w2hack_buddy_2022_PDF.pdf
383.4 KB
🔥16👍3❤2🤔2
Есть мнение что не обязательно выбивать верх вилки или биться за более высокий грейд. Можно просто батрачить одновременно на 2-х или 3-х и даже 4-х работах одновременно и в сумме получать доход больше чем по отдельности. Твое мнение это норм или лажа?
Anonymous Poll
16%
Хороший вариант, волки целы и овцы сыты, удаленка дает такой шанс
49%
Это тяжело, а кому-то вовсе не реально, долго так не продержаться, просядешь по здоровью
19%
Возможно для старта, но в перспективе это не вариант, карьеру так не построишь
5%
Я жадный, мне нужны деньги, я буду батрачить сколько смогу
10%
Я не знаю, затрудняюсь ответить
2%
Свой вариант (чат/комент)
🔥10
Nmap Network Exploration and Security Auditing Cookbook (Third Edition). Network discovery and security scanning at your fingertips by Paulino Calderon, 2022
A complete reference guide to mastering Nmap and its noscripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiasts
#book #pentest
A complete reference guide to mastering Nmap and its noscripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiasts
#book #pentest
👍4
Nmap_Network_Exploration_and_Security_Auditing_Cookbook_Network.pdf
30.2 MB
Nmap Network Exploration and Security Auditing Cookbook (Third Edition). Network discovery and security scanning at your fingertips by Paulino Calderon, 2022
Hacking Kubernete. Threat-Driven Analysis and Defense by Andrew Martin and Michael Hausenblas
This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.
(+) Understand where your Kubernetes system is vulnerable with threat modelling techniques
(+) Focus on pods, from configurations to attacks and defenses
(+) Secure your cluster and workload traffic
(+) Define and enforce policy with RBAC, OPA, and Kyverno
(+) Dive deep into sandboxing and isolation techniques
(+) Learn how to detect and mitigate supply chain attacks
(+) Explore filesystems, volumes, and sensitive information at rest
(+) Discover what can go wrong when running multitenant workloads in a cluster
(+) Learn what you can do if someone breaks in despite you having controls in place
#book #SecDevOps
This book begins with a vanilla Kubernetes installation with built-in defaults. You'll examine an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.
(+) Understand where your Kubernetes system is vulnerable with threat modelling techniques
(+) Focus on pods, from configurations to attacks and defenses
(+) Secure your cluster and workload traffic
(+) Define and enforce policy with RBAC, OPA, and Kyverno
(+) Dive deep into sandboxing and isolation techniques
(+) Learn how to detect and mitigate supply chain attacks
(+) Explore filesystems, volumes, and sensitive information at rest
(+) Discover what can go wrong when running multitenant workloads in a cluster
(+) Learn what you can do if someone breaks in despite you having controls in place
#book #SecDevOps
👍4
Hacking_Kubernetes_Threat_Driven_Analysis_and_Defense_by_Andrew.pdf
18.4 MB
Hacking Kubernete. Threat-Driven Analysis and Defense by Andrew Martin and Michael Hausenblas
ФРИЛАНС НА UPWORK, Yevhenii Zapletin, 2019
Книга с ответами на наиболее популярные вопросы про фриланс на Upwork: Регистрация, заполнение профиля, поиск проектов, написание cover letter, общение с клиентом, репутация (JSS), значки Top Rated и Rising Talent, необходимый уровень английского, fixed-price vs hourly, стратегия увеличения заработка на Upwork.
Доп материалы
https://book.jff.name/
#book #job
Книга с ответами на наиболее популярные вопросы про фриланс на Upwork: Регистрация, заполнение профиля, поиск проектов, написание cover letter, общение с клиентом, репутация (JSS), значки Top Rated и Rising Talent, необходимый уровень английского, fixed-price vs hourly, стратегия увеличения заработка на Upwork.
