white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Activated Directory Notes by Ethical Hackers Academy, 2023

#pentest
🔥3
OSCP NOTES ACTIVE DIRECTORY 1.pdf
2.2 MB
Activated Directory Notes by Ethical Hackers Academy, 2023
🔥5
Heads up! Xdr33, A Variant Of CIA’s HIVE Attack Kit Emerges

Пример того как парсят малварь, копаются под капотом, как описывают поведение в системе и дают рекомендации по детекту и устранению

Source

#malware #useful
👍3
Blockchain Security. A Framework for Trust and Adoption by Nicolas Castellon, CGI Nederland, Peter Cozijnsen, CGI Nederland, Tjerk van Goor, CGI Nederland

#docs
👍2
Blockchain Security A Framework for Trust and Adoption.pdf
4.3 MB
Blockchain Security. A Framework for Trust and Adoption by Nicolas Castellon, CGI Nederland, Peter Cozijnsen, CGI Nederland, Tjerk van Goor, CGI Nederland
👍3
Tshark Guide, 2023

In this article, we will learn about TShark which is a well-known network protocol analyser. It lets us capture the data packets, from the live network. It also allows us, to read or analyse the previously captured data packets of a saved file. Here we will the understand the Statistical Functionalities of TShark and the different ways in which we can sort our traffic capture so that we can analyse it faster and effectively. We will understand the reporting functionalities and some additional tricks that we found while tinkering with TShark.

#docs
🔥5
Thsark_Giude_2023.pdf
5.1 MB
Tshark Guide, 2023
👏4
Yeaaah😄

#fun
9🎉5
Average age a founder started a future European unicorn is 33. Top three schools for European unicorn founders are Oxford, LSE, and Cambridge. 15% don't have a university degree.

Granted this is only a sample of 100 founders, and while the whole unicorn thing is a bit of a nonsensical vanity metric (most unicorns in recent vintages are revenue light, far from profitability, and should have their valuations cut by 50%+), it does give you an idea of the types of European founders who have been able to raise serious capital at high valuations...which in Europe has historically been easier said than done.

Sources 1, 2

#analytics
5
Top 10 Exploited Vulnerabilities

#useful
🤔3
Bypassing Windows Defender (10 Ways)

In this article I will be explaining 10 ways/techniques to bypass a fully updated Windows system with up-to-date Windows Defender intel in order to execute unrestricted code (other than permissions/ACLs, that is).

Source

#pentest
👍4
Incident response cheat sheet for Win and Lin, 2023

#docs
👍3🔥1
Incident Response Cheatsheet Linux and Windows.pdf
4.4 MB
Incident response cheat sheet for Win and Lin, 2023
👍3
Linux privilege escalation. Writable password file, 2023

"Various techniques to modify the etc/passwd file to create or modify a user with root rights," we'll discover. Once the target has been compromised, it is often required to know "how to edit your own user for privilege escalation on the machine" inside the /etc/passwd file.

#pentest #linux
👍4