Forwarded from MUNDO INFORMATICA
Cookie-based SQL Injection
https://resources.infosecinstitute.com/cookie-based-sql-injection/#gref
🕴🏼 @Phantasm_Lab
Injecting malicious code in cookie: Unlike other parameters, cookies are not supposed to be handled by users. Outside of session cookies which are (usually) random, cookies may contain data in clear or encoded in hexadecimal, base64, hashes (MD5, SHA1), serialized information. If we can determine the encoding used, we will attempt to inject SQL commands.https://resources.infosecinstitute.com/cookie-based-sql-injection/#gref
🕴🏼 @Phantasm_Lab
Infosec Resources
Cookie-based SQL Injection
Did you say a "Cookie" ? A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to
https://www.udemy.com/pentesting-webapplications-from-a-testers-perspective/?couponCode=REALDISCOUNT
Udemy
Best Cybersecurity Online Courses - Updated [August 2023]
Learn to foil hackers and viruses with a cyber security course on Udemy. Real world experts teach many skills that can help keep computers and networks safe.
Honeytrap is an extensible and opensource system for running, monitoring and managing honeypots.
https://github.com/honeytrap/honeytrap
🕴🏼 @Phantasm_Lab
To start using Honeytrap: See our documentation on docs.honeytrap.io.https://github.com/honeytrap/honeytrap
🕴🏼 @Phantasm_Lab
GitHub
GitHub - honeytrap/honeytrap: Advanced Honeypot framework.
Advanced Honeypot framework. Contribute to honeytrap/honeytrap development by creating an account on GitHub.
Start the emulator from the command line
🕴🏼 @Phantasm_Lab
This page describes command-line features that you can use with the Android Emulator. For information about using the Android Emulator UI, see Run Apps on the Android Emulator.
https://developer.android.com/studio/run/emulator-commandline🕴🏼 @Phantasm_Lab
Forwarded from SHELL SHOCK
Computer Hacking Forensic Investigator (CHFI)
CHFI Module 1 Introduction
http://www.mediafire.com/file/yinvs2vtn4ix9z0/CHFI_Module_1_Introduction.rar
CHFI Module 2 Forensics & Investigation Process
http://www.mediafire.com/file/9yai0s961xkb7p3/CHFI+Module+2+Forensics+Investigation+Process.rar
CHFI Module 3 Searching & Seizing
http://www.mediafire.com/file/l16n7as0zc5fgb4/CHFI_Module_3_Searching_&_Seizing.rar
CHFI Module 4 Digital Evidence
http://www.mediafire.com/file/3ajk8erktw1a4ug/CHFI+Module+4+Digital+Evidence%282%29.rar
CHFI Module 5 Responder Procedures
http://www.mediafire.com/file/8oarrkysj2pyymo/CHFI_Module_5_Responder_Procedures.rar
CHFI Module 6 Forensic Lab
http://www.mediafire.com/file/jqqoiy6ko91ov5c/CHFI_Module_6_Forensic_Lab.rar
CHFI Module 7 Hard Disks & File Systems
http://www.mediafire.com/file/unk51i52idt53ay/CHFI_Module_7_Hard_Disks_&__File_Systems.rar
CHFI Module 8 Windows Forensics
http://www.mediafire.com/file/6azb12untw5itww/CHFI_Module_8_Windows_Forensics.rar
CHFI Module 1 Introduction
http://www.mediafire.com/file/yinvs2vtn4ix9z0/CHFI_Module_1_Introduction.rar
CHFI Module 2 Forensics & Investigation Process
http://www.mediafire.com/file/9yai0s961xkb7p3/CHFI+Module+2+Forensics+Investigation+Process.rar
CHFI Module 3 Searching & Seizing
http://www.mediafire.com/file/l16n7as0zc5fgb4/CHFI_Module_3_Searching_&_Seizing.rar
CHFI Module 4 Digital Evidence
http://www.mediafire.com/file/3ajk8erktw1a4ug/CHFI+Module+4+Digital+Evidence%282%29.rar
CHFI Module 5 Responder Procedures
http://www.mediafire.com/file/8oarrkysj2pyymo/CHFI_Module_5_Responder_Procedures.rar
CHFI Module 6 Forensic Lab
http://www.mediafire.com/file/jqqoiy6ko91ov5c/CHFI_Module_6_Forensic_Lab.rar
CHFI Module 7 Hard Disks & File Systems
http://www.mediafire.com/file/unk51i52idt53ay/CHFI_Module_7_Hard_Disks_&__File_Systems.rar
CHFI Module 8 Windows Forensics
http://www.mediafire.com/file/6azb12untw5itww/CHFI_Module_8_Windows_Forensics.rar
Forwarded from SHELL SHOCK
CHFI Module 9 Data Akquisition & Duplication
http://www.mediafire.com/file/3dzf4qdln3pn6qi/CHFI_Module_9_Data_Acquisition_and_Duplication.rar
CHFI Module 10 Recovering deleted Files & & partitions
