmua-J7o
During the 2016 presidential campaign, Russian hackers attacked the U.S. on two fronts: the psychological and the technical. And it won't be the last time it happens. This psychological cyber warfare will only get better, and its methods more sophisticated.https://www.youtube.com/watch?v=GYIgmua-J7o
YouTube
How Russia Hacked America—And Why It Will Happen Again
During the 2016 presidential campaign, Russian hackers attacked the U.S. on two fronts: the psychological and the technical. And it won't be the last time it happens. This psychological cyber warfare will only get better, and its methods more sophisticated.…
How Russian Bots Invade Our Elections
https://www.youtube.com/watch?v=sZmrIkRDMsU
How do bots and trolls work to infiltrate social media platforms and influence U.S. elections? We take a closer look at these insidious online pests to explain how they work.https://www.youtube.com/watch?v=sZmrIkRDMsU
How Russian Trolls Collected Americans' Personal Information
https://www.youtube.com/watch?v=heXp2tyDl6k
The Kremlin-backed Internet Research Agency, a.k.a. the Troll Factory, used fake social media accounts before and after the 2016 U.S. election to collect sensitive personal information on Americans, a Wall Street Journal investigation has found. Shelby Holliday explains how the Russian schemes worked.https://www.youtube.com/watch?v=heXp2tyDl6k
YouTube
How Russian Trolls Collected Americans' Personal Information
The Kremlin-backed Internet Research Agency, a.k.a. the Troll Factory, used fake social media accounts before and after the 2016 U.S. election to collect sensitive personal information on Americans, a Wall Street Journal investigation has found. Shelby Holliday…
Hackers invadem sites da SSP, Polícia Civil e do Corpo de Bombeiros
http://imirante.com/oestadoma/noticias/2018/03/20/hackers-invadem-sites-da-ssp-policia-civil-e-do-corpo-de-bombeiros.shtml
Só a PM escapou por estar fora do ar; quem tentava acessar as páginas era surpreendido com uma mensagem de que os endereços estavam em manutenção http://imirante.com/oestadoma/noticias/2018/03/20/hackers-invadem-sites-da-ssp-policia-civil-e-do-corpo-de-bombeiros.shtml
Jornal O Estado do Maranhão
Hackers invadem sites da SSP, Polícia Civil e do Corpo de Bombeiros
Só a PM escapou por estar fora do ar; quem tentava acessar as páginas era surpreendido com uma mensagem de que os endereços estavam em manutenção
Forwarded from Full Python Alchemist
Security Weekly #416 - Python for Pentesters
https://www.youtube.com/watch?v=nukEMdt5ehs
🐍 @FullPythonAlchemist
Dan joins us in-studio for a tech segment on some python noscripts he has written. https://www.youtube.com/watch?v=nukEMdt5ehs
🐍 @FullPythonAlchemist
YouTube
Security Weekly #416 - Python for Pentesters
Dan joins us in-studio for a tech segment on some python noscripts he has written.
Check out the wiki for links to his github and Twitter.
http://wiki.securityweekly.com/wiki/index.php/Episode416#Tech_Segment:_Dan_McInerney_-_6:05PM-6:35PM
Check out the wiki for links to his github and Twitter.
http://wiki.securityweekly.com/wiki/index.php/Episode416#Tech_Segment:_Dan_McInerney_-_6:05PM-6:35PM
Linux Privilege Escalation - Tradecraft
https://www.youtube.com/watch?v=oYHAi0cgur4
After getting a shell on a server you may or may not have root access. To gain privileged access to a Linux system it may take performing more analysis of the system to find escalation issues. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) provides a methodology for performing various privilege escalation techniques against Linux-based systems. https://www.youtube.com/watch?v=oYHAi0cgur4
YouTube
Linux Privilege Escalation - Tradecraft Security Weekly #22
After getting a shell on a server you may or may not have root access. To gain privileged access to a Linux system it may take performing more analysis of the system to find escalation issues. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack)…
Three different priv escalation methods - Pentest Limited's BSides Edinburgh
https://www.youtube.com/watch?v=VglowrbEnCI
Abusing cron, mysql, and previous breach to gain root privileges. BSides Edinburgh boot2root.https://www.youtube.com/watch?v=VglowrbEnCI
YouTube
Three different priv escalation methods - Pentest Limited's BSides Edinburgh
Abusing cron, mysql, and previous breach to gain root privileges.
BSides Edinburgh boot2root.
https://maze.pentest-challenge.co.uk/
https://maze.pentest-challenge.co.uk/downloads/bsidesedi17.ova
BSides Edinburgh boot2root.
https://maze.pentest-challenge.co.uk/
https://maze.pentest-challenge.co.uk/downloads/bsidesedi17.ova
Intelbras Telefone IP TIP200 LITE - Local File Disclosure
https://www.exploit-db.com/exploits/44317/
🕴🏽 @Phantasm_Lab
https://www.exploit-db.com/exploits/44317/
🕴🏽 @Phantasm_Lab
DNS hijacking using cloud providers - Frans Rosén
https://www.youtube.com/watch?v=HhJv8CU-RIk
🕴🏽 @Phantasm_Lab
A few years ago, Frans and his team posted an article on Detectify Labs regarding domain hijacking using services like AWS, Heroku and GitHub. These issues still remains and are still affecting a lot of companies. Jonathan Claudius from Mozilla even calls “Subdomain takeover” “the new XSS”. Since then, many tools have popped up to spot these sorts of vulnerabilities. Frans will go through both the currently disclosed and the non-disclosed ways to take control over domains and will share the specific techniques involved.https://www.youtube.com/watch?v=HhJv8CU-RIk
🕴🏽 @Phantasm_Lab
18 Extensions For Turning Firefox Into a Penetration Testing Tool
http://resources.infosecinstitute.com/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/
🕴 @Phantasm_Lab
Firefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it’s a good web browser, it also supports add-ons to enhance the functionality. Mozilla has a website add-on section that has thousands of useful add-ons in different categories. Some of these add-ons are useful for penetration testers and security analysts. These penetration testing add-ons helps in performing different kinds of attacks, and modify request headers direct from the browser. This way, it reduces the use of a separate tool for most of the penetration testing related tasks.http://resources.infosecinstitute.com/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/
🕴 @Phantasm_Lab
Infosecinstitute
18 extensions for turning Firefox into a Penetration testing tool | Infosec
Firefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it's a good web browser, it also supports add-ons to enhance the fun