@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
How Russia Hacked America—And Why It Will Happen Again

During the 2016 presidential campaign, Russian hackers attacked the U.S. on two fronts: the psychological and the technical. And it won't be the last time it happens. This psychological cyber warfare will only get better, and its methods more sophisticated.

https://www.youtube.com/watch?v=GYIgmua-J7o
How Russian Bots Invade Our Elections

How do bots and trolls work to infiltrate social media platforms and influence U.S. elections? We take a closer look at these insidious online pests to explain how they work.

https://www.youtube.com/watch?v=sZmrIkRDMsU
How Russian Trolls Collected Americans' Personal Information

The Kremlin-backed Internet Research Agency, a.k.a. the Troll Factory, ​used fake social media accounts before and after the 2016 U.S. election to collect sensitive personal information on Americans, a Wall Street Journal investigation has found. Shelby Holliday explains how the Russian schemes worked.​

https://www.youtube.com/watch?v=heXp2tyDl6k
Linux Privilege Escalation - Tradecraft

After getting a shell on a server you may or may not have root access. To gain privileged access to a Linux system it may take performing more analysis of the system to find escalation issues. In this episode of Tradecraft Security Weekly Beau Bullock (@dafthack) provides a methodology for performing various privilege escalation techniques against Linux-based systems.

https://www.youtube.com/watch?v=oYHAi0cgur4
Forwarded from Crypto links (One Time Pad ⊕)
Intelbras Telefone IP TIP200 LITE - Local File Disclosure

https://www.exploit-db.com/exploits/44317/

🕴🏽 @Phantasm_Lab
DNS hijacking using cloud providers - Frans Rosén

A few years ago, Frans and his team posted an article on Detectify Labs regarding domain hijacking using services like AWS, Heroku and GitHub. These issues still remains and are still affecting a lot of companies. Jonathan Claudius from Mozilla even calls “Subdomain takeover” “the new XSS”. Since then, many tools have popped up to spot these sorts of vulnerabilities. Frans will go through both the currently disclosed and the non-disclosed ways to take control over domains and will share the specific techniques involved.

https://www.youtube.com/watch?v=HhJv8CU-RIk

🕴🏽 @Phantasm_Lab
18 Extensions For Turning Firefox Into a Penetration Testing Tool

Firefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it’s a good web browser, it also supports add-ons to enhance the functionality. Mozilla has a website add-on section that has thousands of useful add-ons in different categories. Some of these add-ons are useful for penetration testers and security analysts. These penetration testing add-ons helps in performing different kinds of attacks, and modify request headers direct from the browser. This way, it reduces the use of a separate tool for most of the penetration testing related tasks.

http://resources.infosecinstitute.com/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/

🕴 @Phantasm_Lab