white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Live stream started
Live stream finished (40 minutes)
Media is too big
VIEW IN TELEGRAM
Запись стрима w2hack buddy stream, 10 ноября 2022

#info #podcast
15👍5
w2hack_buddy_2022_PDF.pdf
383.4 KB
PDF с ответами на вопросы, которые прозвучали на стриме

#info
🔥16👍32🤔2
Есть мнение что не обязательно выбивать верх вилки или биться за более высокий грейд. Можно просто батрачить одновременно на 2-х или 3-х и даже 4-х работах одновременно и в сумме получать доход больше чем по отдельности. Твое мнение это норм или лажа?
Anonymous Poll
16%
Хороший вариант, волки целы и овцы сыты, удаленка дает такой шанс
49%
Это тяжело, а кому-то вовсе не реально, долго так не продержаться, просядешь по здоровью
19%
Возможно для старта, но в перспективе это не вариант, карьеру так не построишь
5%
Я жадный, мне нужны деньги, я буду батрачить сколько смогу
10%
Я не знаю, затрудняюсь ответить
2%
Свой вариант (чат/комент)
🔥10
Nmap Network Exploration and Security Auditing Cookbook (Third Edition). Network discovery and security scanning at your fingertips by Paulino Calderon, 2022

A complete reference guide to mastering Nmap and its noscripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiasts

#book #pentest
👍4
Nmap_Network_Exploration_and_Security_Auditing_Cookbook_Network.pdf
30.2 MB
Nmap Network Exploration and Security Auditing Cookbook (Third Edition). Network discovery and security scanning at your fingertips by Paulino Calderon, 2022
Hacking Kubernete. Threat-Driven Analysis and Defense by Andrew Martin and Michael Hausenblas

This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.

(+) Understand where your Kubernetes system is vulnerable with threat modelling techniques
(+) Focus on pods, from configurations to attacks and defenses
(+) Secure your cluster and workload traffic
(+) Define and enforce policy with RBAC, OPA, and Kyverno
(+) Dive deep into sandboxing and isolation techniques
(+) Learn how to detect and mitigate supply chain attacks
(+) Explore filesystems, volumes, and sensitive information at rest
(+) Discover what can go wrong when running multitenant workloads in a cluster
(+) Learn what you can do if someone breaks in despite you having controls in place

#book #SecDevOps
👍4
Hacking_Kubernetes_Threat_Driven_Analysis_and_Defense_by_Andrew.pdf
18.4 MB
Hacking Kubernete. Threat-Driven Analysis and Defense by Andrew Martin and Michael Hausenblas
ФРИЛАНС НА UPWORK, Yevhenii Zapletin, 2019

Книга с ответами на наиболее популярные вопросы про фриланс на Upwork: Регистрация, заполнение профиля, поиск проектов, написание cover letter, общение с клиентом, репутация (JSS), значки Top Rated и Rising Talent, необходимый уровень английского, fixed-price vs hourly, стратегия увеличения заработка на Upwork.

Доп материалы
https://book.jff.name/

#book #job
👍7🤔1
Zapletin_Frilans_na_Upwork_2018_6f5bb0_433633.fb2
1007.2 KB
ФРИЛАНС НА UPWORK, Yevhenii Zapletin, 2019
👍5
The original pyramid of pain (credit to David Bianco)

This new "Pyramid of attacker pain" focused on:
- Rooting the biggest disruption in the attacker business model (given how much ransomware, extortion, and for-profit models are driving business impact of attacks)
- Mapping in common tools on the market (XDR and SIEM) that can act on these
- Breaking the TTPs by asset types to show which ones are most impactful
- Putting focus on delineation of network detections (e.g. NDR with netflow/connection patterns that offers more promise of discovering anomalies than than deep packet inspection (which relies on access to plaintext traffic and deep protocol knowledge)
- Simplifying the bottom part by grouping the lower value stuff together (hashes, IPs, domain names, URLs) that are easily changed by attackers across technology
- Linking it to a fun analogy of an (evil) caterpillar on the journey to become an (evil) butterfly
👍7
Список рекомендуемых книг для новичков и всех интересующихся темой инфобеза с целью в самых общих словах описать индустрию

Основа
1. "Библия хакера", части 1 - 3, автор Левин Максим
2. "Hacking the Hacker. Learn from the Experts Who Take Down Hackers"

Теория кратко
3. П
одготовка к CISSP, Шон Харрис
4. 7
компьютерных технологий

С элементами практики
5.
Серия книг "How to Hack Like"

#newbie
👍93🔥2👏1
Advanced Security Testing with Kali Linux Kindle Edition by Daniel Dieterle, 2022

Advanced Security Testing with Kali Linux - the last book in my offensive security with Kali training books. This book picks up where my previous ones left off and dives deeper into more advanced security topics. You will learn about AV bypass, Command & Control (C2) frameworks, Web App pentesting, "Living off the Land", using IoT devices in Security, and much, much more!

#book #pentest #kali
👍82🤩1