InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
Forwarded from وب آموز (m J)
⭕️ اگر اخبار رو دنبال کرده باشید دیروز توییتر بسیاری از افراد معروف هک شد و توییتی به نقل از این افراد منتشر شد که اون فرد از مخاطبش خواسته بود که اگر ۱۰۰۰ دلار به من بدید بهتون ۲۰۰۰ دلار برمیگردونم.
حالا توییتر تایید کرد که هکر/هکرها با استفاده از تکنیک های مهندسی اجتماعی تونستن به سیستم بعضی از کارمندان شرکت نفوذ کنن و از اونجا به حساب های توییتری دسترسی گرفتن.
آیا شما در خطر هستید؟ خیر
آیا باید پسوردتون رو تغییر بدید؟ خیر
آیا باید ورود دو مرحله ای رو فعال کنید؟ بله

🔹 ممکنه شما بخندید ولی۳۷۳ نفر پینوکیو وار در این دام افتادن و تقریبا ۱۳بیتکوین به هکرها دادن تقریبا ۲ میلیارد تومان.
این حمله ۱ بیلیون دلار از ارزش بازار توییتر کم کرد!
🆔 @Webamoozir
This media is not supported in your browser
VIEW IN TELEGRAM
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
Anonymous Quiz
18%
cross-site scripting
20%
command injection
27%
SQL injection
35%
path traversal attacks
#tools #RE #malware_analysis
🛡capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate
📌 link
📌 @Infosectube
As a web application user, what puts you at most risk to fall victim to a cross-site request forgery (CSRF) attack?
Anonymous Quiz
21%
Using an old browser
30%
Using a web app that is not fully protected by SSL/TLS
43%
Using the "keep me logged in" option offered by web apps
6%
Using weak passwords
What happens when an application takes user inputted data and sends it to a web browser without proper validation and escaping?
Anonymous Quiz
10%
Security Mis-configuration
53%
Cross Site Scripting
18%
Insecure Direct Object Reference
18%
Broken Authentication and Session Management
burpsuite_pro_2020.7.zip
350.4 MB
#burp_pro

pass: 311138
README inside, plz read it before run BS.
Happy Hacking!
📌 @infosectube
In which stage of an ethical hack would the attacker actively apply tools and techniques to gather more in-depth information on their targets?
Anonymous Quiz
31%
Active Reconnaissance
33%
Scanning and enumeration
23%
Gaining Access
13%
Passive Reconnaissance
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’s identity through an authentication service without requiring reauthentication.
Anonymous Quiz
40%
OpenID
33%
Sign-on system
24%
Security Assertion Markup Language (SAML)
2%
Virtual Private Database (VPD)
🛡HTTP Parameter Pollution - It’s Contaminated

📌Link
📌 @infosectube