ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills, Bodungen Clint, 2024
Master ChatGPT and the OpenAI API and harness the power of cutting-edge generative AI and large language models to revolutionize the way you perform penetration testing, threat detection, and risk assessment.
Download via magnet
#book #AI
Master ChatGPT and the OpenAI API and harness the power of cutting-edge generative AI and large language models to revolutionize the way you perform penetration testing, threat detection, and risk assessment.
Download via magnet
#book #AI
🔥7👍2
Памяти Кевина Митника — хакера, ломавшего ФБР, АНБ и Кремниевую долину
16 июля 2023 года в возрасте 59 лет наш мир покинул Кевин Митник — один из самых знаменитых и архетипичных хакеров в истории. В середине 90-х он считался самым разыскиваемым хакером в мире, и было за что: Митник лихо взламывал сети корпораций и правительства США, обходил большинство систем безопасности, прослушивал агентов ФБР, добывал тонны конфиденциальной информации и данных о банковских картах, включая счета топов Кремниевой долины, — вот только денег, как считается, он никогда не воровал. Ну а закрыв проблемы с американским законом, Кевин Митник превратился в одного из лучших специалистов по кибербезопасности.
Вспомним о человеке, на основе которого во многом и сформировался классический образ хакера 90-х годов.
Часть 1, Часть 2, Часть 3, Часть 4, Часть 5, Часть 6
#celebrety
16 июля 2023 года в возрасте 59 лет наш мир покинул Кевин Митник — один из самых знаменитых и архетипичных хакеров в истории. В середине 90-х он считался самым разыскиваемым хакером в мире, и было за что: Митник лихо взламывал сети корпораций и правительства США, обходил большинство систем безопасности, прослушивал агентов ФБР, добывал тонны конфиденциальной информации и данных о банковских картах, включая счета топов Кремниевой долины, — вот только денег, как считается, он никогда не воровал. Ну а закрыв проблемы с американским законом, Кевин Митник превратился в одного из лучших специалистов по кибербезопасности.
Вспомним о человеке, на основе которого во многом и сформировался классический образ хакера 90-х годов.
Часть 1, Часть 2, Часть 3, Часть 4, Часть 5, Часть 6
#celebrety
🫡14❤7👍3😢1
Pwning the Domain: With Credentials - via Hadess, 2024
Welcome to the "Pwning the Domain: With Credentials" series, a comprehensive exploration into the realm of Active Directory (AD) exploitation. In this series, we'll delve deep into the strategies, techniques, and tools utilized by attackers to gain unauthorized access within enterprise environments.
Our journey begins with an examination of Domain Account exploitation, where we'll uncover the vulnerabilities and weaknesses inherent in AD configurations.
#pentest #windows
Welcome to the "Pwning the Domain: With Credentials" series, a comprehensive exploration into the realm of Active Directory (AD) exploitation. In this series, we'll delve deep into the strategies, techniques, and tools utilized by attackers to gain unauthorized access within enterprise environments.
Our journey begins with an examination of Domain Account exploitation, where we'll uncover the vulnerabilities and weaknesses inherent in AD configurations.
#pentest #windows
👍5
Pwning the Domain With Credentials - via Hadess.pdf
4.7 MB
Pwning the Domain: With Credentials - via Hadess, 2024
👍5
Android Software Internals Quick Reference. A Field Manual and Security Reference Guide to Java-based Android Components by James Stevenson, 2021
Use this handy field guide as a quick reference book and cheat sheet for all of the techniques you use or reference day to day. Covering up to Android 11, this Android Java programming reference guide focuses on non-UI elements with a security focus. You won’t see Android UI development, nor will you see low-level C or kernel techniques. Instead, this book focuses on easily digestible, useful, and interesting techniques in Java and the Android system.
This reference guide was created out of the need for myself to jot down all the useful techniques I commonly reached for, and so I’m now sharing these techniques with you, whether you are an Android internals software engineer or security researcher.
#book #modile #defensive
Use this handy field guide as a quick reference book and cheat sheet for all of the techniques you use or reference day to day. Covering up to Android 11, this Android Java programming reference guide focuses on non-UI elements with a security focus. You won’t see Android UI development, nor will you see low-level C or kernel techniques. Instead, this book focuses on easily digestible, useful, and interesting techniques in Java and the Android system.
This reference guide was created out of the need for myself to jot down all the useful techniques I commonly reached for, and so I’m now sharing these techniques with you, whether you are an Android internals software engineer or security researcher.
#book #modile #defensive
👍4
Android_Software_Internals_Quick_Reference_A_Field_Manual_and_Security.pdf
2.4 MB
Android Software Internals Quick Reference. A Field Manual and Security Reference Guide to Java-based Android Components by James Stevenson, 2021
👍3
Forwarded from CyberSecBastion
Attacking Rust by DevSecOpsGuides, 2024
"Attacking Rust" delves into the intricacies of identifying and mitigating security vulnerabilities within Rust codebases. Despite Rust's reputation for strong memory safety and thread concurrency, no programming language is immune to potential exploits.
