white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
How HTTPS Works

#web
👍4
Certified Ethical Hacker v 12 Exam Preparation. Sample Questions with Answers, Compiled by Mohammad Alkhudari

#useful
👍2🔥2
Certified Ethical Hacker Exam Preparation_CEH12_PDF.pdf
1.5 MB
Certified Ethical Hacker v 12 Exam Preparation. Sample Questions with Answers, Compiled by Mohammad Alkhudari
👍7
Attacked From Behind Application, Hadess, 2023

Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or
program using software, data, or commands in order to cause unintended or unanticipated
behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability.

These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other applications with Internet accessible open sockets, such as web servers and related services.
Some of the most significant and most dangerous vulnerabilities and the attacks they have enabled have involved using RCE for Exploit Public-Facing Application.

#pentest
🔥3😱1
Attacked From Behind Application.pdf
2.8 MB
Attacked From Behind Application, Hadess, 2023
👍7
Кто помнит игру оригинал из 90-х?

#fun
😁7👍3
50 Linux Command that Cloud Engineers should know

Take your Linux knowledge to the next level with these 50 essential Linux commands

#linux
👍3
50 Linux Command that Cloud Engineers should know.pdf
92.2 KB
50 Linux Command that Cloud Engineers should know
👍4
True or Not?

#fun
🔥25😱1
Potentially a universal technique against anti-tampering mechanisms

#useful
🤔4
Potentially_a_universal_technique_against_anti_tampering_mechanisms.pdf
274.9 KB
Potentially a universal technique against anti-tampering mechanisms
👍4
Guidelines for Digital Forensics First Responders

This guide aims to offer support and advice to Digital Forensic practitioners from law enforcement during the activities of search and seizure for identification and handling of electronic evidence through methods that guarantee their integrity.

#forensic
👍4🔥1
Guidelines for Digital Forensics First Responders.pdf
3.1 MB
Guidelines for Digital Forensics First Responders
👍5