burpsuite_pro_v2022.2.4.zip
503.6 MB
|Cyber
password = 311138
"Burp Suite Professional is the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques."
password = 311138
"Burp Suite Professional is the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques."
portswigger.net/burp/pro#Cyber #CSEC_ASTU #Channel
👍2
|Cyber
Check #this Out
these are the TOP 100 tools used by Ethical Hacker for many purposes
Especially for
#Cyber #CSEC_ASTU #BugBounty
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources
Check #this Out
these are the TOP 100 tools used by Ethical Hacker for many purposes
Especially for
BugBounty #Cyber #CSEC_ASTU #BugBounty
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources
|Cyber
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll
Anonymous Poll
63%
Web Security
15%
Cryptography
43%
Network Security
15%
Digital Forensics
35%
Hacking Tool Development
7%
Others(you can specify it on the discussion group)
CSEC_Cybersecurity pinned «|Cyber
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll»
For #statistics
Q. What have you been working on | What field in cyber Security do you want to work on? #Cyber #CSEC_ASTU #poll»
|Cyber
#Learn Ethical hacking on "HackTheBox" and
start Building you Hacker Profile
#Cyber #CSEC_ASTU #ETHICALHACKING
https://www.hackthebox.com/
#Learn Ethical hacking on "HackTheBox" and
start Building you Hacker Profile
#Cyber #CSEC_ASTU #ETHICALHACKING
https://www.hackthebox.com/
Hack The Box
Cyber Mastery: Community Inspired. Enterprise Trusted.
We raise your cyber resilience by transforming technical teams into a mission-ready workforce, so every organization can stay ahead of tomorrow’s threats. Get started now with personal or team plans.
|Cyber
For Motivation
=> Top HackerOne Earner Making Seven Figures
#Cyber #CSEC_ASTU #HACKERONE #MOTIVATION
https://www.hackerone.com/press-release/six-hackers-break-bug-bounty-record-earning-over-1-million-each-hackerone
For Motivation
=> Top HackerOne Earner Making Seven Figures
#Cyber #CSEC_ASTU #HACKERONE #MOTIVATION
https://www.hackerone.com/press-release/six-hackers-break-bug-bounty-record-earning-over-1-million-each-hackerone
HackerOne
Six Hackers Break Bug Bounty Record, Earning Over $1 Million Each on HackerOne | HackerOne
Bounty awards increased 65% on average as a quarter of all vulnerabilities reported are being classified as high to critical severity SAN FRANCISCO-- August 29, 2019 -- HackerOne, the number one hacker-powered pentesting and bug bounty platform, today announced…
|Cyber
Click here to access the slide at NahamCon " By Jason Haddix(@jhaddix) The Bug Hunter's Methodology for Application Analysis and Hacking"
⭐️Contents
{
👉🏻 Mental Hurdles
👉🏻 Pre-Manual Testing and Automation
👉🏻 Content Discovery
👉🏻 Application Analysis
}
⭐️Tools Used
{
💥 Webanalyze
💥 Nuclei
💥 FeroxBuster
💥 Wfuzz
💥 Hakrawler etc.....
}
#Cyber #CSEC_ASTU #WebAppHacking
Click here to access the slide at NahamCon " By Jason Haddix(@jhaddix) The Bug Hunter's Methodology for Application Analysis and Hacking"
⭐️Contents
{
👉🏻 Mental Hurdles
👉🏻 Pre-Manual Testing and Automation
👉🏻 Content Discovery
👉🏻 Application Analysis
}
⭐️Tools Used
{
💥 Webanalyze
💥 Nuclei
💥 FeroxBuster
💥 Wfuzz
💥 Hakrawler etc.....
}
#Cyber #CSEC_ASTU #WebAppHacking
|Cyber
📖📖📖📖📖📖📖📖📖📖📖📖
The Web Application Hacker's Handbook
"This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using
a web browser to communicate with a web server. We examine a wide variety
of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications."
#Cyber #CSEC_ASTU #webSecurity
📖📖📖📖📖📖📖📖📖📖📖📖
The Web Application Hacker's Handbook
"This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using
a web browser to communicate with a web server. We examine a wide variety
of different technologies, such as databases, file systems, and web services, but only in the context in which these are employed by web applications."
#Cyber #CSEC_ASTU #webSecurity
|Cyber
https://medium.com/@h4x0r_dz/vulnerability-in-paypal-worth-200000-bounty-attacker-can-steal-your-balance-by-one-click-2b358c1607cc
#Cyber #CSEC_ASTU #BugBounty
https://medium.com/@h4x0r_dz/vulnerability-in-paypal-worth-200000-bounty-attacker-can-steal-your-balance-by-one-click-2b358c1607cc
#Cyber #CSEC_ASTU #BugBounty
Medium
Vulnerability In PayPal worth 200000$ bounty, Attacker can Steal Your Balance by One-Click
what if I told you that: A black Hat hacker can steal your money from your bank account & credit card or PayPal balance with one click from…
|Cyber
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Today I am gonna introduce you to "
'Sisay Sorsa' is a security researcher and white-hat hacker who has found a critical security flaw on Ethio Telecom servers. He told Cyber Security Intelligence that he accessed the system by writing a python noscript to make a proof of concept and that now he can exploit the entire Ethio Telecom network and has explained that he now will help the company reduce the risks and help them solve the problem.
