white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
+ 78% наших выпускников, которые пришли за сменой профессии, трудоустраиваются по выбранной специальности, а 92% из них находят работу в первые шесть месяцев после обучения.

+ медианная зарплата выпускника Практикума на момент опроса — 87 000 рублей. А при переходе на новое место работы после окончания обучения доход вырос на 46 000 рублей и более, 43% — на сумму от 10 000 до 31 000 рублей. У 33% опрошенных заработок остался прежним, у 15% — уменьшился.

+ Техническое образование не слишком влияет на трудоустройство выпускников Практикума: среди тех, кто нашёл новую работу, у 74% не было технического образования. Возраст также не является барьером: 53% выпускников старше 40 лет нашли новую работу.

+ Только 59% студентов проходят обучение до конца и соответственно получают "корочки" и могут потом трудоустраиваться (попадают в статистику)

Источник
https://habr.com/ru/company/yandex_praktikum/blog/649323/

#analytics
Секреты поиска работы и трудоустройства. Сборник консультаций для студентов-выпускников, PDF, 2013

https://esstu.ru/uportal/document/download.htm?documentId=13593

#job
👍2
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Howard E. Poston III, 2022

Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:

+ Reconnaissance, resource development, initial access, and execution
+ Persistence, privilege escalation, defense evasion, and credential access
+ Discovery, lateral movement, collection, and command and control
+ Exfiltration and impact

Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.

#book #python
👍9🤩6
Python_for_Cybersecurity_Using_Python_for_Cyber_Offense_and_Defense.epub
10.5 MB
Python for Cybersecurity: Using Python for Cyber Offense and Defense by Howard E. Poston III, 2022
👍6
HackerRank Solution is a tech company that focuses on competitive programming challenges for both consumers and businesses, where developers compete by trying to program according to provided specifications.

HackerRank's programming challenges can be solved in a variety of programming languages (including Java, C++, PHP, Python, SQL, JavaScript) and span multiple computer science domains.

Sources
https://github.com/JayantGoel001/HackerRank

#job #coding #job
👍4
HackerRank-master.zip
204 KB
HackerRank's programming challenges can be solved in a variety of programming languages and span multiple computer science domains.
👍3
windows_privileges.pdf
123.5 KB
Windows Privileges - Windows Privileges

#windows
🔥9
Attacking Active Directory: 0 to 0.9

The purpose of this guide is to view Active Directory from an attacker perspective. I will try to review different aspects of Active Directory and those terms that every pentester should control in order to understand the attacks that can be performed in a Active Directory network.

In order to understand how to attack Active Directory (and any other technology), I think is important to not only know the tools, but how the tools work, what protocols/mechanisms they use, and why these mechanisms/protocols exist.

Sources
https://zer1t0.gitlab.io/posts/attacking_ad/

#pentest #windows
🔥5👍3
D3FEND - A knowledge graph of cybersecurity countermeasures
(v.0.10.0-BETA-2)

https://d3fend.mitre.org/

#useful
👍4
GDPR bullet points

#GDPR
image_2022-02-08_18-00-54.png
1 MB
Kali Linux Top command line

#linux #kali #newbie
👍5
Больше никаких школьников и ВаТи, хати лучше в ТикТок свой

#newbie
🔥11👍1😢1
Offensive Software Exploitation (OSE) Course

Include materials and Labs without software

Sources
https://github.com/temka1603/exploitation-course

#education
👍41🤩1
All learning materials
https://portswigger.net/web-security/all-materials

PortSwigger Web Security Academy Labs
https://github.com/roberson-io/portswigger

Writeup PortSwigger WebSecurity Academy
https://gitlab.com/frankleitner/ctf-writeup/portswigger-websecurity-academy

web-security-academy solutions
https://programmersought.com/tag/web-security-academy/
https://programmersought.com/article/18027930711/

Free Training for Finding Web Security Vulnerabilities
https://gbhackers.com/portswigger-web-security-academy/

Автоматизируем многоходовые атаки в Burp Suite
https://xakep.ru/2021/05/13/burp-stepper-intruder/

#web #education
👍4
PEASS - Privilege Escalation Awesome Scripts SUITE

Sources
https://github.com/temka1603/privilege-escalation-awesome-noscripts-suite

#hacktools
👍4
Data Privacy: A runbook for engineers by Nishant Bhajaria, 2022

Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book’s constant awareness of business requirements will help you balance trade-offs, and ensure your user’s privacy can be improved without spiraling time and resource costs.

#book #privacy
👍3