@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from Red Team Alerts
[Report] M-Trends 2021
https://ift.tt/3a9UEx3

Discuss on Reddit: https://ift.tt/3dh217Y
@redteamalerts
Papo Binário #77 - Red team == pentest?

Alerta de entrevista necessária para quem deseja ingressar na área de pentest ou red team. Ou blue team. Ou, ah, só assista! A Marilia, que é do red team do Nubank, dá uma aula do que fazer e o que pensar da área!

https://youtu.be/K_IPrMb6uHg
Finding Your First Bug: Reading JSON and XML for Information Disclosure

In this video we cover how to read JSON and XML specifically to find information disclosure vulnerabilities. We cover how to approach a target when a URL returns JSON or XML, how to know if you've found an info disclosure - and how to exploit it! I want to really demystify JSON/XML and make you feel more at ease with how JSON/XML works and how you can read it. We also cover other vulnerabilities that might exist when a URL returns JSON or XML.

https://youtu.be/992cxaPdaho
Finding Bugs in Mobile APIs

Hey everyone! Welcome to another API video, well I promise more didn't I! This week we're going to use the setup from the previous videos on iOS and Android, and actually use it to FIND BUGS! Mobile apps have some AMAZING first bugs, that don't require complex technical skills, but instead perseverance!

https://youtu.be/N9YODrMUk5A
Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets

Cryptocurrency wallets in exchange platforms or banks require strong security because they protect vast amounts of money. Some solutions rely on advanced cryptographic methods that distribute trust across multiple parties, in the spirit of Shamir's secret-sharing. These include multi-party computation (MPC) and threshold signature schemes (TSS), which are a special case of MPC to sign data in a distributed, yet trustless manner. TSS has notably been tested and deployed in major organizations where secret key generation and digital signing are needed. But these techniques, although powerful and "magic" on paper, can prove fragile in practice, as this talk will show.

https://youtu.be/0Okqvm4lBQI