white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
DNS Security Guide, Antonio López Padilla, 2023

The aim of this guide is to offer an overview of the DNS service, to describe the principal attacks to which this protocol is subject through inappropriate use being made of it, and to provide guidelines for good practice for application in making it more secure.

The guide is intended for operators and administrators of systems and networks and has the purpose of aiding them in implementing and reinforcing the service.

CheckList
Short by Varonis
What is DNS security

#useful
👍3
DNS Security Guide.pdf
3 MB
DNS Security Guide, Antonio López Padilla, 2023
👍31
Atomic Red Team is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

The free and open source Atomic Red Team library of noscripted cyber attacks is growing strong. Quick and easy emulation of over 1300 procedures.

GitHub

#pentest
👍3🔥1
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022

Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team

#docs #architecture
👍2🔥1
Zero Trust Reference Architecture Version 2.0 July 2022.pdf
6.7 MB
Zero Trust Reference Architecture Version 2.0, Department of Defense (DoD), July 2022
👍1
Most Important A- Z Kali Linux Commands

With this article, we cover the complete Kali Linux Commands. Kali Linux is one of the most popularly used operating systems for penetration testing.

Source

#Kali #linux
👍2🤔2
image_2023-04-05_14-00-34.png
901.1 KB
For 30 years from 1987 to 2017, feature-based machine learning models were primarily used for natural language processing tasks, such as sentiment analysis or identifying company names in text. While they were effective for these tasks, they lacked the ability to deeply understand human language.

#useful #AI
👍2
image_2023-04-05_14-01-17.png
268.5 KB
HOW Does HTTPS Works

#useful
👍1
Free Cyber Security Training Courses you can take now from Infosec:

1. Incident Response (10 courses)
https://lnkd.in/en8Um9WX

2. Digital Forensics Concepts (10 courses)
https://lnkd.in/eWABAfeV

3. Mobile Forensics Fundamentals (4 courses)
https://lnkd.in/eKJTZyyQ

4. Identity and Access Management (9 courses)
https://lnkd.in/eDDMRNuQ

5. CompTIA Linux+ (6 courses)
https://lnkd.in/e4rdTypX

6. Cyber Security Leadership and Management (6 courses)
https://lnkd.in/eyRMKQ6F

7. Enterprise Security Risk Management (21 courses)
https://lnkd.in/e5GdD32X

8. Security Architecture (6 courses)
https://lnkd.in/etWzWnbZ

9. Information Privacy Fundamentals (3 courses)
https://lnkd.in/e69jS3dp

10. ICS/SCADA Security Fundamentals (6 courses)
https://lnkd.in/eN7CancU

#education
🤔4
ChatGPT for CyberSecurity, part 1

#useful
👍3
ChatGPT for CyberSecurity #1.pdf
1.1 MB
ChatGPT for CyberSecurity, part 1
🔥2
Penetration Testing of Computer Networks Using BurpSuite and Various
Penetration Tes􀆟ng Tools
, Dr. Hidaia Mahmood Alassouli, 2022

Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a java application that can be used to secure or crack web applications. The suite consists of different tools, like a proxy server, a web spider an intruder and a so-called repeater, with which requests can be automated. You can use Burp's automated and manual tools to obtain detailed information about your target applications.

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.

#web
🔥3👍1
Alassouli_H_Penetration_Testing_of_Computer_Networks_Using_BurpSuite.pdf
10.1 MB
Penetration Testing of Computer Networks Using BurpSuite and Various
Penetration Tes􀆟ng Tools
, Dr. Hidaia Mahmood Alassouli, 2022
👏3🔥1
Теоретический минимум по Big Data. Всё, что нужно знать о больших данных, Ын Анналин, Су Кеннет, Питер, 2019

Cегодня Big Data — это большой бизнес.
Нашей жизнью управляет информация, и извлечение выгоды из нее становится центральным моментом в работе современных организаций. Неважно, кто вы — деловой человек, работающий с аналитикой, начинающий программист или разработчик, «Теоретический минимум по Big Data» позволит не утонуть в бушующем океане современных технологий и разобраться в основах новой и стремительно развивающейся отрасли обработки больших данных.

Хотите узнать о больших данных и механизмах работы с ними? Каждому алгоритму посвящена отдельная глава, в которой не только объясняются основные принципы работы, но и даются примеры использования в реальных задачах. Большое количество иллюстраций и простые комментарии позволят легко разобраться в самых сложных аспектах Big Data

#book #useful
🔥2👍1