Безопасность ASP.NET Core, Венц К. ДМК Пресс, 2023
В книге рассматриваются методы защиты веб-приложений ASP.NET Core: безопасное взаимодействие с браузером, распознавание и предотвращение распространенных угроз, развертывание уникальных API безопасности этого фреймворка. Приводятся способы написания безопасного кода и примеры с аннотациями, а также полное описание встроенных инструментов безопасности ASP.NET Core. Обсуждаются реальные нарушения в системе безопасности, включая мошеннические расширения Firefox и кражу паролей в Adobe. В универсальных рекомендациях по обеспечению безопасности учтены уникальные потребности приложений ASP.NET Core.
#book #AppSec
В книге рассматриваются методы защиты веб-приложений ASP.NET Core: безопасное взаимодействие с браузером, распознавание и предотвращение распространенных угроз, развертывание уникальных API безопасности этого фреймворка. Приводятся способы написания безопасного кода и примеры с аннотациями, а также полное описание встроенных инструментов безопасности ASP.NET Core. Обсуждаются реальные нарушения в системе безопасности, включая мошеннические расширения Firefox и кражу паролей в Adobe. В универсальных рекомендациях по обеспечению безопасности учтены уникальные потребности приложений ASP.NET Core.
#book #AppSec
🔥2👍1
Безопасность_ASP_Net_Core_2023_Кристиан_Венц.pdf
35.7 MB
Безопасность ASP.NET Core, Венц К. ДМК Пресс, 2023
🔥3
Social Engineering Attacks: Creating a Fake SMS Message
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
👍5
How does a Combination Lock work_Gif.gif
14.9 MB
UP-SOLVING Combination Lock
I'm gonna explaining how i solved the Combination Lock problem solving
Source
YouTube
#useful #fun
I'm gonna explaining how i solved the Combination Lock problem solving
Source
YouTube
#useful #fun
🔥2🤔1
Bypassing 403s like a PRO! ($2,100): Broken Access control
This article highlights my way of dealing with 403s and how I managed to get a P1 in minutes!
Source
403 Bypasser Burp extension
#web
This article highlights my way of dealing with 403s and how I managed to get a P1 in minutes!
Source
403 Bypasser Burp extension
#web
👍2🔥2
🔥2👍1
Forwarded from CyberSecBastion
👍4
Forwarded from CyberSecBastion
JWT Attacks_2023.pdf
2 MB
PDF - JWT Attacks (intro , attacks , Real world scenario and Mitigation)
🔥3
Forwarded from CyberSecBastion
Nuclei Vuln Scanner
Fast and customisable vulnerability scanner based on simple YAML based DSL.
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.
GitHub
#tools
Fast and customisable vulnerability scanner based on simple YAML based DSL.
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.
GitHub
#tools
👍4
A Quick Guide to Information Security Standards.pdf
1.6 MB
A Quick Guide to Information Security Standards
👍3