white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Burp Suite - Zero to Hero_full_2021.zip
88.2 MB
Обучающий видео курс "Burp Suite: Zero to Hero" by The XSS Rat
👍1
Metasploit 5.0 for Beginners (Second Edition). Perform penetration testing to secure your IT environment against threats and vulnerabilities by Sagar Rahalkar

A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilities

Key Features
+ Perform pentesting in highly secured environments with Metasploit 5.0
+ Become well-versed with the latest features and improvements in the Metasploit Framework 5.0
+ Analyze, find, exploit, and gain access to different systems by bypassing various defenses

Состоялся релиз Metasploit Framework 5.0
https://bit.ly/3dUpDPh

Предыдущий пост с версией 4.11 на русском языке
https://news.1rj.ru/str/w2hack/850

#book #metasploit #pentest
Metasploit 5.0 for Beginners.pdf
17.7 MB
Metasploit 5.0 for Beginners (Second Edition). Perform penetration testing to secure your IT environment against threats and vulnerabilities by Sagar Rahalkar
👍1
Common Windows, Linux and Web Server Systems Hacking Technique by Dr. Hidaia Mahmood Alassouli

This report covers the common techniques and tools used for System, Windows, Linux and Web Server Hacking.

The report contains from the following sections:
+ Part A: Setup Lab:
+ Part B: Trojens and Backdoors and Viruses
+ Part C: System Hacking
+ Part D: Hacking Web Servers
+ Part E: Windows and Linux Hacking

#book #pentest
Common_Windows,_Linux_and_Web_Server_Systems_Hacking_Techniques.pdf
10.1 MB
Common Windows, Linux and Web Server Systems Hacking Technique by Dr. Hidaia Mahmood Alassouli
👍1
Обучающий видео курс "Defeating Anti-Reverse Engineering & Anti-Debugging Techniques" by PLURALSIGHT

◽️ How Anti-analysis Affects Your Analysis
◽️ Detecting and Defeating Anti-reverse Engineering Techniques
◽️ Stopping Anti-debugging Techniques
◽️ Adding Stealth to Your Malware Sandbox

#education #malware #reverse
Defeating_Anti_reverse_Engineering_and_Anti_debugging_Techniques.zip
262.2 MB
Обучающий видео курс "Defeating Anti-Reverse Engineering & Anti-Debugging Techniques" by PLURALSIGHT
👍2😢1
Легендарному фильму "Терминатор 2" минуло в этом году 30 лет! Кто помнит сцену, где Джон Конор со своим другом взламывает ATM с помощью личного16-битного Atari Portfolio, показывая что машины уязвимы, а у них есть "Easy money"

Atari Portfolio — ноутбук Джона Коннора
https://bit.ly/3oZhbED

16 битный Atari Portfolio и Джон Конор
https://bit.ly/3m9622g

Компьютер Конора из "Терминатора"
https://bit.ly/3F4wQYR

Как Джон Коннор взломал банкомат в Терминаторе 2?
https://bit.ly/33oW5ai

[Факты] Кинофильму Терминатор 2: Судный день 30 лет
https://bit.ly/3220bVE

#fun
1
Cashing in on ATM Malware. A Comprehensive Look at Various Attack Types written by David Sancho and Numaan Huq of Trend Micro Forward-Looking Threat Research (FTR) Team, and Massimiliano Michenzi of Europol’s European Cybercrime
Centre (EC3)

ATM malware is one of the digital threats that have been around for a while now, with the discovery of the first known variant dating back to 2009. It should not be a surprise that it has become a mainstay in many cybercriminals’ arsenal because it can, plainly put, steal cold, hard cash.

In this paper, we explore in detail the different known ATM malware families and attack types (physical and network-based) and how attackers operate their way to and around their target infrastructures.

This malware can make an ATM spit out all of its cash on demand
https://bit.ly/3E5duRX
ATM Hacking Methods & Types.pdf
1.8 MB
Cashing in on ATM Malware. A Comprehensive Look at Various Attack Types
👍1
Live stream started
Live stream finished (40 minutes)
Запись live session от 17/12/2021 #2.Переезд

Анонс
https://news.1rj.ru/str/w2hack/1647

#podcast
Серия видео лекций "Информационная безопасность", ведущий Дмитрий Гурин, производство "Первый образовательный канал", телекомпания СГУ ТВ (с)

Бесплатные видео лекции по теоретической части ИБ для новичков. Примечательно что вместо заезженных тем в данной серии затрагиваются вопросы Инженерно-технической ЗИ - утечки информации по различном каналам, ПЭМИН, радиоразведка и РЭБ, силовая электротехника и слаботочка

Плейлист
https://www.youtube.com/playlist?list=PLceCi2zuMVQYTshyoko-aIv5pA7VjUF_q

#education #newbie