InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
پ.ن: کمدی دیروز، زندگی امروز

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3👎1
گر ایمیل‌های هک شده درگاه خدمات الکترونیک رو به هر دلیلی نتونستین دانلود و بررسی کنید، از طریق این دو سایت که توسط افراد ناشناسی ساخته شدن، میتونید به راحتی به صورت انلاین در بین اونها بگردین و محتوای اونهارو بررسی کنید:
🔶 filterchi.info

🔶 tehran.io/internet.ir/


🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3🔥3
Here are 30 cybersecurity search engines:

1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.


🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#Interview #Cybersecurity

What Does a Cybersecurity Analyst Do?

Cybersecurity
analysts strive to preserve the integrity of sensitive data by defending infrastructure and systems from cyberattacks. To protect these assets, cybersecurity analysts evaluate system vulnerabilities through diagnostic testing and traffic monitoring. Based on the results of these assessments, cybersecurity analysts design and implement risk management strategies. Cybersecurity analysts also respond to cyber attacks, conduct forensic analysis of previous cyber incidents, and work to ensure organizational compliance with relevant security standards and protocols.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3
#Interview #Cybersecurity

🔸What Is the Difference Between a Threat, a Vulnerability, and a Risk?

You
should expect a follow-up question asking which of the three to focus more on. A simple way to put it: In cybersecurity, risk is the potential for loss, damage or destruction of assets or data. Threat is a negative event, such as the exploit of a vulnerability. And a vulnerability is a weakness that exposes you to threats, and therefore increases the likelihood of a negative event.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔸What Is Cryptography?

Cryptography
is a secure communication technique that prevents parties outside of the sender and intended recipient from accessing the contents of a confidential transmission. The process of cryptography uses an algorithm to convert plaintext input into an encrypted ciphertext output. The message can be converted back into readable plaintext by authorized recipients who possess the necessary key.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍3

🔰Top 10 Emerging Cyber Security Threats for 2030

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Forwarded from InfoSecTube
💢 آموزش متخصص متاسپلویت💢

📌قسمت 1 - مقدمه‌ای بر آزمایش نفوذپذیری و دوره متاسپلویت

https://youtu.be/RuNl5Jse_do
📌 قسمت 2 - مفاهیم پایه نفوذگری و امنیت

https://youtu.be/1THQGHG7GZ0
📌قسمت 3- مفاهیم نفوذگری و امنیت

https://youtu.be/MTcwPdUl0Qw
📌قسمت 4- مفاهیم نفوذگری و امنیت
https://youtu.be/TNqdSoUmzeM
📌 قسمت 5- فازهای آزمایش نفوذپذیری بخش اول

https://youtu.be/ZjErNLtvADc
📌قسمت 6- فازهای آزمایش نفوذپذیری جمع‌آوری اطلاعات از هدف

https://youtu.be/wWuDnAk5qDM
📌قسمت 7- فازهای آزمایش نفوذپذیری توسعه اکسپلویت و پس از نفوذ

https://youtu.be/PgJ3ib5zvcA

📌قسمت 8 -فازهای آزمایش نفوذپذیری کشف آسیب‌پذیری و فازینگ

https://youtu.be/_EfXJCTPQTI
📌قسمت 9 - فازهای آزمایش نفوذپذیری ابزارهای آزمایش نفوذپذیری

https://youtu.be/YRWzZr8QRLM
📌قسمت 10- مباحث پایه اکسپلویتینگ مفاهیم پویشگری شبکه

https://youtu.be/QWg-mrSe0O8

🔉@infosectube
📌youtube channel
☣️instagram pageا
👍1
🔰 ISO/IEC 27005:2022

Information security, cybersecurity and privacy protection - Guidance on managing information security risks

🔉@infosectube
📌youtube channel
☣️instagram pageا
ISO 27005-2022.pdf
16.7 MB
🔰 ISO/IEC 27005:2022

Information security, cybersecurity and privacy protection - Guidance on managing information security risks

🔉@infosectube
📌youtube channel
☣️instagram pageا
#Interview #Cybersecurity

🔸What Is a Firewall? How Do You Set It Up?
A
firewall is a hardware or software network security device that monitors inbound and outbound network traffic. Firewalls, which block the flow of traffic flagged as suspicious or malicious, are considered the first line of defense in the field of network security.

To configure a firewall, you’ll need to:

🔸Secure the firewall. Only authorized administrators should have access.
🔸Designate firewall zones. Evaluate assets of values and group them together according to function and sensitivity. Create a corresponding IP address schema.
🔸Build access control lists. These rules dictate which traffic is permitted to flow in and out of different zones.
🔸Configure related firewall services and logging. Set up your firewall to report to your logging server and disable any services you don’t plan to use.
🔸Test. Use vulnerability assessments to check that the firewall is behaving according to the parameters of your access control lists.

Firewalls analyze network traffic according to pre-configured security rules and only accept inbound connections that follow these rules. Incoming data packets that do not adhere to these rules will be blocked by the firewall, which operates like a guard at the computer’s port—the function is analogous to a bouncer checking IDs at a nightclub entrance. If your firewall is functioning properly, only trusted IP addresses are granted access.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
🔹کتابخونه Embetter بهتون اجازه میده که به راحتی از تصاویر یا متن به کمک ترنسفورمر یا مدل‌های زبانی فیچر استخراج کنید و با مدل‌های ساده مثل logistic regression توی scikit-learn پایپ‌لاین بسازید تو چند خط کد!
این کمک میکنه که خیلی سریع عمکرد همه مدل‌های عمیق رو‌ برای تهیه baseline بتونید حساب کنید.

برای نصبش فقط کافیه این خط رو اجرا کنید:

python -m pip install embetter

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube

#Interview #Cybersecurity
What Is Shoulder Surfing?

Should
surfing is a method of data theft by which a bad actor over the shoulder of a target in order to steal confidential information like passwords and PIN numbers that can later be used to initiate a cyberattack. Like phishing, shoulder surfing is a social engineering technique—meaning it belongs to a class of information security attacks that rely on psychological manipulation to extract confidential information or influence victims to perform actions counter to their best interests.

این نوع حمله یکی از ساده ترین نوع حملات است که در آن مهاجم پشت سر یا پشت شانه های هدفش قرار می گیرد و از بالا یا کنار دست آن در هنگامیکه طعمه مشغول وارد کردن پسورد خودش است یواشکی نگاه می کند و متوجه رمز عبور کاربر می شود.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2
Acu_15.1_Crack.7z
6.6 MB
💎Acunetix Version 15 build 15.1.221109177 for Windows and Linux – 10 Nov 2022

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#Interview #Cybersecurity
🔸What Do You Mean by XSS?

Cross-site scripting (XSS) is a type of cyberattack that injects malicious scripts into legitimate websites. XSS attacks use web applications to send these fragments of code—typically as browser-side scripts—to oblivious end users whose browsers execute the malicious script because it appears to originate from a trusted source.


🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍4
💎دوست داری بدونی اینترنت ایران چجوری کار میکنه و چطوری دارن فیلترش میکنند؟ برای رسیدن با جواب مطالب زیر رو با دقت دنبال کنید.
پ.ن: بعضی توضیحات به دلیل قابل فهم بودن برای همگان گفته نشده است.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍2