@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB |

https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU

🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker PlayBook 3 - Pratical Guide To Penetration Testing

This is the third iteration of The Hacker Playbook (THP) series. Below is an overview of all the new vulnerabilities and attacks that will be discussed. In addition to the new content, some attacks and techniques from the prior books (which are still relevant today) are included to eliminate the need to refer back to the prior books. So, what's new? Some of the updated topics from the past couple of years include:

- Abusing Active Directory
- Abusing Kerberos
- Advanced Web Attacks
- Better Ways to Move Laterally
- Cloud Vulnerabilities
- Faster/Smarter Password Cracking
- Living Off the Land
- Lateral Movement Attacks
- Multiple Custom Labs
- Newer Web Language Vulnerabilities
- Physical Attacks
- Privilege Escalation
- PowerShell Attacks
- Ransomware Attacks
- Red Team vs Penetration Testing
- Setting Up Your Red Team Infrastructure
- Usable Red Team Metrics
- Writing Malware and Evading AV
- And so much more

🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook

Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.

The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.

🕴 @Phantasm_Lab
Channel photo updated
Phantasm Lab English Group

Rules of House

- Programming Languages
- Bug Bounty
💷 💵
- Open Source & Free Software
- Exploitable tools
- sysADM
- Linux X Windows
- RED X BLUE security

https://news.1rj.ru/str/joinchat/HSfwBUe_xM6NuC5FCjKVWQ

🦠 @Phantasm_Lab
RTMP Heap Overflow CVE-2016-10191 - Exploiting FFmpeg ft. Paul Cher

Paul shows us another exploit for FFmpeg. The vulnerability is located in the RTMP protocol. While working with the binary format of the protocol requires a lot of work, the exploit itself is very easy.

https://www.youtube.com/watch?v=hRei9xXRAGE

🦠 @Phantasm_Lab