Forwarded from @Phantasm_Lab
The Hacker Playbook 2 - Practical Guide To Penetration Testing
https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
| PDF/EPUB/MOBI | 23/18/53 MB |https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
https://www.shakzee.com/courses/the-complete-php-course-from-core-php-to-php7-codeigniter/
coupon code: php-with-shakzee
coupon code: php-with-shakzee
Shakzee
The Complete PHP Course from Core PHP to PHP7 & Codeigniter
Do you want to learn web development especially server-side language..? if yes you are at the right place I will teach each and everything from basic to advance in this series.
APPSEC Cali 2018 - A Tour of API Underprotection
Author
https://youtu.be/lgAEJwgxe0Y
🕴 @Phantasm_Lab
Effective API protection is a growing concern, reflecting the popularity of RESTful Web APIs and richer front-end clients which stress current security and access authorization approaches. You’ll learn about potential threats resulting from undersecured Web APIs and techniques to strengthen your API security posture. You'll gain a clear understanding of user authorization via OAuth2, software authorization via static API keys and the critical interplay between them. Of particular concern are mobile API consumers whose code is statically published with secrets which are often poorly concealed. Practical advice with code examples will show how to improve mobile API security. TLS is necessary but insufficient to fully secure client-server communications. Certificate pinning is explained with code examples to show how to strengthen channel communications. Some advanced techniques will be discussed such as app hardening, white box cryptography and mobile app attestation. You should gain a good understanding of the underprotected API problem, with some immediately practical tips to improve your API security posture and a sense of emerging tools and technologies that enable a significant step change in API security.Author
Skip Hovsmith is a Principal Engineer and VP Americas for CriticalBlue, working on securing API usage between mobile apps and backend services. Previously, Skip consulted with CriticalBlue customers on accelerating mobile and embedded software running on multicore and custom coprocessor platforms in video, networking, and security modules. Prior to CriticalBlue, Skip worked in formal verification, FPGA design, reconfigurable hw/sw systems, and VLSI and mixed-signal chip design. He enjoys working directly with customers and is a writer at Hacker Noon, focused on API security topics such as “They reverse engineered 16k apps; here’s what we’d fix”, and "Mobile API Security".https://youtu.be/lgAEJwgxe0Y
🕴 @Phantasm_Lab
YouTube
APPSEC Cali 2018 - A Tour of API Underprotection
Abstract :
Effective API protection is a growing concern, reflecting the popularity of RESTful Web APIs and richer front-end clients which stress current security and access authorization approaches. You’ll learn about potential threats resulting from undersecured…
Effective API protection is a growing concern, reflecting the popularity of RESTful Web APIs and richer front-end clients which stress current security and access authorization approaches. You’ll learn about potential threats resulting from undersecured…
Forwarded from Hacking Brasil (Ryoon Ivo)
CCNA - The Complete Networking Fundamentals Course.
https://drive.google.com/folderview?id=0B6GbIqxDJgzoZ1FwaHl5dlVtRjQ
@HackingBr4sil
https://drive.google.com/folderview?id=0B6GbIqxDJgzoZ1FwaHl5dlVtRjQ
@HackingBr4sil
Forwarded from @Phantasm_Lab
Java secreto - Técnicas de descompilação, patching e Engenharia Reversa
🕴🏽 @Phantasm_Lab
Alex Kalinovsky: https://mega.nz/#!g8tCCLaQ!oZ9K5LBsxqPPu7EIcObOmjpEXYCBYLMTWakE-OOtJfc🕴🏽 @Phantasm_Lab
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Forwarded from @Phantasm_Lab (Deleted Account)
Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Forwarded from Zer0 to her0
Server-Side Spreadsheet Injection – Formula Injection to Remote Code Execution
https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/
@FromZer0toHero
https://www.bishopfox.com/blog/2018/06/server-side-spreadsheet-injections/
@FromZer0toHero
Bishop Fox
Server-Side Spreadsheet Injection - Formula Injection to Remote Code…
Bishop Fox's Jake Miller explains server-side spreadsheet injection, an attack vector based on CSV injection, in this write-up from an earlier talk.