Click here to read the whole writeup by
cybersecurityintelligence.com/
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Cybersecurityintelligence
Cyber Security Intelligence
#Cyber #CSEC_ASTU #ethio_telecom
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Today I am gonna introduce you to "
SISAY SORSA" one of our member'Sisay Sorsa' is a security researcher and white-hat hacker who has found a critical security flaw on Ethio Telecom servers. He told Cyber Security Intelligence that he accessed the system by writing a python noscript to make a proof of concept and that now he can exploit the entire Ethio Telecom network and has explained that he now will help the company reduce the risks and help them solve the problem.
Click here to read the whole writeup by
cybersecurityintelligence.com/
https://www.cybersecurityintelligence.com/blog/ethiopian-telecoms-system-has-critical-security-flaws-5364.html
Cybersecurityintelligence
Cyber Security Intelligence
#Cyber #CSEC_ASTU #ethio_telecom
👍1
Forwarded from CSEC ASTU (IRIS)
YouTube
CSEC Capacity Building Live Stream Seminar | Evolution Of Industrial Robots
CSEC ASTU | Capacity Building Division | Seminar SIG
Seminar Title: Evolution Of Industrial Robots
Presenter: Dr. BALKESHWAR SINGH
Host: Fikremariam Getu
Editor: - Yonathan Assefa
- Nebiyu Daniel
Organizer: Ruth Retta
Leul…
Seminar Title: Evolution Of Industrial Robots
Presenter: Dr. BALKESHWAR SINGH
Host: Fikremariam Getu
Editor: - Yonathan Assefa
- Nebiyu Daniel
Organizer: Ruth Retta
Leul…
|Cyber
https://portswigger.net/daily-swig/linkedin-bug-bounty-program-goes-public-with-rewards-of-up-to-18k
#Cyber #CSEC_ASTU #hack@linkedIn
https://portswigger.net/daily-swig/linkedin-bug-bounty-program-goes-public-with-rewards-of-up-to-18k
#Cyber #CSEC_ASTU #hack@linkedIn
The Daily Swig | Cybersecurity news and views
LinkedIn bug bounty program goes public with rewards of up to $18k
Social media platform ends private program after paying $250,000 in rewards over eight years
|Cyber
🥳Csec-CyberSecurity Congratulates you
and we wish you a happy and successful year of work
| CSEC Election 2022
🎖 The New CSEC-ASTU Executive Committee for 2022/23 🎖
🥳Csec-CyberSecurity Congratulates you
and we wish you a happy and successful year of work
| CSEC Election 2022
🎖 The New CSEC-ASTU Executive Committee for 2022/23 🎖
President
- Fikremariam Getu 4th Year (CSE)
Vice President
- Abigiya Terefe 4th Year (CSE)
Competitive Programming Division
- Anwar Misbah 4th Year (CSE)
Capacity Building Division
- Abyssinia Negede 4th Year (CSE)
Development Division
- Natnael Kiflu 5th Year (CSE)
#Cyber #CSEC_ASTU👍2
|Cyber
In this new book, Justin covers a large range of topics that an enterprising young hacker would need to get off the ground. He includes walkthroughs of how to read and write network packets, how to sniff the network, as well as anything you might need for web application auditing and attacking.
#Cyber #CSEC_ASTU #PYTHON_hacking
In this new book, Justin covers a large range of topics that an enterprising young hacker would need to get off the ground. He includes walkthroughs of how to read and write network packets, how to sniff the network, as well as anything you might need for web application auditing and attacking.
#Cyber #CSEC_ASTU #PYTHON_hacking
🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴🔴
|Cyber
INSA(Information Network Security Administration) is trying to hire Graduated students from Our Campus for those who are interested and fulfill the requirement will be interviewed. stay tuned for further notice
#Cyber #CSEC_ASTU #INSA
|Cyber
INSA(Information Network Security Administration) is trying to hire Graduated students from Our Campus for those who are interested and fulfill the requirement will be interviewed. stay tuned for further notice
#Cyber #CSEC_ASTU #INSA
|Cyber
📖📖📖📖📖📖📖📖📖📖📖📖
Bug Bounty Hunting Essentials
".This book will initially start with introducing you to the concept of Bug Bounty hunting. Then digs deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed."
#Cyber #CSEC_ASTU #webSecurity
📖📖📖📖📖📖📖📖📖📖📖📖
Bug Bounty Hunting Essentials
".This book will initially start with introducing you to the concept of Bug Bounty hunting. Then digs deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed."
#Cyber #CSEC_ASTU #webSecurity
👍1