Introduction to Doxing, Hadess, 2023
This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks
#OSINT
This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks
#OSINT
👍5
BurpSuite Payload Processing, 2023
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.
#web
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.
#web
👍4
👍5
Nmap for pentesters mini guide_1.pdf
2.5 MB
Nmap for pentesters mini guide, 2023
👍6❤1
DNS Security Guide, Antonio López Padilla, 2023
The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.
The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.
CheckList
Short by Varonis
What is DNS security
#useful
The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.
The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.
CheckList
Short by Varonis
What is DNS security
#useful
👍3
Бирюзовые компании - совместные решения вместо KPI и планов "сверху", коучинг взамен прямого менеджмента, эмпауэрмент вместо приказов и принуждения, самоуправление против диктата акционеров, люди вместо прибыли. Кто работал в таких - скажите мнение
Anonymous Poll
11%
Эволюция, новый виток и правильный путь развития компании, будущее за бирюзой
7%
Этл тупиковый путь, традиционный менеджмент, фин планирование, стандартный HR куда эффективнее
13%
Тема огонь, но в РФ полноценно не реализуется, ждать нечего
16%
50/50 по ситуации, есть куча своих плюсов, но не подходит для всех отраслей и не везде срабатывает
45%
Я из глубинки, не в курсе что за бирюза, у меня тут только сарай, жигули и горсовет
8%
Свой вариант (пиши в чат)
Atomic Red Team is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.
The free and open source Atomic Red Team library of noscripted cyber attacks is growing strong. Quick and easy emulation of over 1300 procedures.
GitHub
#pentest
The free and open source Atomic Red Team library of noscripted cyber attacks is growing strong. Quick and easy emulation of over 1300 procedures.
GitHub
#pentest
👍3🔥1
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022
Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team
#docs #architecture
Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team
#docs #architecture
👍2🔥1
Zero Trust Reference Architecture Version 2.0 July 2022.pdf
6.7 MB
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022
👍1
image_2023-04-05_14-00-34.png
901.1 KB
For 30 years from 1987 to 2017, feature-based machine learning models were primarily used for natural language processing tasks, such as sentiment analysis or identifying company names in text. While they were effective for these tasks, they lacked the ability to deeply understand human language.
#useful #AI
#useful #AI
👍2