white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Warez: The Infrastructure and Aesthetics of Piracy by Martin Paul Eve, 2021

This book is the first scholarly research book about this underground subculture, which began life in the pre-internet era Bulletin Board Systems and moved to internet File Transfer Protocol servers ("topsites") in the mid- to late-1990s. The “Scene,” as it is known, is highly illegal in almost every aspect of its operations.

The term “Warez” itself refers to pirated media, a derivative of “software.” Taking a deep dive in the documentary evidence produced by the Scene itself, Warez describes the operations and infrastructures an underground culture with its own norms and rules of participation, its own forms of sociality, and its own artistic forms.

#book
👍6
warez.pdf
5.7 MB
Warez: The Infrastructure and Aesthetics of Piracy by Martin Paul Eve, 2021
👍1
+ 78% наших выпускников, которые пришли за сменой профессии, трудоустраиваются по выбранной специальности, а 92% из них находят работу в первые шесть месяцев после обучения.

+ медианная зарплата выпускника Практикума на момент опроса — 87 000 рублей. А при переходе на новое место работы после окончания обучения доход вырос на 46 000 рублей и более, 43% — на сумму от 10 000 до 31 000 рублей. У 33% опрошенных заработок остался прежним, у 15% — уменьшился.

+ Техническое образование не слишком влияет на трудоустройство выпускников Практикума: среди тех, кто нашёл новую работу, у 74% не было технического образования. Возраст также не является барьером: 53% выпускников старше 40 лет нашли новую работу.

+ Только 59% студентов проходят обучение до конца и соответственно получают "корочки" и могут потом трудоустраиваться (попадают в статистику)

Источник
https://habr.com/ru/company/yandex_praktikum/blog/649323/

#analytics
Секреты поиска работы и трудоустройства. Сборник консультаций для студентов-выпускников, PDF, 2013

https://esstu.ru/uportal/document/download.htm?documentId=13593

#job
👍2
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Howard E. Poston III, 2022

Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:

+ Reconnaissance, resource development, initial access, and execution
+ Persistence, privilege escalation, defense evasion, and credential access
+ Discovery, lateral movement, collection, and command and control
+ Exfiltration and impact

Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

#book #python
👍9🤩6
Python_for_Cybersecurity_Using_Python_for_Cyber_Offense_and_Defense.epub
10.5 MB
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Howard E. Poston III, 2022
👍6
HackerRank Solution is a tech company that focuses on competitive programming challenges for both consumers and businesses, where developers compete by trying to program according to provided specifications.

HackerRank's programming challenges can be solved in a variety of programming languages (including Java, C++, PHP, Python, SQL, JavaScript) and span multiple computer science domains.

Sources
https://github.com/JayantGoel001/HackerRank

#job #coding #job
👍4
HackerRank-master.zip
204 KB
HackerRank's programming challenges can be solved in a variety of programming languages and span multiple computer science domains.
👍3
windows_privileges.pdf
123.5 KB
Windows Privileges - Windows Privileges

#windows
🔥9
Attacking Active Directory: 0 to 0.9

The purpose of this guide is to view Active Directory from an attacker perspective. I will try to review different aspects of Active Directory and those terms that every pentester should control in order to understand the attacks that can be performed in a Active Directory network.

In order to understand how to attack Active Directory (and any other technology), I think is important to not only know the tools, but how the tools work, what protocols/mechanisms they use, and why these mechanisms/protocols exist.

Sources
https://zer1t0.gitlab.io/posts/attacking_ad/

#pentest #windows
🔥5👍3
D3FEND - A knowledge graph of cybersecurity countermeasures
(v.0.10.0-BETA-2)

https://d3fend.mitre.org/

#useful
👍4
GDPR bullet points

#GDPR
image_2022-02-08_18-00-54.png
1 MB
Kali Linux Top command line

#linux #kali #newbie
👍5
Больше никаких школьников и ВаТи, хати лучше в ТикТок свой

#newbie
🔥11👍1😢1