white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
ChatGPT for CyberSecurity #1.pdf
1.1 MB
ChatGPT for CyberSecurity, part 1
🔥2
Penetration Testing of Computer Networks Using BurpSuite and Various
Penetration Tes􀆟ng Tools
, Dr. Hidaia Mahmood Alassouli, 2022

Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a java application that can be used to secure or crack web applications. The suite consists of different tools, like a proxy server, a web spider an intruder and a so-called repeater, with which requests can be automated. You can use Burp's automated and manual tools to obtain detailed information about your target applications.

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.

#web
🔥3👍1
Alassouli_H_Penetration_Testing_of_Computer_Networks_Using_BurpSuite.pdf
10.1 MB
Penetration Testing of Computer Networks Using BurpSuite and Various
Penetration Tes􀆟ng Tools
, Dr. Hidaia Mahmood Alassouli, 2022
👏3🔥1
Теоретический минимум по Big Data. Всё, что нужно знать о больших данных, Ын Анналин, Су Кеннет, Питер, 2019

Cегодня Big Data — это большой бизнес.
Нашей жизнью управляет информация, и извлечение выгоды из нее становится центральным моментом в работе современных организаций. Неважно, кто вы — деловой человек, работающий с аналитикой, начинающий программист или разработчик, «Теоретический минимум по Big Data» позволит не утонуть в бушующем океане современных технологий и разобраться в основах новой и стремительно развивающейся отрасли обработки больших данных.

Хотите узнать о больших данных и механизмах работы с ними? Каждому алгоритму посвящена отдельная глава, в которой не только объясняются основные принципы работы, но и даются примеры использования в реальных задачах. Большое количество иллюстраций и простые комментарии позволят легко разобраться в самых сложных аспектах Big Data

#book #useful
🔥2👍1
Teoreticheskiy_minimum_po_Big_Data_2019_Annalin_Yn_Kennet_Su.pdf
4.2 MB
Теоретический минимум по Big Data. Всё, что нужно знать о больших данных, Ын Анналин, Су Кеннет, Питер, 2019
👍3
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x, Shiva V. N. Parasram

This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools.

#book #forensic
👍41🔥1
Parasram S. Digital Forensics with Kali Linux 2023.pdf
50.3 MB
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x, Shiva V. N. Parasram
🔥3
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes, Paul Smith, 2023

This is a unique pentesting book, which takes a different approach by helping you gain hands-on experience with equipment that you’ll come across in the field.

You'll start by getting to grips with the basics of industrial processes, and then see how to create and break the process, along with gathering open-source intel to create a threat landscape for your potential customer. As you advance, you'll find out how to install and utilize offensive techniques used by professional hackers.

Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network.

#book #pentest
👍4
Pentesting_Industrial_Control_Systems_An_ethical_hacker's_guide.epub
48.4 MB
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes, Paul Smith, 2023
👏4
101 Labs - CompTIA Security+, İngilizce Baskı Paul W Browning (Eser Sahibi), Mark Drinan (Eser Sahibi)

101 Labs - Book Series Experts agree that we retain only 10% of what we read but 90% of what we do. Perhaps this explains why the global pass rate for most IT exams is a ghastly 40%. This is where the 101 Labs book series can help.

Official page

#book
🔥42
101 Labs – CompTIA Security+.pdf
38.8 MB
101 Labs - CompTIA Security+, İngilizce Baskı Paul W Browning (Eser Sahibi), Mark Drinan (Eser Sahibi)
👍3🔥1
Cybersecurity for Small Networks by Seth Enoka, 2022

This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security—from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity.

The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you’ll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you’ll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security.

#book
👍3
Cybersecurity for Small Networks.epub
9.2 MB
Cybersecurity for Small Networks by Seth Enoka, 2022
3
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing, Hack, Phil J., 2022

Using this knowledge, you are also able to explore further in hacking if you wish to develop your skills and discover additional knowledge into creating your own programs and software.

This guide will help you learn:
(+) The 3 chief categories for installation of Kali Linux
(+) How to Hack a Windows Computer – Step-by-Step Procedure
(+) Why you should never underestimate any Black Hat Hackers
(+) How to get started in Computer Security
(+) The 7 Steps to follow during a Penetration Testing exercise
(+) The most common scanning techniques
(+) Cybersecurity Career Potentials
(+) Step-by-Step Guide to Running and Using Kali Linux
(+) Practical Hacking Tools

Other post

#book #linux
👍4