@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from SHELL SHOCK
ICSI | CNSS Certified Network Security Specialist - Especialista Certificado en Seguridad de Redes
Use el Código de Cupón #StaySafeHome durante el pago para reclamar su Acceso Gratuito. La Oferta es válida hasta el 31/05/2020.
https://www.icsi.co.uk/courses/icsi-cnss-certified-network-security-specialist-covid-19
Philippe Laulheret - Intro to Hardware Hacking - DEF CON 27 Conference

This talk is an introduction to hardware hacking and as a case study I’ll use the [REDACTED] Deskphone, a device frequently deployed in corporate environments. I’ll use it to introduce the tools and methodology needed to answer these questions.

https://youtu.be/HuCbr2588-w

🧬 @Phantasm_Lab
Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

PULL OVER!
No, it is a cardigan, but thanks for noticing! After getting a nasty speeding ticket, OG SecKC HA/KC/ER hevnsnt decided enough was enough, and set out to fully understand police speed measurement devices, and develop homebrew countermeasures that are legal in some states (and some that are not). Come learn how police RF (X, K, KA) and Laser speed detection systems work and how to implement your own homebrew jamming countermeasures on the cheap, essentially making your vehicle invisible to law enforcement. HOP IN and BUCKLE UP, this talk is going to FUEL your hardware hacking desires! You better be able to think fast to keep up with this talk and prepare to get home in record time.

https://youtu.be/vQtLms02PFM

🧬 @Phantasm_Lab
Forwarded from @Phantasm_Lab
HackTheBox - Apocalyst

01:26 - Enumeration Start
02:58 - WPScan Start
05:40 - Directory Scanning with GoBuster
10:54 - Examining WPScan Output
13:40 - Bruteforcing with WPScan
14:40 - Bruteforcing HTTP Post with Hydra
18:30 - Edit WP Theme to get Code Execution
22:09 - Return of Reverse Shell
26:25 - Privelege Escalation Word Writeable Passwd

https://www.youtube.com/watch?v=TJVghYBByIA

🕴🏽 @Phantasm_Lab
Splunk Attack Range in a virtualized Ubuntu Guest VM — Guide

The Splunk Attack Range is a wonderful project by Splunk that allows anyone interested to quickly (automatically) build and deploy a whole Infrastructure stack with various software/tooling to test Cyber Attacks against vulnerable hosts, capture and send event logs from hosts, forward said event data into Splunk and even implement SOAR playbooks; go see the GitHub project page above for more information

https://medium.com/@julian.wieg/splunk-attack-range-in-a-virtualized-ubuntu-guest-vm-guide-c6587f43c15

🧬 @Phantasm_Lab
The Most Dangerous Town On the Internet - Hackerville (Ramnicu Valcea)

Watch the cybercrime documentary profiling the Romanian town nicknamed "Hackerville"
or "Most Dangerous Town on the Internet." Convicted blackhat hackers, like Guccifer (real name),
talk worms, viruses, social engineering, identity theft, and even hacking Hillary Clinton's email.

https://www.youtube.com/watch?v=un_XI4MM6QI

🧬 @Phantasm_Lab
hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters

One day in May 2017, computers all around the world suddenly shut down.
A malware called WannaCry asks for a ransom. The epidemic suddenly stops,
because a young, British researcher finds a killswitch, by accident.

https://youtu.be/vveLaA-z3-o

🧬 @Phantasm_Lab
Shenzhen: The Silicon Valley of Hardware (Full Documentary)

We examine the unique manufacturing ecosystem that has emerged,
gaining access to the world’s leading hardware-prototyping culture whilst challenging misconceptions from the west.
The film looks at how the evolution of “Shanzhai” – or copycat manufacturing – has transformed traditional models of business,
distribution and innovation, and asks what the rest of the world can learn from this so-called “Silicon Valley of hardware".

https://youtu.be/SGJ5cZnoodY

🧬 @Phantasm_Lab
@Phantasm_Lab pinned «hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters One day in May 2017, computers all around the world suddenly shut down. A malware called WannaCry asks for a ransom. The epidemic suddenly stops, because a young, British researcher finds…»