This article navigates through common attack vectors such as buffer overflows, race conditions, and injection attacks, illustrating how they can manifest within Rust applications. By scrutinizing these vulnerabilities through the lens of realworld examples and discussing best practices for secure coding, developers gain valuable insights into fortifying their Rust projects against potential threats.
#AppSec
"Attacking Rust" delves into the intricacies of identifying and mitigating security vulnerabilities within Rust codebases. Despite Rust's reputation for strong memory safety and thread concurrency, no programming language is immune to potential exploits.
This article navigates through common attack vectors such as buffer overflows, race conditions, and injection attacks, illustrating how they can manifest within Rust applications. By scrutinizing these vulnerabilities through the lens of realworld examples and discussing best practices for secure coding, developers gain valuable insights into fortifying their Rust projects against potential threats.
#AppSec
🔥4👍2
The Ultimate Guide / CheatSheet to Flipper Zero by Ilias Mavropoulos, 2024
Flipper Zero is a small, handheld device that combines the features of various hardware tools into one pocket-sized gadget. It’s built primarily for interacting with digital and radio protocols, physical access systems, and various wireless devices. Flipper Zero is primarily designed for penetration testers, security researchers, and IT professionals, but its intuitive design makes it accessible even for hobbyists and tech enthusiasts
Source
#hardware
Flipper Zero is a small, handheld device that combines the features of various hardware tools into one pocket-sized gadget. It’s built primarily for interacting with digital and radio protocols, physical access systems, and various wireless devices. Flipper Zero is primarily designed for penetration testers, security researchers, and IT professionals, but its intuitive design makes it accessible even for hobbyists and tech enthusiasts
Source
#hardware
👍6
Ultimate_Flipper_Zero_CheatSheet_Hack_&_Secure_InfoSec_Write_ups.pdf
3.6 MB
The Ultimate Guide / CheatSheet to Flipper Zero by Ilias Mavropoulos, 2024
👍7
Психология обмана. Как, почему и зачем лгут даже честные люди, Чарльз В. Форд, 2013
Каждый из нас ежедневно сталкивается с потоком лжи. Лгут не только дети, политики и рекламщики. Нас обманывают коллеги, друзья, партнеры и даже члены семьи. А мы, в свою очередь, обманываем их. Мы учимся врать с детства и хотим постичь искусство обнаружения обмана.
Фундаментальный труд доктора Форда проливает свет на этот феномен, который касается всех сфер нашей жизни, будь то воспитание детей, отношения с любимым человеком, движение по карьерной лестнице или покупка подержанного автомобиля.
#book
Каждый из нас ежедневно сталкивается с потоком лжи. Лгут не только дети, политики и рекламщики. Нас обманывают коллеги, друзья, партнеры и даже члены семьи. А мы, в свою очередь, обманываем их. Мы учимся врать с детства и хотим постичь искусство обнаружения обмана.
Фундаментальный труд доктора Форда проливает свет на этот феномен, который касается всех сфер нашей жизни, будь то воспитание детей, отношения с любимым человеком, движение по карьерной лестнице или покупка подержанного автомобиля.
#book
😁6
Психология_обмана_Как,_почему_и_зачем_лгут_даже_честные_люди.pdf
1.3 MB
Психология обмана. Как, почему и зачем лгут даже честные люди, Чарльз В. Форд, 2013
😁7
VLANs (Virtual Local Area Networks)
In the realm of computer networking, VLANs (Virtual Local Area Networks) play a pivotal role in segmenting a physical network into multiple logical networks. This segmentation enhances security and improves traffic management by isolating broadcast domains at the switch level.
However, this configuration presents a potential security risk when it comes to trunk links—connections that carry traffic from multiple VLANs between switches. If the native VLAN on a trunk link is set to the default (often VLAN 1), it becomes susceptible to VLAN hopping attacks. An attacker can exploit this by using double tagging techniques, especially when tools like Kali Linux, which contain network penetration testing tools, are involved.
#cisco #hardening
In the realm of computer networking, VLANs (Virtual Local Area Networks) play a pivotal role in segmenting a physical network into multiple logical networks. This segmentation enhances security and improves traffic management by isolating broadcast domains at the switch level.
However, this configuration presents a potential security risk when it comes to trunk links—connections that carry traffic from multiple VLANs between switches. If the native VLAN on a trunk link is set to the default (often VLAN 1), it becomes susceptible to VLAN hopping attacks. An attacker can exploit this by using double tagging techniques, especially when tools like Kali Linux, which contain network penetration testing tools, are involved.
#cisco #hardening
🔥2❤1👍1