white2hack 📚 – Telegram
white2hack 📚
13.3K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Стали известны лучшие IT-вузы по уровню зарплат выпускников в 2025 году

Сервис по поиску работы SuperJob опубликовал список вузов России, которые готовят специалистов в IT-сфере, с максимальными зарплатными ожиданиями выпускников 2019–2024 годов. Рейтинг возглавил МФТИ, как и год назад.

#analytics
4
10 Best Cyber Security Jobs in 2025 (Salary Included)

In this article, we’ll explore the current trends in the cyber security industry, the benefits of having a related job, and the best cyber security jobs you can consider in 2024.

Source

#analytics #world
4🤬1
This media is not supported in your browser
VIEW IN TELEGRAM
OWASP Juice Shop Walkthrough All-in-one-PDF, 2025 (upd)

Updated 2025 version

OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools!

Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications!

💥Official page

Early post:
YouTube playlist + PDF (2020)

#web
Please open Telegram to view this post
VIEW IN TELEGRAM
5👍1
juice shop owasp walkthrough.pdf
14.4 MB
OWASP Juice Shop Walkthrough All-in-one-PDF, 2025 (upd)
2
Администрирование Astra Linux (Special Edition), Группа Астра, 2024 (5 дней, 40 ак.часов)

Данный курс предназначен для системных администраторов, которые начинают работать с операционными системами Astra Linux.

В курсе рассматриваются:
локальная установка операционной системы;
работа в терминале и командной строке;
использование различных справочных ресурсов;
работа с файлами и каталогами, поиск и обработка текстовой информации, архивация и сжатие данных, процессы;
управление локальными учетными записями и разграничение прав доступа к ресурсам с использованием дискреционной и мандатной моделей.

😬Официальный сайт
➡️Описание и программа курса

Предыдущие публикации:
Лабы
Обзор механизмов безопасности
Книга, официальное руководство

Дополнительно:
Плейлист на RuTube

#linux
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
😁113💅1🙉1
Linux Fundamentals for beginners

This Linux Fundamentals for Beginners guide is the perfect starting point practical, hands-on, and packed with real terminal examples to get you confident in command-line navigation, file operations, and system management.

#linux #newbie
Linux Fundamentals for beginners.pdf
3 MB
Linux Fundamentals for beginners
Complete SQLMap Database Penetration Testing Guide by Harshit Rajpal & Aarti Singh

This PDF breaks down SQLMap from beginner to advanced level, with real-world examples, commands, and workflows that mirror what you’d do in an actual assessment.

🔹 SQL Injection Detection
– Error-based, Boolean-based, Time-based
– Identifying vulnerable parameters
– Breaking queries to trigger server errors

🔹 Database Enumeration
– Listing DBMS names
– Enumerating databases, tables, columns
– Extracting sensitive data safely

🔹 Data Extraction Techniques
– Dumping specific tables
– Full database dumps
– Hash extraction and format recognition

🔹 SQLMap Targeting Options
– -u for single URL targeting
– Attacking from log files
– Bulk attack using multiple URLs
– Using Google Dorks with SQLMap
– Running SQLMap on intercepted HTTP requests (-r option)

🔹 File System & OS Interaction
– Uploading / downloading files
– Executing system commands
– Out-of-band shells and Meterpreter sessions

#web
1
Complete SQLMap Database Penetration Testing Guide.pdf
2 MB
Complete SQLMap Database Penetration Testing Guide by Harshit Rajpal & Aarti Singh
58 PowerShell Security Functions — Engineered from Real Incident Response Cases

Introducing Windows Security Audit — a full-spectrum defensive toolkit designed for defenders, built from real-world incident data.

Enterprise-Grade Windows Security Auditing & Threat Detection Toolkit

#windows #audit
Introducing WindowsSecurityAudit.pdf
1.2 MB
58 PowerShell Security Functions — Engineered from Real Incident Response Cases
2025 Cybersecurity Attacks Playbook

The document outlines various cybersecurity attack playbooks for 2025, including strategies for AI-enhanced phishing, ransomware campaigns, supply chain compromises, and more. Each section details preparation, detection, analysis, containment, eradication, recovery, and lessons learned for specific attack types. .

🧠 Emerging AI-Driven Threats:
• AI-generated phishing campaigns
• Deepfake social engineering targeting execs
• Adaptive malware that evolves in real time
• Cryptographic threats from quantum computing

🎯 Advanced Persistent Attacks:
• Supply chain infiltrations
• Zero-day exploit response workflows
• Multi-layered ransomware playbooks
• Fileless attacks using LOLBins (living-off-the-land)

🔐 Infrastructure Compromise:
• IoT device exploitation across ecosystems
• Cloud misconfigurations with lateral exposure
• Rogue AP and wireless infiltration
• DNS poisoning and cache manipulation

💾 Application & Data Threats:
• SQL injection with evasion techniques
• Steganographic data exfiltration
• Credential stuffing at scale
• Island hopping via third-party trust relationships

🔧 Every Playbook Includes:

• Asset validation and pre-attack hygiene
• Multi-source detection (SIEM, EDR, NDR)
• IOC extraction and attack mapping
• Containment & eradication workflows
• Post-incident recovery and validation
• Continuous learning integration

#pentest
4