white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Practical Forensic. Analysis of Artifacts on iOS and Android Devices Investigating Complex Mobile Devices by Mohammed Moreb, 2022

You’ll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers.

This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.

#book #forensic #mobile
🔥3👍2
Pract_Forensic_IOS_Android.pdf
20.4 MB
Practical Forensic. Analysis of Artifacts on iOS and Android Devices Investigating Complex Mobile Devices by Mohammed Moreb, 2022
🔥3👍1
Windows User Account Forensics and Windows User Activity Analysis by Lex Program (Baris Dincer), 2024

⛳️ Meduim
⛳️ LinkedIn

#forensic #windows
👍3👀1
Practical Red Teaming: Field-Tested Strategies for Cyber Warfare by Sarang Tumne (Cyber Insane), 2023

This book also caters to a diverse audience within the cybersecurity realm. This includes Red Teamers seeking to sharpen
their skills, CISOs strategizing on organizational cybersecurity, and Application and Network Security Administrators aiming to understand and enhance their defense mechanisms.

It's also an invaluable resource for System Administrators, Auditors, and members of Threat Hunting and SOC Teams who are looking to deepen their understanding of offensive cybersecurity tactics.

#book #pentest
👍7👨‍💻1
Practical_Red_Teaming_Book.pdf
5.6 MB
Practical Red Teaming: Field-Tested Strategies for Cyber Warfare by Sarang Tumne (Cyber Insane), 2023
👍7👨‍💻1
SQL инъекции и тестирование баз данных для начинающих, Mefodiy Kelevra (Udemy), 2024 (2018 leak)

На этом курсе Вы познакомитесь с основами тестирования баз данных на проникновение! Научитесь находить и эксплуатировать уязвимости инъекций SQL! Мы изучим просты инъекции SQL, инъекции слепым методом, методом Time - based а так же encoded based

Научимся использовать sqlmap чтобы автоматизировать тестирование на проникновение!

❗️Официальная страничка

#education #web
👍5🤷‍♂2🔥2
Udemy_Мефодий_Келевра_SQL_инъекции_и_тестирование_баз_данных_для.zip
620.4 MB
SQL инъекции и тестирование баз данных для начинающих, Mefodiy Kelevra (Udemy), 2024
👍6🔥3🤡2🤷‍♂1
Practical Digital Forensics: a Guide for Windows and Linux Users, Akashdeep Bhardwaj, Pradeep Sing, Ajay Prasad, 2024

The book is a comprehensive resource for novice and experienced digital forensics investigators. This guide offers detailed step-by-step instructions, case studies, and real-world examples to help readers conduct investigations on both Windows and Linux operating systems.

It covers essential topics such as configuring a forensic lab, live system analysis, file system and registry analysis, network forensics, and anti-forensic techniques. The book is designed to equip professionals with the skills to extract and analyze digital evidence, all while navigating the complexities of modern cybercrime and digital investigations.

#book #forensic
👍7👨‍💻2
Practical Digital Forensics a Guide for Windows and Linux.epub
21.5 MB
Practical Digital Forensics: a Guide for Windows and Linux Users, Akashdeep Bhardwaj, Pradeep Sing, Ajay Prasad, 2024
👀5👍3
Инструменты атакующих на российскую ИТ инфраструктуру в 2023 – 2024 годах, Семен Рогачев (Бастион), 2024

В статье рассказано какие инструменты сегодня чаще всего используются в кибератаках на российскую Linux- и Windows-инфраструктуру

Источник

#pentest
👍4🔥3👨‍💻1
Как сделать резюме, которое дойдет до работодателя. Фильтры ATS в 2025 году

ATS (Applicant tracking system) — ПО, которое помогает работодателям и рекрутерам искать и отбирать кандидатов на первичном этапе.

По статистике StandOut CV за 2023 год, ATS отклоняет на первом этапе 75% резюме. Компания Oorwin, которая сама предлагает продукты для автоматизации рекрутинга, упоминает такое же количество отказов — 75%. В итоге живой рекрутер видит только каждое четвертое резюме.

В этой статье рассказано, как работают системы ATS и как составить резюме, которое точно попадет в руки реального человека.

❗️Источник
⛳️Предыдущий пост

#job #world
🔥3👍2🤔2
Keycloak - Open Source Identity and Access Management by Santanu Das (Udemy), 2022

This Basic Keycloak Course will provide you a good foundation to leverage Keycloak in your Projects.

Keycloak is an Opensource Identity and Acccess Management tool with a focus on Modern applications such as single-page applications, mobile applications, and REST APIs.

Keycloak builds on Industry standard protocols supporting OAuth 2.0, OpenID Connect, and SAML 2.0. Using industry standard protocols is important from both a security perspective and in terms of making it easier to integrate with existing and new applications.

❗️Official page

#education #defensive #SecDevOps
👍5👨‍💻1
Udemy_Keycloak_Open_Source_Identity_and_Access_Management.rar
1 GB
Keycloak - Open Source Identity and Access Management by Santanu Das (Udemy), 2022
👍4👀2
Advanced Web Penetration Testing Certification, Hack The Box Academy, 2024

HTB Certified Web Exploitation Expert (HTB CWEE) is a highly hands-on certification that assesses candidates' skills in identifying advanced and hard-to-find web vulnerabilities using both black box and white box techniques.

HTB CWEE certification holders will possess technical competency in the web security, web penetration testing, and secure coding domains at an advanced level and be well-versed in the application debugging, source code review, and custom exploit development aspects of web security testing.

They will also be able to professionally conduct web penetration tests against modern and highly secure web applications, as well as report vulnerabilities found in code or arising from logical errors.

❗️Official page

Passwords: @hindsec

#education #web
🔥6🤝21👍1
HTB - CWEE - Certification Learning Path.zip
127.1 MB
Advanced Web Penetration Testing Certification, Hack The Box Academy, 2024
🔥6🤝1
Certified SOC Analyst Certification by EC-Council iClass, 2024

The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team.

Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need.

❗️Official page

#education #defensive
👍4🤝1