@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
BlueHat v18 - Microsoft Conference Center

Announcing the BlueHat v18 Schedule:
Where did the summer go? This year the BlueHat Security Conference moved forward in the schedule to late September. Next year it will settle into a steady orbit of early October moving forward. With that change in schedule, it is hard to believe that it is time to reveal the schedule for BlueHat v18. We had nearly one hundred fifty submissions spanning the gamut of security topics and presenters. That made for some tough choices for the content advisory board and a schedule that will leave wishing you could be in multiple talks at the same time. On behalf of the content advisory board, I want to thank everyone who submitted a paper for consideration. There were a lot of great ideas, but we could not put all of them on stage for this instance of BlueHat. We look forward to continuing the security conversation with you in the future.

https://blogs.technet.microsoft.com/bluehat/2018/08/02/announcing-the-bluehat-v18-schedule/
https://blogs.technet.microsoft.com/bluehat/

🕴🏼 @Phantasm_Lab
Forwarded from @Phantasm_Lab
Forwarded from @Phantasm_Lab
MaliciousBots.pdf
5.8 MB
Bugcrowd University Opens Its Doors to the Crowd

Bugcrowd University addresses the skill shortage by introducing new researchers to the crowdsourced security field and upleveling the skills of the white hat hacker community across the board. In tandem, Bugcrowd is pushing forward with the Bugcrowd Ambassador Program to foster new researchers. Researchers who take part in this program will learn new skills and hone old ones, and help spread the skills needed to shorten the cybersecurity gap.

“Making Bugcrowd home for researchers is one of our highest priorities. The goal of Bugcrowd University is to empower researchers with training and content to strengthen the security community,” said Jason Haddix, VP of Trust & Security, Bugcrowd. “With this Bugcrowd University program we will not only train and empower our Crowd to find high-priority vulnerabilities, we will also introduce this model to would-be security researchers around the world to increase the number of skilled researchers looking for vulnerabilities.”


https://www.bugcrowd.com/press-release/bugcrowd-university-opens-its-doors-to-the-crowd/?utm_source=social&utm_medium=facebook&utm_content=press_release&utm_campaign=bcu

🕴 @Phantasm_Lab
Reverse Shell Cheat Sheet

If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell.
If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding a shell to a TCP port. This page deals with the former.
Your options for creating a reverse shell are limited by the noscripting languages installed on the target system – though you could probably upload a binary program too if you’re suitably well prepared.
The examples shown are tailored to Unix-like systems. Some of the examples below should also work on Windows if you use substitute “/bin/sh -i” with “cmd.exe”.
Each of the methods below is aimed to be a one-liner that you can copy/paste. As such they’re quite short lines, but not very readable.

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet

🕴🏽 @Phantasm_Lab
John The Ripper Hash Formats

John the Ripper is a favourite password cracking tool of many pentesters.

http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats

🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab
Bug Bounty Hunter Methodology

@Phantasm_Lab