white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Dark Web: A Guide to Dealing with the Dark Spot on the Deep Web, Nick Matthew, 2022

The dark web is a part of the deep web that not only cannot be found via web search engines, but also deliberately wants to be invisible. In order to be able to access the areas of the dark web, special software is required, such as the Tor Browser. The data traffic runs encrypted and via countless, randomly selected computers. This makes it difficult to monitor and trace information about communications.

The general Internet user will find various tips and tricks in step-by-step instructions that show how to get into the dark web and how to be as safe and anonymous as possible.

#book #privacy
👍5🤔1
Dark_Web_A_Guide_to_Dealing_with_the_Dark_Spot_on_the_Deep_Web,.pdf
3 MB
Dark Web: A Guide to Dealing with the Dark Spot on the Deep Web, Nick Matthew, 2022
👍5
Active Directory pen test cheat sheet (Revision #33, march 2023) by BlackWasp

This cheatsheet is built from numerous papers, GitHub repos and GitBook, blogs, HTB boxes and labs, and other resources found on the web or through my experience

Source
Another materials

#windows #pentest
🔥5👍1
Active Directory Exploitation .pdf
361.7 KB
Active Directory pen test cheat sheet (Revision #33, march 2023) by BlackWasp
🔥7👍1🤔1
🤡4🤔3👍1
Elsevier's Dictionary of Information Security in English, German, French and Russian by G. Manoilov, B. Radichkova, 2007

The dictionary will contain terms currently used in the broad fields of electronics data protection and data management in today's interconnected world - the Global Village.

The terminology will cover all aspects of the modern technology's best practices in multiple subfields, namely: physical (hardware and perimeter) security, wired and wireless telecommunication infrastructure security, internet (e-commerce and business-to-business) security, anti-virus and anti-spyware applications, virtual private networking, theory and practices of cryptography, corporate security policies'methodology, design, implementation and enforcement.

#english #book
👍5🙏1
Dictionary_of_Information_Security.pdf
4.2 MB
Elsevier's Dictionary of Information Security in English, German, French and Russian by G. Manoilov, B. Radichkova, 2007
👍5
Организация противодействия малым БПЛА. Методическое пособие, редакция Murmansk01 (v.8), 2023

Данное методическое пособие основано на обобщении и анализе опыта тактической группы «Сурикаты» ОБТФ «Каскад» ДНР. Предназначено для подготовки военнослужащих, мобилизованных, а также для НВП

#book
🤡12👍7😢1
Методичка Антибпла V8 редакция .pdf
1.3 MB
Организация противодействия малым БПЛА. Методическое пособие, редакция Murmansk01 (v.8), 2023
🤡9👍5
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools by Prashant Verma, Akshay Dixi, 2016

This cookbook recipes take you through a wide variety of exploitation techniques across popular mobile platforms. The journey starts with an introduction to basic exploits on mobile platforms and reverse engineering for Android and iOS platforms. Setup and use Android and iOS SDKs and the Pentesting environment. Understand more about basic malware attacks and learn how the malware are coded. Further, perform security testing of Android and iOS applications and audit mobile applications via static and dynamic analysis.

Moving further, you'll get introduced to mobile device forensics. Attack mobile application traffic and overcome SSL, before moving on to penetration testing and exploitation.

The book concludes with the basics of platforms and exploit tricks on BlackBerry and Windows Phone.

#pentest #book #mobile
👍4
Mobile Device Exploitation.pdf
9.1 MB
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools by Prashant Verma, Akshay Dixi, 2016
👍6
IoT Security CheckList (PDF ver)

#docs
👍4
IoT_Security_CheckList.pdf
401.3 KB
IoT Security CheckList (PDF ver)
👍5