Forwarded from CSEC ASTU (IRIS)
|CSEC Dev
Skill Sharing |Wednesday Session
Presenter - Mr. Amare Yalew
Date - Wed, 4 May 2022
Time - 4:00PM [10:00 Evening LT]
Venue - CSEC Lab [B508 - R9]
Amare Yalew is a skilled and technically qualified software developer with 4+ years of experience in enterprise-level web development and desktop applications for different financial and public organizations. Strong abilities in analysis, coding, and debugging supported by the ability to rapidly adapt to new technical environments. Skilled at implementing best practices and latest technologies such as JavaScript, Angular, React.js, React Native, Express.js, Node.js, TypeScript, MongoDB, and RESTful Web Services through all phases of software development life cycle.
Join us and increase your confidence in your ability to be successful in your career goals.
Everyone is invited!
#CSEC_ASTU #Dev #SKillSharing
Skill Sharing |Wednesday Session
Presenter - Mr. Amare Yalew
Date - Wed, 4 May 2022
Time - 4:00PM [10:00 Evening LT]
Venue - CSEC Lab [B508 - R9]
Amare Yalew is a skilled and technically qualified software developer with 4+ years of experience in enterprise-level web development and desktop applications for different financial and public organizations. Strong abilities in analysis, coding, and debugging supported by the ability to rapidly adapt to new technical environments. Skilled at implementing best practices and latest technologies such as JavaScript, Angular, React.js, React Native, Express.js, Node.js, TypeScript, MongoDB, and RESTful Web Services through all phases of software development life cycle.
Join us and increase your confidence in your ability to be successful in your career goals.
Everyone is invited!
#CSEC_ASTU #Dev #SKillSharing
👍1
Forwarded from CSEC ASTU (IRIS)
burpsuite_pro_v2022.2.4.zip
503.6 MB
|Cyber
password = 311138
"Burp Suite Professional is the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques."
password = 311138
"Burp Suite Professional is the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques."
portswigger.net/burp/pro#Cyber #CSEC_ASTU #Channel
👍2
|Cyber
Check #this Out
these are the TOP 100 tools used by Ethical Hacker for many purposes
Especially for
#Cyber #CSEC_ASTU #BugBounty
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources
Check #this Out
these are the TOP 100 tools used by Ethical Hacker for many purposes
Especially for
BugBounty #Cyber #CSEC_ASTU #BugBounty
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources
|Cyber
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll
Anonymous Poll
63%
Web Security
15%
Cryptography
43%
Network Security
15%
Digital Forensics
35%
Hacking Tool Development
7%
Others(you can specify it on the discussion group)
CSEC_Cybersecurity pinned «|Cyber
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll»
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll»
|Cyber
#Learn Ethical hacking on "HackTheBox" and
start Building you Hacker Profile
#Cyber #CSEC_ASTU #ETHICALHACKING
https://www.hackthebox.com/
#Learn Ethical hacking on "HackTheBox" and
start Building you Hacker Profile
#Cyber #CSEC_ASTU #ETHICALHACKING
https://www.hackthebox.com/
Hack The Box
Cyber Mastery: Community Inspired. Enterprise Trusted.
We raise your cyber resilience by transforming technical teams into a mission-ready workforce, so every organization can stay ahead of tomorrow’s threats. Get started now with personal or team plans.
|Cyber
For Motivation
=> Top HackerOne Earner Making Seven Figures
#Cyber #CSEC_ASTU #HACKERONE #MOTIVATION
https://www.hackerone.com/press-release/six-hackers-break-bug-bounty-record-earning-over-1-million-each-hackerone
For Motivation
=> Top HackerOne Earner Making Seven Figures
#Cyber #CSEC_ASTU #HACKERONE #MOTIVATION
https://www.hackerone.com/press-release/six-hackers-break-bug-bounty-record-earning-over-1-million-each-hackerone
HackerOne
Six Hackers Break Bug Bounty Record, Earning Over $1 Million Each on HackerOne | HackerOne
Bounty awards increased 65% on average as a quarter of all vulnerabilities reported are being classified as high to critical severity SAN FRANCISCO-- August 29, 2019 -- HackerOne, the number one hacker-powered pentesting and bug bounty platform, today announced…
|Cyber
Click here to access the slide at NahamCon " By Jason Haddix(@jhaddix) The Bug Hunter's Methodology for Application Analysis and Hacking"
⭐️Contents
{
👉🏻 Mental Hurdles
👉🏻 Pre-Manual Testing and Automation
👉🏻 Content Discovery
👉🏻 Application Analysis
}
⭐️Tools Used
{
💥 Webanalyze
💥 Nuclei
💥 FeroxBuster
💥 Wfuzz
💥 Hakrawler etc.....
