white2hack 📚 – Telegram
white2hack 📚
14.6K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Cheating in Online Games. A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games by Erik Wendel, 2012

From being a mere curiosity in the 70’s, computer gaming has become mainstream and grown into being one of the world’s biggest digital entertainment industries. Its popularity has drawn the attention of hackers and exploiters, who quickly put game software security on the agenda. The games of the 90’s and early 00’s were easy to hack, and this effectively ruined online play in some games.

Modern games employ various anti-cheat mechanisms, but different kind of cheats still exist and are being sold through cheater websites. This master thesis seeks to perform an analysis of what kind of cheats exists in the modern gaming market, and what countermeasures are employed.

Also:
DFT article

#reverse #coding
👍31🤔1
Cheating in Online Games.pdf
7.5 MB
Cheating in Online Games. A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games by Erik Wendel, 2012
👏2🤔2
The Ultimate Game Hacking Resource

A curated list of tools, tutorials, and much more for reverse engineering video games! Tutorials, tools, and more as related to reverse engineering video games.

GitHub

#reverse #coding
🔥21👍1
На берегу Яузы уже сейчас строят два новых корпуса Бауманки (МГТУ им. Баймана)

Санкции, провокации, нападки - все не почем для великой России! Технологическое будущее и новые перспективы уже сейчас! Для МГТУ им. Баумана строят ультрасвоременыне кампусы - будущие инженеры, изобретали, первооткрыватели, вас ждут!

Два здания на Госпитальной набережной вмещают 620 жилых блоков, коворкинг, залы самоподготовки и групповых занятий, зоны неформального общения!

Источники: Mos + STR + RIA + BMSTU

#event
🤡27👍13
В апреле 2022 года на фоне обострившегося политического противостояния РФ вышла из болонской системы. Твое мнение - это оправданный шаг, защита русского образования или бездумный поступок и провал РФ на международном рынке?
Anonymous Poll
27%
Все верно сделали, я верю президенту, гнать эту США и ЕС ссаными тряпками
28%
Х#йня полная, сделали только хуже
12%
По х## меня это вообще не волнует, по жизни всего хватает
12%
Я школьник/студент, посмотреть ответ
16%
Не знаю болонскую систему, затрудняюсь ответить
4%
Свой вариант (пиши в чат)
🤡8🤔4👍1🔥1
Windows Privilege Escalation

Understanding Windows Privilege Escalation is crucial for securing systems effectively.

#windows #pentest
👍5👏1
Windows Privilege Escalation_2024.pdf
5 MB
Windows Privilege Escalation
6👍2
Windows API for Red Team 101 by Joas Antonio dos santos, 2024

Using Windows APIs, Red Teams can test the resilience of implemented security solutions against tactics that attempt to disable or bypass these protections.

Teams can create tools that are highly adapted to the target environment and less likely to be detected by conventional security solutions.

#AppSec #coding #pentest
👍4
OpenAI has just open sourced security bots they've built for themselves

Here's what they do:

🛡Incident Response Slackbot - automatically chats with users who have been part of an incident alert.
✍️ SDLC Slackbot - decides if a project merits a security review.
✉️ Triage Slackbot - inbound requests in a Slack channel to different sub-teams within your organization.

GitHub

#AI
🔥5👍1
Hacker Culture by Hadess, 2024

Crawley meticulously examines the multifaceted nature of hacker culture, shedding light on its evolution, key figures, groundbreaking ideas, and revolutionary gadgets.

#fun
🤩32👍1👏1
Hacker Culture.pdf
27.9 MB
Hacker Culture by Hadess, 2024
🔥41
Top 100 Cybersecurity Interview Questions, 2024

Welcome to Your Cybersecurity
Interview!


Hello there!

Welcome to your interview for a cybersecurity position. We're on the lookout for talented individuals passionate about safeguarding our systems from the growing digital threats.

#newbie #job
👍3
Top 100 Cybersecurity Interview Questions.pdf
829.7 KB
Top 100 Cybersecurity Interview Questions, 2024
👍5
OSI Model layers& Common security attacks - for learning cloud and endpoint security

#cisco
👍4👏1
Hacker Culture by Douglas Thomas, 2003

Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals.

Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the public’s anxieties about the information age far more than they do the reality of hacking.

#book #fun #celebrety
3🔥2👍1