CSEC_Cybersecurity – Telegram
CSEC_Cybersecurity
815 subscribers
237 photos
3 videos
8 files
64 links
CSEC_ASTU Cybersecurity Division.
Download Telegram
burpsuite_pro_v2022.2.4.zip
503.6 MB
|Cyber

password = 311138
"Burp Suite Professional is the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques."

portswigger.net/burp/pro

#Cyber #CSEC_ASTU #Channel
👍2
|Cyber

Check #this Out
these are the TOP 100 tools used by Ethical Hacker for many purposes
Especially for BugBounty

#Cyber #CSEC_ASTU #BugBounty
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources
CSEC_Cybersecurity pinned «|Cyber
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll
»
|Cyber

Click here to access the slide at NahamCon " By Jason Haddix(@jhaddix) The Bug Hunter's Methodology for Application Analysis and Hacking"

⭐️Contents
{
👉🏻 Mental Hurdles
👉🏻 Pre-Manual Testing and Automation
👉🏻 Content Discovery
👉🏻 Application Analysis
}

⭐️Tools Used
{
💥 Webanalyze
💥 Nuclei
💥 FeroxBuster
💥 Wfuzz
💥 Hakrawler etc.....
}
#Cyber #CSEC_ASTU #WebAppHacking
|Cyber
📖📖📖📖📖📖📖📖📖📖📖📖

The Web Application Hacker's Handbook
"This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using
a web browser to communicate with a web server. We examine a wide variety
of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications."

#Cyber #CSEC_ASTU #webSecurity
|Cyber
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html

Today I am gonna introduce you to "SISAY SORSA" one of our member

'Sisay Sorsa' is a security researcher and white-hat hacker who has found a critical security flaw on Ethio Telecom servers. He told Cyber Security Intelligence that he accessed the system by writing a python noscript to make a proof of concept and that now he can exploit the entire Ethio Telecom network and has explained that he now will help the company reduce the risks and help them solve the problem.

Click here to read the whole writeup by
cybersecurityintelligence.com/

https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html

Cybersecurityintelligence
Cyber Security Intelligence

#Cyber #CSEC_ASTU #ethio_telecom
👍1
|Cyber
🥳Csec-CyberSecurity Congratulates you
and we wish you a happy and successful year of work
| CSEC Election 2022
🎖 The New CSEC-ASTU Executive Committee for 2022/23 🎖
President
- Fikremariam Getu 4th Year (CSE)
Vice President
- Abigiya Terefe 4th Year (CSE)
Competitive Programming Division
- Anwar Misbah 4th Year (CSE)
Capacity Building Division
- Abyssinia Negede 4th Year (CSE)
Development Division
- Natnael Kiflu 5th Year (CSE)

#Cyber #CSEC_ASTU
👍2
|Cyber

In this new book, Justin covers a large range of topics that an enterprising young hacker would need to get off the ground. He includes walk­throughs of how to read and write network packets, how to sniff the network, as well as anything you might need for web application auditing and attacking.

#Cyber #CSEC_ASTU #PYTHON_hacking
🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴
|Cyber

INSA(Information Network Security Administration) is trying to hire Graduated students from Our Campus for those who are interested and fulfill the requirement will be interviewed. stay tuned for further notice

#Cyber #CSEC_ASTU #INSA
|Cyber
📖📖📖📖📖📖📖📖📖📖📖📖

Bug Bounty Hunting Essentials


".This book will initially start with introducing you to the concept of Bug Bounty hunting. Then digs deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed."

#Cyber #CSEC_ASTU #webSecurity
👍1