http://www.mediafire.com/file/ifl18p77a10c2az/CHFI_Module_10_Recovering_Deleted_Files_and_Partitions.rar
CHFI Module 11 Using Access Data FTK
http://www.mediafire.com/file/2zabeg7axi7cwdd/CHFI_Module_11_Using_Access_Data_FTK.rar
CHFI Module 12 Using EnCas
http://www.mediafire.com/file/m1nop2yk6pwsvn0/CHFI_Module_12_Using_EnCase.rar
CHFI Module 13 Steganography
http://www.mediafire.com/file/5aay0ed5uzt8y97/CHFI_Module_13_Steganography.rar
CHFI Module 14 Password Crackers
http://www.mediafire.com/file/k16714g10alwwkb/CHFI_Module_14_Password_Crackers.rar
CHFI Module 15 Log Correlation
http://www.mediafire.com/file/990ili11icinm5c/CHFI_Module_15_Log_Correlation.rar
CHFI Module 16 Network Forensics
http://www.mediafire.com/file/qsrr2yn0ptreyre/CHFI_Module_16_Network_Forensics.rar
CHFI Module 17 Wireless Attacks
http://www.mediafire.com/file/ip1ded3iumcr3dg/CHFI_Module_17_Wireless_Attacks.rar
CHFI Module 18 Web Attacks
http://www.mediafire.com/file/ldrew3v8x298htu/CHFI_Module_18_Web_Attacks.rar
CHFI Module 19 Email Crimes
http://www.mediafire.com/file/82xh758lt2by927/CHFI_Module_19_Email_Crimes.rar
CHFI Module 20 Mobile Investigation
http://www.mediafire.com/file/8lu73yi1s79iw1b/CHFI_Module_20_Mobile_Investigation.rar
CHFI Module 21 Investigative Reports
http://www.mediafire.com/file/jz70shpdzso40ne/CHFI_Module_21_Investigative_Reports.rar
CHFI Module 22 Expert Witness
http://www.mediafire.com/file/926yco1rhqo2ow2/CHFI+Module+22+Expert+Witness.rar
http://www.mediafire.com/file/3dzf4qdln3pn6qi/CHFI_Module_9_Data_Acquisition_and_Duplication.rar
CHFI Module 10 Recovering deleted Files & & partitions
http://www.mediafire.com/file/ifl18p77a10c2az/CHFI_Module_10_Recovering_Deleted_Files_and_Partitions.rar
CHFI Module 11 Using Access Data FTK
http://www.mediafire.com/file/2zabeg7axi7cwdd/CHFI_Module_11_Using_Access_Data_FTK.rar
CHFI Module 12 Using EnCas
http://www.mediafire.com/file/m1nop2yk6pwsvn0/CHFI_Module_12_Using_EnCase.rar
CHFI Module 13 Steganography
http://www.mediafire.com/file/5aay0ed5uzt8y97/CHFI_Module_13_Steganography.rar
CHFI Module 14 Password Crackers
http://www.mediafire.com/file/k16714g10alwwkb/CHFI_Module_14_Password_Crackers.rar
CHFI Module 15 Log Correlation
http://www.mediafire.com/file/990ili11icinm5c/CHFI_Module_15_Log_Correlation.rar
CHFI Module 16 Network Forensics
http://www.mediafire.com/file/qsrr2yn0ptreyre/CHFI_Module_16_Network_Forensics.rar
CHFI Module 17 Wireless Attacks
http://www.mediafire.com/file/ip1ded3iumcr3dg/CHFI_Module_17_Wireless_Attacks.rar
CHFI Module 18 Web Attacks
http://www.mediafire.com/file/ldrew3v8x298htu/CHFI_Module_18_Web_Attacks.rar
CHFI Module 19 Email Crimes
http://www.mediafire.com/file/82xh758lt2by927/CHFI_Module_19_Email_Crimes.rar
CHFI Module 20 Mobile Investigation
http://www.mediafire.com/file/8lu73yi1s79iw1b/CHFI_Module_20_Mobile_Investigation.rar
CHFI Module 21 Investigative Reports
http://www.mediafire.com/file/jz70shpdzso40ne/CHFI_Module_21_Investigative_Reports.rar
CHFI Module 22 Expert Witness
http://www.mediafire.com/file/926yco1rhqo2ow2/CHFI+Module+22+Expert+Witness.rar
write-up for the tricky challenge 6 from the latest Flare-On CTF.
https://www.youtube.com/watch?v=3iYlpYLTn-0
🕴🏼 @Phantasm_Lab
https://www.youtube.com/watch?v=3iYlpYLTn-0
🕴🏼 @Phantasm_Lab
YouTube
FLARE-On 5 Challenge 6 - Magic (Walk through - Reverse Engineering)
My challenge solution, hope you will enjoy watching!
Would appreciate subnoscriptions, likes, comments etc.
Feel free to contact me on twitter: https://twitter.com/LNadav
Scripts used can be found here: https://gist.github.com/Heartleak/93652288720e9237d340658f9e4290a7…
Would appreciate subnoscriptions, likes, comments etc.
Feel free to contact me on twitter: https://twitter.com/LNadav
Scripts used can be found here: https://gist.github.com/Heartleak/93652288720e9237d340658f9e4290a7…
Forwarded from DARKNET BR
📚 #Ebook
🔖 Defensive Security Handbook
~ Best Practices For Securing Infrastructures
〰〰〰〰〰〰〰〰〰〰〰
@DARKNET_BR
🔖 Defensive Security Handbook
~ Best Practices For Securing Infrastructures
〰〰〰〰〰〰〰〰〰〰〰
@DARKNET_BR