@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from Hacking Brasil (Ryoon Ivo)
Linux System Programming.pdf
2.4 MB
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
DevSec Defense
by Daniel Bohannon at x33fcon

This talk demonstrates how defenders can apply DevOps practices to their detection research and development processes to drive more robust detection creation and maintenance over a rule’s lifetime. In addition, the PowerShell community has already developed numerous components and frameworks that information security practitioners can leverage for this defensive R&D, namely: PowerShell’s Abstract Syntax Tree (AST), PSScriptAnalyzer and Pester.

https://www.youtube.com/watch?v=QJe8xikf-iE

@SecTalks
Forwarded from @Phantasm_Lab
The general HTTP authentication framework

HTTP provides a general framework for access control and authentication. The most common HTTP authentication is based on "Basic" schema. This page shows an introduction to HTTP framework for authentication and shows how restringe the access to your server using and HTTP "Basic" schema.

https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication
Hackers trocam código-fonte de distribuição Linux por malware no Github

A conta no GitHub de uma distribuição Linux foi invadida por um ou mais hackers na tarde desta última quinta-feira. Os cibercriminosos substituíram o código-fonte original de alguns de repositórios da Gentoo por um malicioso, como informaram os desenvolvedores por trás do sistema em um alerta de segurança.

A Gentoo ainda está investigando os efeitos e as causas da invasão junto com o GitHub, mas já recomenda descartar qualquer arquivo baixado ou puxado da conta na plataforma ontem. Os códigos maliciosos inseridos nos repositórios durante o ataque podem ser usados para apagar arquivos no computador da vítima, segundo o site Hacker News.

https://olhardigital.com.br/fique_seguro/noticia/hackers-trocam-codigo-fonte-de-distribuicao-linux-por-malware-no-github/77099

🕴🏽 @Phantasm_Lab
Session Hijacking Cheat Sheet, Attack Examples & Protection

As the name suggests, Session Hijacking involves the exploitation of the web session control mechanism. The attacker basically exploits vulnerable connections and steals HTTP cookies to gain unauthorized access to sensitive information/data stored in web servers.

https://www.checkmarx.com/knowledge/knowledgebase/session-hijacking

🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab ([L]uŧh1er)
H2HC 10 - Palestra: Sandboxing is the shit - Jonathan Brossard

https://www.youtube.com/watch?v=1vgKym3fASg

🕴🏽 @Phantasm_Lab
#Perfil #HackerOne #Series

Link

Reputation: 3463 Impact: 14.90
Bugs found: 307 Thanks received: 46

https://hackerone.com/linkks

🕴🏽 @Phantasm_Lab