white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
OpenAI has just open sourced security bots they've built for themselves

Here's what they do:

🛡Incident Response Slackbot - automatically chats with users who have been part of an incident alert.
✍️ SDLC Slackbot - decides if a project merits a security review.
✉️ Triage Slackbot - inbound requests in a Slack channel to different sub-teams within your organization.

GitHub

#AI
🔥5👍1
Hacker Culture by Hadess, 2024

Crawley meticulously examines the multifaceted nature of hacker culture, shedding light on its evolution, key figures, groundbreaking ideas, and revolutionary gadgets.

#fun
🤩32👍1👏1
Hacker Culture.pdf
27.9 MB
Hacker Culture by Hadess, 2024
🔥41
Top 100 Cybersecurity Interview Questions, 2024

Welcome to Your Cybersecurity
Interview!


Hello there!

Welcome to your interview for a cybersecurity position. We're on the lookout for talented individuals passionate about safeguarding our systems from the growing digital threats.

#newbie #job
👍3
Top 100 Cybersecurity Interview Questions.pdf
829.7 KB
Top 100 Cybersecurity Interview Questions, 2024
👍5
OSI Model layers& Common security attacks - for learning cloud and endpoint security

#cisco
👍4👏1
Hacker Culture by Douglas Thomas, 2003

Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals.

Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the public’s anxieties about the information age far more than they do the reality of hacking.

#book #fun #celebrety
3🔥2👍1
Thomas-Douglas-Hacker-Culture.pdf
1.9 MB
Hacker Culture by Douglas Thomas, 2003
3🔥2
Нужна квалифицированная работа? Хочешь более менее значимо заработать? Ищешь шансы реализовать себя? - езжай в Москву. А сколько (минимум) денег на твой расчет нужно чтобы снять норм однушку рядом с метро в адекватным районе в 2024 году?
Anonymous Poll
12%
До 45 000 месяц
21%
До 65 000 месяц
15%
От 75 000 до 85 000
19%
100к оптимально
13%
На семью (3 человека) от 100к месяц
4%
Свой вариант (пиши в чат)
17%
Ну, на х#й все это, буду сидеть у себя
🤡8🤔5😱1
Forwarded from CyberSecBastion
Attacking Kubernetes with security best practices, v.1 (Apr 15, 2024)

Securing Kubernetes begins with a comprehensive understanding of its architecture and potential attack vectors. From ensuring proper authentication and authorization mechanisms to implementing network policies and encryption protocols, a layered approach to defense is indispensable. Moreover, continuous monitoring, timely updates, and adherence to industry standards such as CIS benchmarks are fundamental in maintaining the integrity and resilience of Kubernetes clusters.

By integrating these security measures into the development and operational workflows, organizations can bolster their defenses and thwart potential threats aimed at compromising Kubernetes environments.

#K8s
👍3🔥2
Forwarded from CyberSecBastion
Attacking Kubernetes_2024.pdf
1.9 MB
Attacking Kubernetes with security best practices, v.1 (Apr 15, 2024)
👍4🔥2
Forwarded from CyberSecBastion
Kubenomicon

The Kubenomicon was born of a desire to understand more about Kubernetes from an offensive perspective.

This project was heavily inspired by the Kubernetes Threat Matrix from Microsoft which is a great starting point as it provides a framework to help understand some of the concepts in a MITRE ATTACK style framework. The Microsoft Threat Matrix was explicitly not designed to be a playbook offensive for security professionals and thus it lacks the details necessary to actually exploit (and remediate) each attack in Kubernetes cluster.

Source

Extra
K8s penetration test
HackTricks Cloud
Pentesting CI/CD

#K8s
🔥7
Structure of URL

#web
👍123
What vulns are in this and how would you exploit them?

PHP code

Text your idea on comments of the post

#AppSec
🔥71
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023

Get to grips with application security, secure coding, and DevSecOps practices to implement in your development pipeline

DevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software.

This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.

#book #SecDevOps
👍5
Packt.Implementing.DevSecOps.Practices.pdf
12.2 MB
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence by Vandana Verma Sehgal, 2023
👍5🔥1