گر ایمیلهای هک شده درگاه خدمات الکترونیک رو به هر دلیلی نتونستین دانلود و بررسی کنید، از طریق این دو سایت که توسط افراد ناشناسی ساخته شدن، میتونید به راحتی به صورت انلاین در بین اونها بگردین و محتوای اونهارو بررسی کنید:
🔶 filterchi.info
🔶 tehran.io/internet.ir/
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔶 filterchi.info
🔶 tehran.io/internet.ir/
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3🔥3
Here are 30 cybersecurity search engines:
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#Interview #Cybersecurity
What Does a Cybersecurity Analyst Do?
Cybersecurity analysts strive to preserve the integrity of sensitive data by defending infrastructure and systems from cyberattacks. To protect these assets, cybersecurity analysts evaluate system vulnerabilities through diagnostic testing and traffic monitoring. Based on the results of these assessments, cybersecurity analysts design and implement risk management strategies. Cybersecurity analysts also respond to cyber attacks, conduct forensic analysis of previous cyber incidents, and work to ensure organizational compliance with relevant security standards and protocols.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
What Does a Cybersecurity Analyst Do?
Cybersecurity analysts strive to preserve the integrity of sensitive data by defending infrastructure and systems from cyberattacks. To protect these assets, cybersecurity analysts evaluate system vulnerabilities through diagnostic testing and traffic monitoring. Based on the results of these assessments, cybersecurity analysts design and implement risk management strategies. Cybersecurity analysts also respond to cyber attacks, conduct forensic analysis of previous cyber incidents, and work to ensure organizational compliance with relevant security standards and protocols.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3
#Interview #Cybersecurity
🔸What Is the Difference Between a Threat, a Vulnerability, and a Risk?
You should expect a follow-up question asking which of the three to focus more on. A simple way to put it: In cybersecurity, risk is the potential for loss, damage or destruction of assets or data. Threat is a negative event, such as the exploit of a vulnerability. And a vulnerability is a weakness that exposes you to threats, and therefore increases the likelihood of a negative event.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸What Is the Difference Between a Threat, a Vulnerability, and a Risk?
You should expect a follow-up question asking which of the three to focus more on. A simple way to put it: In cybersecurity, risk is the potential for loss, damage or destruction of assets or data. Threat is a negative event, such as the exploit of a vulnerability. And a vulnerability is a weakness that exposes you to threats, and therefore increases the likelihood of a negative event.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔸What Is Cryptography?
Cryptography is a secure communication technique that prevents parties outside of the sender and intended recipient from accessing the contents of a confidential transmission. The process of cryptography uses an algorithm to convert plaintext input into an encrypted ciphertext output. The message can be converted back into readable plaintext by authorized recipients who possess the necessary key.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸What Is Cryptography?
Cryptography is a secure communication technique that prevents parties outside of the sender and intended recipient from accessing the contents of a confidential transmission. The process of cryptography uses an algorithm to convert plaintext input into an encrypted ciphertext output. The message can be converted back into readable plaintext by authorized recipients who possess the necessary key.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3
🔰Top 10 Emerging Cyber Security Threats for 2030
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Forwarded from InfoSecTube
💢 آموزش متخصص متاسپلویت💢
📌قسمت 1 - مقدمهای بر آزمایش نفوذپذیری و دوره متاسپلویت
https://youtu.be/RuNl5Jse_do
📌 قسمت 2 - مفاهیم پایه نفوذگری و امنیت
https://youtu.be/1THQGHG7GZ0
📌قسمت 3- مفاهیم نفوذگری و امنیت
https://youtu.be/MTcwPdUl0Qw
📌قسمت 4- مفاهیم نفوذگری و امنیت
https://youtu.be/TNqdSoUmzeM
📌 قسمت 5- فازهای آزمایش نفوذپذیری بخش اول
https://youtu.be/ZjErNLtvADc
📌قسمت 6- فازهای آزمایش نفوذپذیری جمعآوری اطلاعات از هدف
