white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Password Cracking with Kali Linux, Daniel W. Dieterle, 2024

This book offers a comprehensive introduction to Windows security fundamentals, arming you with the knowledge and tools for effective ethical hacking. The course begins with a foundational understanding of password security, covering prerequisites, lab setup, and an overview of the journey ahead. You'll explore Kerberoasting, tools like Rubeus, Mimikatz, and various attack methods, providing a solid base for understanding password vulnerabilities.

The course focuses on practical applications of password cracking, including wordlist generation using tools like Crunch and Hashcat, and exploring various attack strategies. You'll delve into John the Ripper and Hashcat functionalities, learning to identify hash types and crack complex passwords efficiently.

#book #kali #pentest
👍4🤡42
Dieterle D. Password Cracking with Kali Linux 2023.pdf
20.5 MB
Password Cracking with Kali Linux, Daniel W. Dieterle, 2024
👍4🔥2🙏2🤡2
Linux Shell Programming (Pocket Primer), Oswald Campesato, 2023

The goal of this book is to introduce readers to an assortment of powerful command line utilities that can be combined to create simple, yet powerful shell noscripts. While all examples and noscripts use the “bash” command set, many of the concepts translate into other forms of shell noscripting (ksh, sh, csh), including the concept of piping data between commands, regular expression substitution and the sed and awk commands.

Aimed at a reader relatively new to working in a bash environment, the book is comprehensive enough to be a good reference and teach a few new tricks to those who already have some experience with creating shell noscripts.

#book #linux #coding
👍4
Linux.Shell.Programming.Pocket_2023.epub
5 MB
Linux Shell Programming (Pocket Primer), Oswald Campesato, 2023
👍3
Python Ethical Hacking from Scratch, Fahad Ali Sarwar, 2021

With this book, you'll understand why Python is one of the fastest-growing programming languages for penetration testing. You'll find out how to harness the power of Python and pentesting to enhance your system security. Developers working with Python will be able to put their knowledge and experience to work with this practical guide.

Complete with step-by-step explanations of essential concepts and practical examples, this book takes a hands-on approach to help you build your own pentesting tools for testing the security level of systems and networks. You'll learn how to develop your own ethical hacking tools using Python and explore hacking techniques to exploit vulnerabilities in networks and systems. Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.

GitHub

#book #python #pentest
👍6🔥1
Python Ethical Hacking from Scratch.pdf
6.8 MB
Python Ethical Hacking from Scratch, Fahad Ali Sarwar, 2021
👍4🔥1
Hacker: Hack The System by Takehiro Kanegi and Alice Schwartz, 2024

Experience firsthand the adrenaline of outsmarting cyber threats through immersive tutorials and real-world scenarios that transform abstract concepts into tangible skills.

'Hacker' is more than a book; it's your initiation into a clandestine community dedicated to safeguarding our digital frontier. Whether you're aspiring to become a cybersecurity expert or simply curious about how digital defenses are constructed and breached, this book offers a comprehensive and engaging journey through the landscape of modern hacking techniques.

But 'Hacker' doesn't stop at education. It challenges you to look beyond the code to the ethical dilemmas and responsibilities that come with power. With great knowledge comes great responsibility, and this book stands as a testament to the ethical hackers who use their skills to protect, not plunder.

#book #python
👍5🔥2
Hacker Hack The System by Takehiro Kanegi and Alice Schwartz.PDF
25.3 MB
Hacker: Hack The System by Takehiro Kanegi and Alice Schwartz, 2024
👍5🔥2
Security Operations activity

#defensive
👍6🔥5
Национальный проект "Кадры" заработает с 2025 года - работа будет у всех! Особенно в области производства и Искусственного интеллекта

(+) Новый национальный проект "Кадры" заработает с 2025 года, сообщила заместитель председателя Правительства РФ Татьяна Голикова.

