white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
The Linux Command HandBook, Flavio Copes, 2023

This Linux Command Handbook will cover 60 core Bash commands you will need as a developer. Each command includes example code and tips for when to use it.

This Linux Command Handbook follows the 80/20 rule: you'll learn 80% of a topic in around 20% of the time you spend studying it.

Source

#linux #book #newbie
👍5
LinHandBook_2023.pdf
14.1 MB
The Linux Command HandBook, Flavio Copes, 2023
👍3
Introduction to Doxing, Hadess, 2023

This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks

#OSINT
👍5
HadessOSINT.pdf
3.7 MB
Introduction to Doxing, Hadess, 2023
👍3
BurpSuite Payload Processing, 2023

Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.

#web
👍4
BurpSuite_Payload_2023.pdf
3.1 MB
BurpSuite Payload Processing, 2023
👍6
DNS Security Guide, Antonio López Padilla, 2023

The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.

The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.

CheckList
Short by Varonis
What is DNS security

#useful
👍3
DNS Security Guide.pdf
3 MB
DNS Security Guide, Antonio López Padilla, 2023
👍31
Atomic Red Team is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

The free and open source Atomic Red Team library of noscripted cyber attacks is growing strong. Quick and easy emulation of over 1300 procedures.

GitHub

#pentest
👍3🔥1
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022

Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team

#docs #architecture
👍2🔥1