white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Cyber Incident Response Plan Templates and Checklists.pdf
1.9 MB
Cyber Incident Response Plan Templates and Checklists, 2023
👍5
Burpsuite for Pentester: Logger++ by HackingArticles

In this article, we’ll learn about a powerful Burp Extension cool tool called “Burp Logger++”. It is like a super detective for websites, always on the lookout for any hidden problems.

🔳 Setting Up & Navigating
🔳Query-Based Filter
🔳Filter Library
🔳Regex-Based Filter
🔳Export Data Feature

#web
👍5
Burpsuite for Pentester_ Logger++.pdf
2.7 MB
Burpsuite for Pentester: Logger++ by HackingArticles
👍4
12+ Ways to Hack Multi-Factor Authentication by Roger Grimes, 2023

This informative guide will help you understand the vulnerabilities of MFA and how to defend against them.

Session hijacking is a hacking method where an unauthorized party takes control of a legitimate user's session after a successful authentication.

🔹The attacker gains control over or copies the access control token to seize the session or manipulate it fraudulently.
🔹Once a session is hijacked, the attacker effectively assumes the identity of the legitimate user for the entire session.
🔹Session hijacking has been a prevalent and persistent form of authentication hacking for many years.
🔹It can be successful even when used against Multi-Factor Authentication (MFA) systems.
🔹Specific methods for session hijacking include:
🔹Session unique identifier prediction
🔹Theft of the session token on the network communication channel
🔹Theft of the session token on the end-point

#web
👍5
12+_Ways_to_Hack_Multi_Factor_Authentication_by_Roger_Grimes,_2023.pdf
7.1 MB
12+ Ways to Hack Multi-Factor Authentication by Roger Grimes, 2023
👍32
Advanced DevOps interview

#Job #world
🔥4👍1
Advanced DevOps interview.pdf
419.4 KB
Advanced DevOps interview
🔥4👍1
Common Interview Question and Answer about API Testing, ver. 1.0

Summary of common interview questions & answers for SDET, Software Quality Engineer, Software Quality Assurance, Software Test Engineer, and Test Engineer Curated by Lamhot Siagian

Хорошие вопросы и ответы для собеса на QA(API)

#job #world
🔥41👍1
Хорошие_вопросы_и_ответы_для_собеса_на_QAAPI.pdf
1.2 MB
Common Interview Question and Answer about API Testing, ver. 1.0
🔥5
The Art Of Infection In MacOS by Hadess, 2023

In this exposition, we shall traverse through the obscure trails of macOS infection techniques, shedding light on the dark artistry that fuels them. We shall unravel the technical tapestry of various infection vectors, exploring the mechanics that underpin them, and the countermeasures that stand guard. As we venture further into the heart of macOS, let us brace ourselves for a journey through a landscape where beauty of design meets the menace of exploitation, where each code executed paints a picture of the eternal struggle between security and infiltration.

Through the lens of cybersecurity, we embark on an expedition to decipher the art of infection in macOS, a narrative enshrined in codes, cloaked in stealth, and driven by a relentless quest for control.

#pentest
👍31
The Art Of Infection In MacOS by Hadess.pdf
3.7 MB
The Art Of Infection In MacOS by Hadess, 2023
👍4
DevOps Interview Questions (RUS)

Сборник вопросов и ответов на собеседования на должность системного администратора, DevOps инженера

GitHub

#job
👍5
Top Event Codes by Hadess, 2023

Red Team Recipe for Fun & Profit.

#pentest
👍4
Top Event Codes by Hadess.pdf
4.6 MB
Top Event Codes by Hadess, 2023
👍5
Security Operations Center by Joseph Muniz, Gary McIntyre, Nadhem AlFardan, Cisco Press, 2016

SOC: Building, Operating & Maintaining your SOC, Impactful Guide By Cisco

In this book, we use a blend of industry experience and best practices of many of our customers to create a guide for those interested in how a SOC should be developed and managed. This book presents the collective view of its three authors (each a consultant at Cisco Systems). We have worked with hundreds of customers, ranging from Fortune 500 companies to large military organizations, giving us a broad and deep understanding about how SOCs are developed and run in the real world. We hope that our research and experience assists you with your existing SOC or with future security operations projects.

#book
👍4