white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Incident response cheat sheet for Win and Lin, 2023

#docs
👍3🔥1
Incident Response Cheatsheet Linux and Windows.pdf
4.4 MB
Incident response cheat sheet for Win and Lin, 2023
👍3
Linux privilege escalation. Writable password file, 2023

"Various techniques to modify the etc/passwd file to create or modify a user with root rights," we'll discover. Once the target has been compromised, it is often required to know "how to edit your own user for privilege escalation on the machine" inside the /etc/passwd file.

#pentest #linux
👍4
Lin_proiv_Escal_WrPWSFile.pdf
2.2 MB
Linux privilege escalation. Writable password file, 2023
👍3
One thing - All thing, 2023

Extract some information from one image with OSINT methods

#OSINT
🤔3
OSINT_Extract_Info.pdf
7.5 MB
One thing - All thing, 2023
😱2👍1
TCP vs. UDP: 7 Differences You Should Know

#newbie
👏4
TCP vs. UDP 7 Differences You Should Know.pdf
801.2 KB
TCP vs. UDP: 7 Differences You Should Know
👍1
Top 10 OSINT Tools

#OSINT
👏5
Types of Cryptography

#crypto
👏6
Githud Dorks for Finding Files

#useful
👍71
Defense Evasion. Hide Artifacts (MiTRE ID:T1564)

An artifact can simply be defined as an important system file, which thus includes documentation, test plans, images, and even some executable modules. Operating systems have a feature to hide these artifacts in order to avoid disrupting user work environments and prevent users from changing files or features on the system.

However, an attacker can abuse these functionalities in order to carry out his evil intents by hiding these artifacts, which thus provides a clear path to evade detection. Let’s try to understand the above statement by taking a simple example. Once the attacker has his payload hidden, he can now carry it out for his malicious intent by tricking the system administrator.

With that said, let’s have a look at the various approaches that the attackers take to evade their presence.

#pentest
👍3
Defe_Evasion_2023.pdf
2.2 MB
Defense Evasion. Hide Artifacts (MiTRE ID:T1564)
👍1
Android Penetration Testing, 2023

Deep Link Exploration

#pentest #mobile
👍4
Anrdoid_Pen_Link_2023.pdf
2.2 MB
Android Penetration Testing, 2023
👍2
How Safe Is Your Password? Infographic by Statista

#useful
🤔4