Reddit Programming
t.me/reddit_programming
🕴 @Phantasm_Lab
I will send you newest post from subreddit /r/programmingt.me/reddit_programming
🕴 @Phantasm_Lab
Telegram
Reddit Programming
I will send you newest post from subreddit /r/programming
Forwarded from Hackaflag
As vulnerabilidades de segurança no BGP e no DNS são bem conhecidas e já foram atacadas anteriormente. Este é o maior ataque de escala que combina ambos.
Isso ressalta a fragilidade da segurança da Internet.
https://doublepulsar.com/hijack-of-amazons-internet-domain-service-used-to-reroute-web-traffic-for-two-hours-unnoticed-3a6f0dda6a6f
Isso ressalta a fragilidade da segurança da Internet.
https://doublepulsar.com/hijack-of-amazons-internet-domain-service-used-to-reroute-web-traffic-for-two-hours-unnoticed-3a6f0dda6a6f
Medium
Hijack of Amazon’s internet domain service used to reroute web traffic for two hours unnoticed
Between 11am until 1pm UTC today, DNS traffic — the phone book of the internet, routing you to your favourite websites — was hijacked by an…
Zuckerberg vs Robôs Sociais
https://www.youtube.com/watch?v=x7v66HquxKg
Recentemente, no Senado dos EUA, houve a audiência do Mark Zuckerberg, CEO do Facebook, por conta do escândalo do Cambridge Analytica. A Internet entrou em polvorosa com o comportamento do Zuck, alegando que ele se comportou como um robô. No vídeo de hoje a gente vai ver que existem robôs capazes de expressar muito mais emoção do que as pessoas acreditam, os chamados Robôs Sociais.https://www.youtube.com/watch?v=x7v66HquxKg
YouTube
Zuckerberg vs Robôs Sociais
Recentemente, no Senado dos EUA, houve a audiência do Mark Zuckerberg, CEO do Facebook, por conta do escândalo do Cambridge Analytica. A Internet entrou em polvorosa com o comportamento do Zuck, alegando que ele se comportou como um robô. No vídeo de hoje…
The Hacker Playbook 2 - Practical Guide To Penetration Testing
https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
| PDF/EPUB/MOBI | 23/18/53 MB |https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
recrutamento da ELT
https://ctf.tecland.com.br/files/recrutamento2018/
O ELT está abrindo uma oportunidade de ingresso em sua line-up, via processo seletivo, que ocorrerá dia 01 de maio (feriado),
durante 12 horas consecutivas. Começará terça, às 10h37, até às 22h37. Os interessados devem se inscrever em
https://ctf.tecland.com.br/Pwn2Win/, indo em Cadastro. Como time, use seu nickname. Esse tipo de competição demanda muito tempo dos players, se você não possui, não adianta tentar entrar no time! :)As categorias dos challenges serão: Exploitation, Reversing e Crypto, apenas! O
vencedor será convidado para um período de testes jogando conosco, até ser (ou não), oficializado. Dependendo do rendimento, outros players também poderão ser convidados, além do vencedor.https://ctf.tecland.com.br/files/recrutamento2018/
GIMP e Inkscape para criação de layouts.
https://www.youtube.com/channel/UCEQXp_fcqwPcqrzNtWJ1w9w/videos
🕴🏼 @Phantasm_Lab
https://www.youtube.com/channel/UCEQXp_fcqwPcqrzNtWJ1w9w/videos
🕴🏼 @Phantasm_Lab
L.U.C.I v3.1 | Bitcoin check and tranfer | April Update
https://vimeo.com/266948665
🕴🏼 @Phantasm_Lab
This is "L.U.C.I v3.1 | Bitcoin check and tranfer | April Update" by t1m3 on Vimeo, the home for high quality videos and the people who love them.https://vimeo.com/266948665
🕴🏼 @Phantasm_Lab
Vimeo
L.U.C.I v3.1 | Bitcoin check and tranfer | April Update
This is "L.U.C.I v3.1 | Bitcoin check and tranfer | April Update" by t1m3 on Vimeo, the home for high quality videos and the people who love them.
