white2hack 📚 – Telegram
white2hack 📚
12.7K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Всем привет! Небольшой live стрим в w2hack паблике!

Свободно пообщаемся, поделюсь своим мнением о работе в ЕС и зарубежных компаниях, отличие их от российских. Начинаем уже через пару минут! Присоединяйся😉

У кого будут вопросы, идеи - пишите в комент к посту, обязательно все смотрю, прокомментирую, отвечу что знаю.

#info
5👍2
Live stream started
Ребята, у кого будут вопросы, идеи - пишите в комент к посту, обязательно все смотрю, прокомментирую, отвечу что знаю.
🔥8👏1
Live stream finished (1 hour)
VT Intelligence Cheat Sheet

Many of you asked for this, and today we are happy to announce the release of our VTI Cheat Sheet with hints and examples on the most useful VT Intelligence queries and modifiers. Instead of providing a list of already documented search modifiers, we created something more specific and close to the real life cases, such as searching for files signed with leaked Nvidia certificates or recent samples from collections attributed to CozyBear.

Source

#forensic #malware
👍4
VTI Cheatsheet.pdf
946.6 KB
VT Intelligence Cheat Sheet (PDF)
👍1
Кибердзюцу: кибербезопасность для современных ниндзя, Маккарти Бен, 2022

Кибердзюцу — это практическое руководство по кибербезопасности, в основу которого легли техники, тактики и приемы древних ниндзя.

Специалист по кибервойне Бен Маккарти проанализировал рассекреченные японские трактаты и рассказывает, как методики ниндзя можно применить к сегодняшним проблемам безопасности, например для ведения информационной войны, проникновений, шпионажа и использования уязвимостей нулевого дня.

#book #newbie
👍6🤣2🤔1
Кибердзюцу_Кибербезопасность_для_современных_ниндзя.pdf
6.9 MB
Кибердзюцу: кибербезопасность для современных ниндзя, Маккарти Бен, 2022
5
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data, Vasantha Lakshmi, 2019

Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more.

#book #windows
👍3
Beginning.Security.with.Microsoft.Technologies.pdf
12.3 MB
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data, Vasantha Lakshmi, 2019
2
Python Penetration Testing Essentials (Second Edition), Mohit, 2018

This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.

We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques.

By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.

GitHub

#book #pentest #python
👍4
Python Penetration Testing Essentials.pdf
8.1 MB
Python Penetration Testing Essentials (Second Edition), Mohit, 2018
👍1
Cyber Crime Investigator’s Field Guide (Third Edition), Bruce Middleton, 2022

Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)―all this and more is discussed in Cyber Crime Investigator’s Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment.

#book #forensic
👍4
Cyber Crime Investigator’s Field Guide.pdf
19.9 MB
Cyber Crime Investigator’s Field Guide (Third Edition), Bruce Middleton, 2022
👍1
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization, Sehgal, Kunal

Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid.

What you will learn
(+) Understand blue team operations and its role in safeguarding businesses
(+) Explore everyday blue team functions and tools used by them
(+) Become acquainted with risk assessment and management from a blue team perspective
(+) Discover the making of effective defense strategies and their operations
(+) Find out what makes a good governance program
(+) Become familiar with preventive and detective controls for minimizing risk

#book #defensive
👍5