(+) В перспективе до 2030 года в экономике будет на 2,4 млн рабочих мест больше по сравнению с 2022 годом. Наибольший дефицит кадров испытывают предприятия реального сектора. В течение 2024 года должен быть сформирован прогноз потребности в трудовых ресурсах на ближайшую перспективу.

(+) Реальная заработная плата российских сотрудников за последние шесть лет увеличилась на 30%. Уровень безработицы снизился на 20%
🤡19👍6🤣1
(+) Нацпроект должен создать тесное взаимодействие системы образования, в которую входят школы, колледжи, вузы и предприятия реального сектора экономики. Предприятия должны открыть свои площадки для посещения, чтобы будущие специалисты могли познакомиться с производствами. С 2024 года школы начинают профориентацию с шестого класса. А работодатели примут участие с разработке и реализации учебных планов.

(+) Россия по объему совокупных вычислительных мощностей с использованием искусственного интеллекта (ИИ) входит в десятку стран-лидеров. А общий уровень внедрения искусственного интеллекта в приоритетных направлениях экономики составил 31,5%

(+) Премьер-министр отметил, что за прошлый год отечественный рынок искусственного интеллекта вырос примерно на 18% и почти достиг отметки в 650 млрд рублей.

(+) Ранее президент РФ Владимир Путин заявил, что Россия должна идти впереди технологических изменений, поэтому нужно создавать инфраструктуру для широкого использования искусственного интеллекта

Источник: РГ + ВДНХ + Лидер ИИ

#event
🤡22👍6🤣4
Advanced Software Exploitation by Ptrace Security, 2019 (book only, no video lessons)

In the first half of the course, attendees will use fuzzing, reverse engineering, and source code auditing, to attack a wide variety of applications (e.g. iTunes, Firefox, Vulnserver, etc.) and then use proven exploitation techniques to develop an exploit for one of the VMs (Windows 7, Windows 8.1 and Windows 10).

Then, in the second half of the course, the focus will shift from classic vulnerabilities to more advanced ones. In this section, students will learn how to escape Java sandbox using a type confusion vulnerability, how to circumvent the ASLR without pointer leaks, and how to use precise heap spraying, just to name a few.

By the end of this course, students will know how to find software vulnerabilities using fuzzing, reverse engineering, and source code auditing, and then how to write their own exploits in Python, JavaScript, or Java.

GitHub
About the course
Official page

#education #reverse #coding #python
👍5🤩1
Advanced Software Exploitation.7z
10.8 MB
Advanced Software Exploitation by Ptrace Security, 2019
🔥4👍3
SOC Analyst Interview questions & answers, 2024

#job
👍4
SOC Analyst Interview questions & answers.pdf
467.4 KB
SOC Analyst Interview questions & answers, 2024
👍5🔥2
Hacking Windows, first edition, Kevin Thomas, 2022

On November 20, 1985, Microsoft introduced the Windows operating environment which was nothing more than a graphical operating shell for MS-DOS.

Today we begin our journey into the Win32API. This book will take you step-by-step writing very simple Win32API’s in both x86 and x64 platforms in C and then reversing them both very carefully using the world’s most popular Hey Rays IDA Free tool which is a stripped down version of the IDA Pro tool used in more professional Reverse Engineering environments. Let’s begin...

#book #windows
🔥42👍1
learn hacking window.pdf
4.9 MB
Hacking Windows, first edition, Kevin Thomas, 2022
👍6🔥4
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, Peter H. Gregory, 2018 (published October 14, 2022)

Provides 100% coverage of every objective on the 2022 CISM exam.

The book features learning objectives, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. Special design elements throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference

Extra:
(+) CISSP All-in-One Exam Guide, Ninth Edition 9th Edition by Fernando Maymi, Shon Harris, 2021
(+) Русскоязычная адаптация

#book #management
🔥42
CISM_Cert_Info_Security_Manager_All-in-One_EG_2Ed.pdf
18.4 MB
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, Peter H. Gregory, 2018 (published October 14, 2022)
🔥5👍1