https://youtu.be/wWuDnAk5qDM
📌قسمت 7- فازهای آزمایش نفوذپذیری توسعه اکسپلویت و پس از نفوذ
https://youtu.be/PgJ3ib5zvcA
📌قسمت 8 -فازهای آزمایش نفوذپذیری کشف آسیبپذیری و فازینگ
https://youtu.be/_EfXJCTPQTI
📌قسمت 9 - فازهای آزمایش نفوذپذیری ابزارهای آزمایش نفوذپذیری
https://youtu.be/YRWzZr8QRLM
📌قسمت 10- مباحث پایه اکسپلویتینگ مفاهیم پویشگری شبکه
https://youtu.be/QWg-mrSe0O8
🔉@infosectube
📌youtube channel
☣️instagram pageا
📌قسمت 1 - مقدمهای بر آزمایش نفوذپذیری و دوره متاسپلویت
https://youtu.be/RuNl5Jse_do
📌 قسمت 2 - مفاهیم پایه نفوذگری و امنیت
https://youtu.be/1THQGHG7GZ0
📌قسمت 3- مفاهیم نفوذگری و امنیت
https://youtu.be/MTcwPdUl0Qw
📌قسمت 4- مفاهیم نفوذگری و امنیت
https://youtu.be/TNqdSoUmzeM
📌 قسمت 5- فازهای آزمایش نفوذپذیری بخش اول
https://youtu.be/ZjErNLtvADc
📌قسمت 6- فازهای آزمایش نفوذپذیری جمعآوری اطلاعات از هدف
https://youtu.be/wWuDnAk5qDM
📌قسمت 7- فازهای آزمایش نفوذپذیری توسعه اکسپلویت و پس از نفوذ
https://youtu.be/PgJ3ib5zvcA
📌قسمت 8 -فازهای آزمایش نفوذپذیری کشف آسیبپذیری و فازینگ
https://youtu.be/_EfXJCTPQTI
📌قسمت 9 - فازهای آزمایش نفوذپذیری ابزارهای آزمایش نفوذپذیری
https://youtu.be/YRWzZr8QRLM
📌قسمت 10- مباحث پایه اکسپلویتینگ مفاهیم پویشگری شبکه
https://youtu.be/QWg-mrSe0O8
🔉@infosectube
📌youtube channel
☣️instagram pageا
YouTube
قسمت 1 - مقدمهای بر آزمایش نفوذپذیری و دوره متاسپلویت
دوره آزمایش نفوذپذیری با متاسپلویت (فارسی)
قسمت اول: مقدمه به آزمایش نفوذپذیری
مدرس: میلاد کهساری الهادی
وبلاگ: aiooo.ir
●▬▬▬۩❁ @InfoSecTube ❁۩ ▬▬▬▬●
Telegram Channel:
youtube.com/c/infosectube
https://t.iss.one/InfoSecTube
https://www.instagram.com/info_sec_tube
قسمت اول: مقدمه به آزمایش نفوذپذیری
مدرس: میلاد کهساری الهادی
وبلاگ: aiooo.ir
●▬▬▬۩❁ @InfoSecTube ❁۩ ▬▬▬▬●
Telegram Channel:
youtube.com/c/infosectube
https://t.iss.one/InfoSecTube
https://www.instagram.com/info_sec_tube
👍1
🔰 ISO/IEC 27005:2022
Information security, cybersecurity and privacy protection - Guidance on managing information security risks
🔉@infosectube
📌youtube channel
☣️instagram pageا
Information security, cybersecurity and privacy protection - Guidance on managing information security risks
🔉@infosectube
📌youtube channel
☣️instagram pageا
ISO 27005-2022.pdf
16.7 MB
🔰 ISO/IEC 27005:2022
Information security, cybersecurity and privacy protection - Guidance on managing information security risks
🔉@infosectube
📌youtube channel
☣️instagram pageا
Information security, cybersecurity and privacy protection - Guidance on managing information security risks
🔉@infosectube
📌youtube channel
☣️instagram pageا
#Interview #Cybersecurity
🔸What Is a Firewall? How Do You Set It Up?
A firewall is a hardware or software network security device that monitors inbound and outbound network traffic. Firewalls, which block the flow of traffic flagged as suspicious or malicious, are considered the first line of defense in the field of network security.
To configure a firewall, you’ll need to:
🔸Secure the firewall. Only authorized administrators should have access.
🔸Designate firewall zones. Evaluate assets of values and group them together according to function and sensitivity. Create a corresponding IP address schema.
🔸Build access control lists. These rules dictate which traffic is permitted to flow in and out of different zones.
🔸Configure related firewall services and logging. Set up your firewall to report to your logging server and disable any services you don’t plan to use.
🔸Test. Use vulnerability assessments to check that the firewall is behaving according to the parameters of your access control lists.
Firewalls analyze network traffic according to pre-configured security rules and only accept inbound connections that follow these rules. Incoming data packets that do not adhere to these rules will be blocked by the firewall, which operates like a guard at the computer’s port—the function is analogous to a bouncer checking IDs at a nightclub entrance. If your firewall is functioning properly, only trusted IP addresses are granted access.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸What Is a Firewall? How Do You Set It Up?
A firewall is a hardware or software network security device that monitors inbound and outbound network traffic. Firewalls, which block the flow of traffic flagged as suspicious or malicious, are considered the first line of defense in the field of network security.
To configure a firewall, you’ll need to:
🔸Secure the firewall. Only authorized administrators should have access.