The general HTTP authentication framework
HTTP provides a general framework for access control and authentication. The most common HTTP authentication is based on "Basic" schema. This page shows an introduction to HTTP framework for authentication and shows how restringe the access to your server using and HTTP "Basic" schema.
https://developer.mozilla.org/en-US/docs/Web/HTTP/AuthenticationMDN Web Docs
HTTP authentication - HTTP | MDN
HTTP provides a general framework for access control and authentication.
This page is an introduction to the HTTP framework for authentication, and shows how to restrict access to your server using the HTTP "Basic" scheme.
This page is an introduction to the HTTP framework for authentication, and shows how to restrict access to your server using the HTTP "Basic" scheme.
hypnotizing a police officer
Hipnotizando um policial sem que ele perceba!
https://www.youtube.com/watch?v=ByrsmUKWYk4
Hipnotizando um policial sem que ele perceba!
Spidey Indirectly hypnotizing a police officer to not be fined! Spidey Hipnotiza, de forma indireta, um policial para não ser multado.https://www.youtube.com/watch?v=ByrsmUKWYk4
YouTube
Hipnotizando um policial sem que ele perceba!
Spidey Hipnotiza, de forma indireta, um policial para não ser multado.
Video original:
https://www.youtube.com/watch?v=7gcQDuv_Kb0
Video original:
https://www.youtube.com/watch?v=7gcQDuv_Kb0
Forwarded from Hacking Brasil (Ryoon Ivo)
Escreva softwares que se baseiem diretamente nos serviços oferecidos pelo kernel do Linux e pelas bibliotecas do sistema principal. Com este livro abrangente, o colaborador do kernel do Linux, Robert Love, fornece um tutorial sobre a programação do sistema Linux, um manual de referência sobre chamadas do sistema Linux e um guia interno para escrever código mais rápido e inteligente.
O Love distingue claramente as funções padrão POSIX e os serviços especiais oferecidos apenas pelo Linux. Com um novo capítulo sobre multithreading, esta edição atualizada e expandida fornece uma visão detalhada do Linux de uma perspectiva teórica e aplicada sobre uma ampla gama de tópicos de programação, incluindo:
- Um kernel Linux, biblioteca C e visão geral do compilador C
- Operações básicas de I/O, como ler e gravar em arquivos
- Interfaces avançadas de I/O, mapeamentos de memória e técnicas de otimização
- A família de chamadas do sistema para gerenciamento básico de processos
- Gerenciamento avançado de processos, incluindo processos em tempo real
- Conceitos de encadeamento, programação multithread e Pthreads
-Gerenciamento de arquivos e diretórios
- Interfaces para alocação de memória e otimização do acesso à memória
- Interfaces de sinal básicas e avançadas e seu papel no sistema
O Love distingue claramente as funções padrão POSIX e os serviços especiais oferecidos apenas pelo Linux. Com um novo capítulo sobre multithreading, esta edição atualizada e expandida fornece uma visão detalhada do Linux de uma perspectiva teórica e aplicada sobre uma ampla gama de tópicos de programação, incluindo:
- Um kernel Linux, biblioteca C e visão geral do compilador C
- Operações básicas de I/O, como ler e gravar em arquivos
- Interfaces avançadas de I/O, mapeamentos de memória e técnicas de otimização
- A família de chamadas do sistema para gerenciamento básico de processos
- Gerenciamento avançado de processos, incluindo processos em tempo real
- Conceitos de encadeamento, programação multithread e Pthreads
-Gerenciamento de arquivos e diretórios
- Interfaces para alocação de memória e otimização do acesso à memória
- Interfaces de sinal básicas e avançadas e seu papel no sistema
Forwarded from Hacking Brasil (Ryoon Ivo)
Linux System Programming.pdf
2.4 MB