white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
A Quick Guide to Information Security Standards

#useful
👍3
A Quick Guide to Information Security Standards.pdf
1.6 MB
A Quick Guide to Information Security Standards
👍3
Oh.. My God😄

#fun
😁10🤣32
Azure AD Security Config Analyzer (AADSCA)

We decided to take alternative approach for chapter 6 and we are not covering possible Azure AD attack path. This time, the focus is on on proactive side, how organizations can monitor and strengthen Azure AD's security posture. For this purpose we created 'Azure AD Security Config Analyzer' aka 'AADSCA' solution.

GitHub
Official page

#windows
🔥3👍1
Какой вопрос - такой и ответ :):)

#fun
😁102
Email Incident Response

Email security incidents pose a high risk to a business & organization. The risk includes phishing, business email compromise (BEC) unauthorized access etc. This article describes some unique incident actions for email compromise cases.

Source

#forensic
👍3
TCP vs UDP

#useful
👍3
Hack by HTML

HTML can be used for faking malicious phishing link, bypassing browser history etc. Here is my new article 'Hack by HTML' on it.

Source

#pentest #web
🤔2🔥1
DNS Hacking

DNS has registry, something like Windows OS has registry. When a new website domain is registered, the domain and its IP address is technically written to a DNS zone file. This is the source for mapping domain to IP address (the actual DNS service) which is managed by DNS registry.

For example, when someone registers a domain in NameCheap, NameCheap will register the purchased domain in DNS registry using EPP protocol by exchanging XML messages. It has a security mechanism called 'EPP code' for authorizing the registrar. Even, EPP server communication is done over SSL/TLS (sometimes mTLS). Whois records are also updated this way. EPP maintains a kind of IAM or authorization where registrars can operate on only their controlled domains.

Programming languages like Python can used to communicate with EPP server. So, hackers can exploit EPP server by XXE attack.

Source

#pentest
👍3
SOC Analyst Interview Questions & Answers

#useful #world
👍3
SOC Analyst Interview Questions & Answers.pdf
11.9 MB
SOC Analyst Interview Questions & Answers
👍3
DNS Incident Response by Md. Abdullah Al Mamun, 2023

Root Cause Analysis with Detection Ideas

#forensic
👍4
DNS_Incident_Response.pdf
850.9 KB
DNS Incident Response by Md. Abdullah Al Mamun, 2023
👍5
Payloads All The PDFs

A list of crafted malicious PDF files to test the security of PDF readers and tools.

GitHub

#pentest
🔥4
Securing Industrial Control Systems (ICS) and Operational Technology (OT)

👉 𝗔𝘁𝘁𝗮𝗰𝗸𝗶𝗻𝗴 𝗜𝗖𝗦/𝗢𝗧
🌟 Attacking ICS Plant #1 on TryHackMe
http://ow.ly/eC5050NuJ5e

🌟 Attacking ICS Plant #2 on TryHackMe
http://ow.ly/l8M750NuJ5j

🌟 Infrastructure Pentesting Checklist by Purab Parihar
http://ow.ly/7Ml950NuJ5f

🌟 John Hammond Attacking ICS Devices
http://ow.ly/LhMt50NuJ5o

🌟 Nmap and Sbom for ICS by Sulaiman Alhasawi
http://ow.ly/8bh550NuJ5g

🌟 Scada Hacker Library of Resources for Industrial Control System Cyber Security
http://ow.ly/Mh2e50NuJ5i

👉 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴 𝗮𝗻𝗱 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀
🌟 101 Critical Infrastructure Protection for the Public FedVTE
http://ow.ly/irxs50NuJ5l

🌟 Checkout CISA’s calendar for ICS Training
http://ow.ly/CrVc50NuJ5p

🌟 List of free online resources to learn ICS/OT cybersecurity by Irfan Shakeel
http://ow.ly/wwEq50NuIUW

🌟 A guide to your Certification journey in ICS/OT Cybersecurity by Shamikkumar Dave
http://ow.ly/jR2I50NuIV6

#useful
👍41
AvtoGram — онлайн-сервис, который позволяет проверить информацию об автомобиле по его VIN-коду и государственному регистрационному номеру. Есть возможность пополнять внутреннюю базу закидывая фотки авто и зарабатывать на этом деньги.

Источник
TG bot

#OSINT
👍4🤣3🤔1
Security Study Plan

A Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on with free/paid resources, tools and concepts to excel.

GitHub

#education
👍3