Gabriel Engel - Como um projeto open source se transformou em uma empresa de 60 milhões
https://youtu.be/hXG5R15Uc-E
🕴🏼 @Phantasm_Lab
Conheça a história de como um time de brazucas utilizou o poder do open source para transformar um side-project em uma Startup de US$17 milhões, recebendo investimento de um dos maiores Venture Capitalists americanos e mantendo um crescimento exponencial. Uma jornada que mostra o poder de uma visão ousada e da coragem de quebrar paradigmas para mudar o mundo dos chats.https://youtu.be/hXG5R15Uc-E
🕴🏼 @Phantasm_Lab
YouTube
Gabriel Engel - Como um projeto JS open source se transformou em uma empresa de 60 milhões
Conheça a história de como um time de brazucas utilizou o poder do open source para transformar um side-project em uma Startup de US$17 milhões, recebendo investimento de um dos maiores Venture Capitalists americanos e mantendo um crescimento exponencial.…
0day.Today?
https://0day.today/
🕴🏼 @Phantasm_Lab
Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.Our aim is to collect exploits from submittals and various mailing lists and concentrate them in one, easy-to-navigate database.This was written solely for educational purposes. Use it at your own risk. The author will be not responsible for any damage. // r0073r0day.today Available within TOR: http://mvfjfugdwgc5uwho.onionhttps://0day.today/
🕴🏼 @Phantasm_Lab
Web Hacking Pro Tips #6 with @fransrosen
https://www.youtube.com/watch?v=h55yTacK5HU&feature=youtu.be
🕴🏼 @Phantasm_Lab
In the sixth Web Hacking 101 Interview, I chat with Frans Rosen, super bug bounty hacker. In it, we discuss how Frans got started hacking, how he approaches sites, what he looks for, tools he uses, how he improves his skills and why he is so generous with his information sharing.https://www.youtube.com/watch?v=h55yTacK5HU&feature=youtu.be
🕴🏼 @Phantasm_Lab
YouTube
Web Hacking Pro Tips #6 with @fransrosen
Web Hacking 101: https://goo.gl/BGhTAz
In the sixth Web Hacking 101 Interview, I chat with Frans Rosen, super bug bounty hacker. In it, we discuss how Frans got started hacking, how he approaches sites, what he looks for, tools he uses, how he improves his…
In the sixth Web Hacking 101 Interview, I chat with Frans Rosen, super bug bounty hacker. In it, we discuss how Frans got started hacking, how he approaches sites, what he looks for, tools he uses, how he improves his…
BSidesSF 2018 - Blue Team Fundamentals
https://youtu.be/4Di34iv388A
Noob friendly! While new technical vulnerabilities are found continuously, malicious actors often rely on tried and true methods to exploit. These exploits are surprisingly uncomplicated. In this talk, we’ll share attempts we’ve seen from malicious actors. We’ll break down actual attacks and share what’s been most effective in mitigating credential stuffing, phishing, and common RCE attempts. At the end of this talk, you’ll walk away with simple takeaways to raise the cost to attackers for these simple attacks.Categoria Ciência e tecnologiahttps://youtu.be/4Di34iv388A
YouTube
BSidesSF 2018 - Blue Team Fundamentals (Benjamin Hering)
Benjamin Hering - Blue Team Fundamentals Noob friendly! While new technical vulnerabilities are found continuously, malicious actors often rely on tried and ...
BSidesSF 2018 - The Memory of a Meltdown
https://youtu.be/ue3NNunRLBc
Software bugs can be patched as soon as the vendor pushes an update and the user updates their system. Hardware bugs are a bit more difficult to patch. Within the past few months, Spectre and Meltdown have provided hackers the ability to access memory outside the scope of their permissions. We will be getting our hands dirty with memory to demonstrate how both these vulnerabilities work and how we use a PoC to exploit these vulnerabilities.https://youtu.be/ue3NNunRLBc
YouTube
BSidesSF 2018 - The Memory of a Meltdown (Shane Cota • Chris Magistrado)
Shane Cota • Chris Magistrado - The Memory of a Meltdown, and No We Don't Mean Britney Software bugs can be patched as soon as the vendor pushes an update an...
BSidesSF 2018 - From Bounties to Bureaucracy
https://youtu.be/6KZGmPpUvLI
Bug bounty programs are nearly ubiquitous today, but that wasn’t always the case. When the Zero Day Initiative (ZDI) was founded in 2005, bug bounty programs were considered to be a rare and somewhat controversial commodity. Now they are seen as an indispensable means for companies to acquire bug reports. Our initial goals were similar. The ZDI program extended our own research team by leveraging the methodologies, expertise, and time of others around the globe. Imagine adding more than 3,000 independent researchers from around the world to your team. Having the program asymmetrically enhanced our research capabilities through vulnerability acquisition. The program also provided the data needed to protect our customers while the affected vendor worked on a patch. Since that time, the program has awarded more than $15 million USD while ensuring nearly 4,000 0-day exploits were patched by vendors, all of which makes the computing landscape a safer space and makes ZDI the world’s largest vendor-agnostic bug bounty program.https://youtu.be/6KZGmPpUvLI
YouTube
BSidesSF 2018 - From Bounties to Bureaucracy (Brian Gorenc)
Brian Gorenc - From Bounties to Bureaucracy - The Hidden Market Factors of Exploit Economics Bug bounty programs are nearly ubiquitous today, but that wasn’t...