Ребята, у кого будут вопросы, идеи - пишите в комент к посту, обязательно все смотрю, прокомментирую, отвечу что знаю.
🔥8👏1
VT Intelligence Cheat Sheet
Many of you asked for this, and today we are happy to announce the release of our VTI Cheat Sheet with hints and examples on the most useful VT Intelligence queries and modifiers. Instead of providing a list of already documented search modifiers, we created something more specific and close to the real life cases, such as searching for files signed with leaked Nvidia certificates or recent samples from collections attributed to CozyBear.
Source
#forensic #malware
Many of you asked for this, and today we are happy to announce the release of our VTI Cheat Sheet with hints and examples on the most useful VT Intelligence queries and modifiers. Instead of providing a list of already documented search modifiers, we created something more specific and close to the real life cases, such as searching for files signed with leaked Nvidia certificates or recent samples from collections attributed to CozyBear.
Source
#forensic #malware
👍4
Кибердзюцу: кибербезопасность для современных ниндзя, Маккарти Бен, 2022
Кибердзюцу — это практическое руководство по кибербезопасности, в основу которого легли техники, тактики и приемы древних ниндзя.
Специалист по кибервойне Бен Маккарти проанализировал рассекреченные японские трактаты и рассказывает, как методики ниндзя можно применить к сегодняшним проблемам безопасности, например для ведения информационной войны, проникновений, шпионажа и использования уязвимостей нулевого дня.
#book #newbie
Кибердзюцу — это практическое руководство по кибербезопасности, в основу которого легли техники, тактики и приемы древних ниндзя.
Специалист по кибервойне Бен Маккарти проанализировал рассекреченные японские трактаты и рассказывает, как методики ниндзя можно применить к сегодняшним проблемам безопасности, например для ведения информационной войны, проникновений, шпионажа и использования уязвимостей нулевого дня.
#book #newbie
👍6🤣2🤔1
Кибердзюцу_Кибербезопасность_для_современных_ниндзя.pdf
6.9 MB
Кибердзюцу: кибербезопасность для современных ниндзя, Маккарти Бен, 2022
❤5
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data, Vasantha Lakshmi, 2019
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more.
#book #windows
Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more.
#book #windows
👍3
Beginning.Security.with.Microsoft.Technologies.pdf
12.3 MB
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data, Vasantha Lakshmi, 2019
❤2
Python Penetration Testing Essentials (Second Edition), Mohit, 2018
This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.
We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques.
By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
GitHub
#book #pentest #python
This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples.
We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques.
By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks.
GitHub
#book #pentest #python
👍4
Python Penetration Testing Essentials.pdf
8.1 MB
Python Penetration Testing Essentials (Second Edition), Mohit, 2018
👍1
Cyber Crime Investigator’s Field Guide (Third Edition), Bruce Middleton, 2022
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)―all this and more is discussed in Cyber Crime Investigator’s Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment.
#book #forensic
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)―all this and more is discussed in Cyber Crime Investigator’s Field Guide, Third Edition. Many excellent hardware and software products exist to protect our data communications systems, but security threats dictate that they must be all the more enhanced to protect our electronic environment.
#book #forensic
👍4
Cyber Crime Investigator’s Field Guide.pdf
19.9 MB
Cyber Crime Investigator’s Field Guide (Third Edition), Bruce Middleton, 2022
👍1
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization, Sehgal, Kunal
Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid.
What you will learn
(+) Understand blue team operations and its role in safeguarding businesses
(+) Explore everyday blue team functions and tools used by them
(+) Become acquainted with risk assessment and management from a blue team perspective
(+) Discover the making of effective defense strategies and their operations
(+) Find out what makes a good governance program
(+) Become familiar with preventive and detective controls for minimizing risk
#book #defensive
Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid.
What you will learn
(+) Understand blue team operations and its role in safeguarding businesses
(+) Explore everyday blue team functions and tools used by them
(+) Become acquainted with risk assessment and management from a blue team perspective
(+) Discover the making of effective defense strategies and their operations
(+) Find out what makes a good governance program
(+) Become familiar with preventive and detective controls for minimizing risk
#book #defensive
👍5
Blue Team Strategies.epub
3.8 MB
Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization, Sehgal, Kunal
👍1