white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Bypassing 403s like a PRO! ($2,100): Broken Access control

This article highlights my way of dealing with 403s and how I managed to get a P1 in minutes!

Source
403 Bypasser Burp extension

#web
👍2🔥2
Facebook bug: A Journey from Code Execution to S3 Data Leak

A Tale of Two Threats: OS Command Injection and Data Leak in Meta’s (formerly Facebook) Careers Platform

Source

#web
🔥2👍1
Forwarded from CyberSecBastion
JWT Attacks (intro , attacks , Real world scenario and Mitigation)

#AppSec
👍4
Forwarded from CyberSecBastion
JWT Attacks_2023.pdf
2 MB
PDF - JWT Attacks (intro , attacks , Real world scenario and Mitigation)
🔥3
Forwarded from CyberSecBastion
Nuclei Vuln Scanner

Fast and customisable vulnerability scanner based on simple YAML based DSL.

Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.

GitHub

#tools
👍4
A Quick Guide to Information Security Standards

#useful
👍3
A Quick Guide to Information Security Standards.pdf
1.6 MB
A Quick Guide to Information Security Standards
👍3
Oh.. My God😄

#fun
😁10🤣32
Azure AD Security Config Analyzer (AADSCA)

We decided to take alternative approach for chapter 6 and we are not covering possible Azure AD attack path. This time, the focus is on on proactive side, how organizations can monitor and strengthen Azure AD's security posture. For this purpose we created 'Azure AD Security Config Analyzer' aka 'AADSCA' solution.

GitHub
Official page

#windows
🔥3👍1
Какой вопрос - такой и ответ :):)

#fun
😁102
Email Incident Response

Email security incidents pose a high risk to a business & organization. The risk includes phishing, business email compromise (BEC) unauthorized access etc. This article describes some unique incident actions for email compromise cases.

Source

#forensic
👍3
TCP vs UDP

#useful
👍3
Hack by HTML

HTML can be used for faking malicious phishing link, bypassing browser history etc. Here is my new article 'Hack by HTML' on it.

Source

#pentest #web
🤔2🔥1
DNS Hacking

DNS has registry, something like Windows OS has registry. When a new website domain is registered, the domain and its IP address is technically written to a DNS zone file. This is the source for mapping domain to IP address (the actual DNS service) which is managed by DNS registry.

For example, when someone registers a domain in NameCheap, NameCheap will register the purchased domain in DNS registry using EPP protocol by exchanging XML messages. It has a security mechanism called 'EPP code' for authorizing the registrar. Even, EPP server communication is done over SSL/TLS (sometimes mTLS). Whois records are also updated this way. EPP maintains a kind of IAM or authorization where registrars can operate on only their controlled domains.

Programming languages like Python can used to communicate with EPP server. So, hackers can exploit EPP server by XXE attack.

Source

#pentest
👍3
SOC Analyst Interview Questions & Answers

#useful #world
👍3