white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Forwarded from CyberSecBastion
Cloud Security Handbook

#docs
🔥3
Forwarded from CyberSecBastion
Cloud Security Handbook_2023.pdf
312.4 KB
Cloud Security Handbook
👍4
Немного позитива в рабочие будни)

#fun
😁18
Ну, парни, чего выберем? 😄

#fun
🤔9😁1
First things first: Threat Modelling using Free and Open Source Tools by Roger Carhuatocto

On 2014 RSA Conference (archive not available), Eric Olson of Cyveillance said a good and real simil about Threat Modelling: “It is a lot like teenage sex: Everyone is talking about it, everyone thinks everyone else is doing it, and most of the few people who are actually doing it aren’t doing it all that well”.

Source

#useful #DevSecOps
👍4
Quick Start Guide to Penetration Testing (ENG)

Русская версия здесь (вольный перевод)
👍41
Penetration Testing Guide Via Cyber Press.pdf
6.4 MB
Quick Start Guide to Penetration Testing (ENG)
👍5
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom

#docs
👍4
Incident_Response_Playbooks_and_workflows_for_Account_Compromised.pdf
3.9 MB
Incident Response Playbooks and workflows for Account Compromised, Critical, Data Loss, Malware, Phishing, Ransom
👍4
Cyber Security Toolkit for Boards

Resources designed to help board members govern cyber risk more effectively.

#docs
👍3
Cyber Security Toolkit for Boards.pdf
4.6 MB
Cyber Security Toolkit for Boards
👍4
Wi-Fi Credential Dumping, 2023

When the term "password cracking" is used in the cyber world, it is being used as a broad concept as itnshelters all the methods related to attacking/dumping/retrieving passwords of the victim/target. But today, in this post we will solely focus on a technique called "credential dumping.

Credential dumping is said to be a technique through which usernames and passwords are extracted from any login account on the target system. It is this technique that allows an attacker to get credentials for multiple accounts from one person. And these credentials can be for anything, such as a bank, email account, social media account, or wireless network.

#pentest
👍4
Credential Dumping Wireless.pdf
2.3 MB
Wi-Fi Credential Dumping, 2023
👍5
Forwarded from CyberSecBastion
AWS Security Incident Response Guide: AWS Technical Guide

#docs
👍4