Доп материалы
https://book.jff.name/
#book #job
👍7🤔1
Zapletin_Frilans_na_Upwork_2018_6f5bb0_433633.fb2
1007.2 KB
ФРИЛАНС НА UPWORK, Yevhenii Zapletin, 2019
👍5
При равных условиях, уровне компенсации и известности бренда компаний - одна из них нанимает к себе в штат, другая же в свой пул который потом будет распределен на внешних клиентов (Out staffing). Куда пойдешь?
Anonymous Poll
43%
Только на штатную должность на конкретного работодателя, без посредников
14%
Аутстафф это хороший вариант посмотреть разные компании, разные индустрии, пощупать куда потом уйти
8%
50/50 при равных условиях с обоих сторон особой разницы нет
9%
Я работаю только на госов! K.G.B. навсегда!
5%
Нужно поробить и на прямого работадателя и на аутстафф
19%
Затрудняюсь ответить
2%
Свой вариант (чат/комент)
👍5
The original pyramid of pain (credit to David Bianco)
This new "Pyramid of attacker pain" focused on:
- Rooting the biggest disruption in the attacker business model (given how much ransomware, extortion, and for-profit models are driving business impact of attacks)
- Mapping in common tools on the market (XDR and SIEM) that can act on these
- Breaking the TTPs by asset types to show which ones are most impactful
- Putting focus on delineation of network detections (e.g. NDR with netflow/connection patterns that offers more promise of discovering anomalies than than deep packet inspection (which relies on access to plaintext traffic and deep protocol knowledge)
- Simplifying the bottom part by grouping the lower value stuff together (hashes, IPs, domain names, URLs) that are easily changed by attackers across technology
- Linking it to a fun analogy of an (evil) caterpillar on the journey to become an (evil) butterfly
This new "Pyramid of attacker pain" focused on:
- Rooting the biggest disruption in the attacker business model (given how much ransomware, extortion, and for-profit models are driving business impact of attacks)
- Mapping in common tools on the market (XDR and SIEM) that can act on these
- Breaking the TTPs by asset types to show which ones are most impactful
- Putting focus on delineation of network detections (e.g. NDR with netflow/connection patterns that offers more promise of discovering anomalies than than deep packet inspection (which relies on access to plaintext traffic and deep protocol knowledge)
- Simplifying the bottom part by grouping the lower value stuff together (hashes, IPs, domain names, URLs) that are easily changed by attackers across technology
- Linking it to a fun analogy of an (evil) caterpillar on the journey to become an (evil) butterfly
👍7
Список рекомендуемых книг для новичков и всех интересующихся темой инфобеза с целью в самых общих словах описать индустрию
Основа
1. "Библия хакера", части 1 - 3, автор Левин Максим
2. "Hacking the Hacker. Learn from the Experts Who Take Down Hackers"
Теория кратко
3. Подготовка к CISSP, Шон Харрис
4. 7 компьютерных технологий
С элементами практики
5. Серия книг "How to Hack Like"
#newbie
Основа
1. "Библия хакера", части 1 - 3, автор Левин Максим
2. "Hacking the Hacker. Learn from the Experts Who Take Down Hackers"
Теория кратко
3. Подготовка к CISSP, Шон Харрис
4. 7 компьютерных технологий
С элементами практики
5. Серия книг "How to Hack Like"
#newbie
👍9❤3🔥2👏1
Advanced Security Testing with Kali Linux Kindle Edition by Daniel Dieterle, 2022
Advanced Security Testing with Kali Linux - the last book in my offensive security with Kali training books. This book picks up where my previous ones left off and dives deeper into more advanced security topics. You will learn about AV bypass, Command & Control (C2) frameworks, Web App pentesting, "Living off the Land", using IoT devices in Security, and much, much more!
#book #pentest #kali
Advanced Security Testing with Kali Linux - the last book in my offensive security with Kali training books. This book picks up where my previous ones left off and dives deeper into more advanced security topics. You will learn about AV bypass, Command & Control (C2) frameworks, Web App pentesting, "Living off the Land", using IoT devices in Security, and much, much more!
#book #pentest #kali
👍8❤2🤩1