🔸Designate firewall zones. Evaluate assets of values and group them together according to function and sensitivity. Create a corresponding IP address schema.
🔸Build access control lists. These rules dictate which traffic is permitted to flow in and out of different zones.
🔸Configure related firewall services and logging. Set up your firewall to report to your logging server and disable any services you don’t plan to use.
🔸Test. Use vulnerability assessments to check that the firewall is behaving according to the parameters of your access control lists.
Firewalls analyze network traffic according to pre-configured security rules and only accept inbound connections that follow these rules. Incoming data packets that do not adhere to these rules will be blocked by the firewall, which operates like a guard at the computer’s port—the function is analogous to a bouncer checking IDs at a nightclub entrance. If your firewall is functioning properly, only trusted IP addresses are granted access.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
🔹کتابخونه Embetter بهتون اجازه میده که به راحتی از تصاویر یا متن به کمک ترنسفورمر یا مدلهای زبانی فیچر استخراج کنید و با مدلهای ساده مثل logistic regression توی scikit-learn پایپلاین بسازید تو چند خط کد!
این کمک میکنه که خیلی سریع عمکرد همه مدلهای عمیق رو برای تهیه baseline بتونید حساب کنید.
برای نصبش فقط کافیه این خط رو اجرا کنید:
python -m pip install embetter
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
این کمک میکنه که خیلی سریع عمکرد همه مدلهای عمیق رو برای تهیه baseline بتونید حساب کنید.
برای نصبش فقط کافیه این خط رو اجرا کنید:
python -m pip install embetter
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#Interview #Cybersecurity
What Is Shoulder Surfing?
Should surfing is a method of data theft by which a bad actor over the shoulder of a target in order to steal confidential information like passwords and PIN numbers that can later be used to initiate a cyberattack. Like phishing, shoulder surfing is a social engineering technique—meaning it belongs to a class of information security attacks that rely on psychological manipulation to extract confidential information or influence victims to perform actions counter to their best interests.
این نوع حمله یکی از ساده ترین نوع حملات است که در آن مهاجم پشت سر یا پشت شانه های هدفش قرار می گیرد و از بالا یا کنار دست آن در هنگامیکه طعمه مشغول وارد کردن پسورد خودش است یواشکی نگاه می کند و متوجه رمز عبور کاربر می شود.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
Acu_15.1_Crack.7z
6.6 MB
💎Acunetix Version 15 build 15.1.221109177 for Windows and Linux – 10 Nov 2022
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
InfoSecTube
🔹کتابخونه Embetter بهتون اجازه میده که به راحتی از تصاویر یا متن به کمک ترنسفورمر یا مدلهای زبانی فیچر استخراج کنید و با مدلهای ساده مثل logistic regression توی scikit-learn پایپلاین بسازید تو چند خط کد! این کمک میکنه که خیلی سریع عمکرد همه مدلهای عمیق…
با توجه با اینکه امنیت داره به سمت استفاده از هوش مصنوعی و ماشین لرنینگ میره(رفته!) آیا به گذاشتن مطالب مرتبط با هوش مصنوعی در کانال موافقین یا خیر؟
Final Results
85%
بله حتما
15%
خیر اصلا!
#Interview #Cybersecurity
🔸What Do You Mean by XSS?
Cross-site scripting (XSS) is a type of cyberattack that injects malicious scripts into legitimate websites. XSS attacks use web applications to send these fragments of code—typically as browser-side scripts—to oblivious end users whose browsers execute the malicious script because it appears to originate from a trusted source.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸What Do You Mean by XSS?
Cross-site scripting (XSS) is a type of cyberattack that injects malicious scripts into legitimate websites. XSS attacks use web applications to send these fragments of code—typically as browser-side scripts—to oblivious end users whose browsers execute the malicious script because it appears to originate from a trusted source.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍4
💎دوست داری بدونی اینترنت ایران چجوری کار میکنه و چطوری دارن فیلترش میکنند؟ برای رسیدن با جواب مطالب زیر رو با دقت دنبال کنید.
پ.ن: بعضی توضیحات به دلیل قابل فهم بودن برای همگان گفته نشده است.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
پ.ن: بعضی توضیحات به دلیل قابل فهم بودن برای همگان گفته نشده است.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
InfoSecTube
💎دوست داری بدونی اینترنت ایران چجوری کار میکنه و چطوری دارن فیلترش میکنند؟ برای رسیدن با جواب مطالب زیر رو با دقت دنبال کنید. پ.ن: بعضی توضیحات به دلیل قابل فهم بودن برای همگان گفته نشده است. 🔝 @InfoSecTube 🖥 youtube 🍁 instagram.com/info_sec_tube
تا اینجا نحوه اتصال به اینترنت (ثابت و همراه) رو مشاهده می کنید.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube