white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Introduction to Doxing, Hadess, 2023

This document is about Osint methods for information gathering with example person which made by hadess cybersecurity company. All of these data comes from various origins such as: website, social media and leaks

#OSINT
👍5
HadessOSINT.pdf
3.7 MB
Introduction to Doxing, Hadess, 2023
👍3
BurpSuite Payload Processing, 2023

Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under the Intruder Tab in order to perform fuzzing or a brute force attack. However, you might be aware about how fuzzing is done with the Intruder tab, so let’s explore some of its advanced techniques, such that it could enhance our bug hunting methodologies.

#web
👍4
BurpSuite_Payload_2023.pdf
3.1 MB
BurpSuite Payload Processing, 2023
👍6
DNS Security Guide, Antonio López Padilla, 2023

The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.

The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.

CheckList
Short by Varonis
What is DNS security

#useful
👍3
DNS Security Guide.pdf
3 MB
DNS Security Guide, Antonio López Padilla, 2023
👍31
Atomic Red Team is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

The free and open source Atomic Red Team library of noscripted cyber attacks is growing strong. Quick and easy emulation of over 1300 procedures.

GitHub

#pentest
👍3🔥1
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022

Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team

#docs #architecture
👍2🔥1
Zero Trust Reference Architecture Version 2.0 July 2022.pdf
6.7 MB
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022
👍1
Most Important A- Z Kali Linux Commands

With this article, we cover the complete Kali Linux Commands. Kali Linux is one of the most popularly used operating systems for penetration testing.

Source

#Kali #linux
👍2🤔2
image_2023-04-05_14-00-34.png
901.1 KB
For 30 years from 1987 to 2017, feature-based machine learning models were primarily used for natural language processing tasks, such as sentiment analysis or identifying company names in text. While they were effective for these tasks, they lacked the ability to deeply understand human language.

#useful #AI
👍2