}
#Cyber #CSEC_ASTU #WebAppHacking
Click here to access the slide at NahamCon " By Jason Haddix(@jhaddix) The Bug Hunter's Methodology for Application Analysis and Hacking"
⭐️Contents
{
👉🏻 Mental Hurdles
👉🏻 Pre-Manual Testing and Automation
👉🏻 Content Discovery
👉🏻 Application Analysis
}
⭐️Tools Used
{
💥 Webanalyze
💥 Nuclei
💥 FeroxBuster
💥 Wfuzz
💥 Hakrawler etc.....
}
#Cyber #CSEC_ASTU #WebAppHacking
|Cyber
📖📖📖📖📖📖📖📖📖📖📖📖
The Web Application Hacker's Handbook
"This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using
a web browser to communicate with a web server. We examine a wide variety
of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications."
#Cyber #CSEC_ASTU #webSecurity
📖📖📖📖📖📖📖📖📖📖📖📖
The Web Application Hacker's Handbook
"This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using
a web browser to communicate with a web server. We examine a wide variety
of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications."
#Cyber #CSEC_ASTU #webSecurity
|Cyber
https://medium.com/@h4x0r_dz/vulnerability-in-paypal-worth-200000-bounty-attacker-can-steal-your-balance-by-one-click-2b358c1607cc
#Cyber #CSEC_ASTU #BugBounty
https://medium.com/@h4x0r_dz/vulnerability-in-paypal-worth-200000-bounty-attacker-can-steal-your-balance-by-one-click-2b358c1607cc
#Cyber #CSEC_ASTU #BugBounty
Medium
Vulnerability In PayPal worth 200000$ bounty, Attacker can Steal Your Balance by One-Click
what if I told you that: A black Hat hacker can steal your money from your bank account & credit card or PayPal balance with one click from…
|Cyber
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Today I am gonna introduce you to "
'Sisay Sorsa' is a security researcher and white-hat hacker who has found a critical security flaw on Ethio Telecom servers. He told Cyber Security Intelligence that he accessed the system by writing a python noscript to make a proof of concept and that now he can exploit the entire Ethio Telecom network and has explained that he now will help the company reduce the risks and help them solve the problem.
Click here to read the whole writeup by
cybersecurityintelligence.com/
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Cybersecurityintelligence
Cyber Security Intelligence
#Cyber #CSEC_ASTU #ethio_telecom
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Today I am gonna introduce you to "
SISAY SORSA" one of our member'Sisay Sorsa' is a security researcher and white-hat hacker who has found a critical security flaw on Ethio Telecom servers. He told Cyber Security Intelligence that he accessed the system by writing a python noscript to make a proof of concept and that now he can exploit the entire Ethio Telecom network and has explained that he now will help the company reduce the risks and help them solve the problem.
Click here to read the whole writeup by
cybersecurityintelligence.com/
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Cybersecurityintelligence
Cyber Security Intelligence
#Cyber #CSEC_ASTU #ethio_telecom
👍1
Forwarded from CSEC ASTU (IRIS)
YouTube
CSEC Capacity Building Live Stream Seminar | Evolution Of Industrial Robots
CSEC ASTU | Capacity Building Division | Seminar SIG
Seminar Title: Evolution Of Industrial Robots
Presenter: Dr. BALKESHWAR SINGH
Host: Fikremariam Getu
Editor: - Yonathan Assefa
- Nebiyu Daniel
Organizer: Ruth Retta
Leul…
Seminar Title: Evolution Of Industrial Robots
Presenter: Dr. BALKESHWAR SINGH
Host: Fikremariam Getu
Editor: - Yonathan Assefa
- Nebiyu Daniel
Organizer: Ruth Retta
Leul…
|Cyber
https://portswigger.net/daily-swig/linkedin-bug-bounty-program-goes-public-with-rewards-of-up-to-18k
#Cyber #CSEC_ASTU #hack@linkedIn
https://portswigger.net/daily-swig/linkedin-bug-bounty-program-goes-public-with-rewards-of-up-to-18k
#Cyber #CSEC_ASTU #hack@linkedIn
The Daily Swig | Cybersecurity news and views
LinkedIn bug bounty program goes public with rewards of up to $18k
Social media platform ends private program after paying $250,000 in rewards over eight years
