Forwarded from Cat Seclist
⭕Top Free Blue Team Courses to Boost Your Cybersecurity Skills
The demand for Blue Team professionals — those focused on defense, detection, and response — is growing fast. If you're starting or leveling up in cybersecurity, here are some of the best free resources to get hands-on and stay ahead:
🔹 Blue Team Level 1 – Security Blue Team
Intro to SOC, SIEM, threat detection, Windows/Linux forensics.
🌐 securityblue.team
🔹 CyberDefenders
Gamified labs for SOC, DFIR, SIEM, and threat hunting.
🌐 cyberdefenders.org
🔹 IBM Cybersecurity Analyst – Coursera
Foundations, network defense, SOC tools, and incident response.
🌐 coursera.org
🔹 TryHackMe – Cyber Defence Path
Labs on Blue Team, malware analysis, SIEM, and more.
🌐 tryhackme.com
🔹 DFIR Training
Free forensics and incident response resources.
🌐 dfir.training
🔹 MITRE ATT&CK Defender Training
Learn how to apply MITRE ATT&CK for real-world defense.
🌐 attack.mitre.org
🔹 EDX – Cybersecurity Fundamentals by RIT
Core concepts and defensive strategies.
🌐 edx.org
🎯 Bonus: Google Cybersecurity Certificate (Coursera – free w/ aid)
🌐 coursera.org
The demand for Blue Team professionals — those focused on defense, detection, and response — is growing fast. If you're starting or leveling up in cybersecurity, here are some of the best free resources to get hands-on and stay ahead:
🔹 Blue Team Level 1 – Security Blue Team
Intro to SOC, SIEM, threat detection, Windows/Linux forensics.
🌐 securityblue.team
🔹 CyberDefenders
Gamified labs for SOC, DFIR, SIEM, and threat hunting.
🌐 cyberdefenders.org
🔹 IBM Cybersecurity Analyst – Coursera
Foundations, network defense, SOC tools, and incident response.
🌐 coursera.org
🔹 TryHackMe – Cyber Defence Path
Labs on Blue Team, malware analysis, SIEM, and more.
🌐 tryhackme.com
🔹 DFIR Training
Free forensics and incident response resources.
🌐 dfir.training
🔹 MITRE ATT&CK Defender Training
Learn how to apply MITRE ATT&CK for real-world defense.
🌐 attack.mitre.org
🔹 EDX – Cybersecurity Fundamentals by RIT
Core concepts and defensive strategies.
🌐 edx.org
🎯 Bonus: Google Cybersecurity Certificate (Coursera – free w/ aid)
🌐 coursera.org
🔥1
Forwarded from BugXplorer (j b)
A Novel Technique for SQL Injection in PDO’s Prepared Statements
https://slcyber.io/assetnote-security-research-center/a-novel-technique-for-sql-injection-in-pdos-prepared-statements/
🪳 @bugxplorer
https://slcyber.io/assetnote-security-research-center/a-novel-technique-for-sql-injection-in-pdos-prepared-statements/
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Forwarded from Turan Security
CVE lardan keyin NASAni buzdik🔥
Jamoadoshimiz Jamshid Yergashvoyev NASA da bir necha zaifliklar aniqladi. Zaifliklar orqali NASA Operatsion tizimlarida mavjud fayllarni masofadan yuklab olish, HTML inyeksiya va boshqa hujumlar amalga oshirish mumkin. Zaifliklar Bugcrowd platformasi orqali NASA ga topshirilgan va bartaraf etilgan.
TuranSec uchun bu birinchi natija emas, jamoa NASA da 3 marta *HoF (Hall of Fame) ga kirishgan ulgurgan, birinchi marta 2023-yilda.
HoF - tashkilot xavfsizligini ta'minlashga hissa qo'shgan Xakerlar ro'yxati.
@TuranSecurity | www.turansec.uz | [email protected]
Jamoadoshimiz Jamshid Yergashvoyev NASA da bir necha zaifliklar aniqladi. Zaifliklar orqali NASA Operatsion tizimlarida mavjud fayllarni masofadan yuklab olish, HTML inyeksiya va boshqa hujumlar amalga oshirish mumkin. Zaifliklar Bugcrowd platformasi orqali NASA ga topshirilgan va bartaraf etilgan.
TuranSec uchun bu birinchi natija emas, jamoa NASA da 3 marta *HoF (Hall of Fame) ga kirishgan ulgurgan, birinchi marta 2023-yilda.
HoF - tashkilot xavfsizligini ta'minlashga hissa qo'shgan Xakerlar ro'yxati.
@TuranSecurity | www.turansec.uz | [email protected]
🔥3👍1👨💻1
JavaScript Analysis for Pentesters.
• Вероятно, что это самое объемное руководство по анализу JavaScript-файлов для пентестеров на сегодняшний день:
• Static Analysis:
- Gather JavaScript Code;
- Identify Endpoints;
- Detect Secrets;
- Locate Dangerous Functions;
- Discover Outdated Libraries.
• Dynamic analysis:
- Basic Tools;
- Example Application;
- Client-Side Filtering;
- Finding the Entry Point;
- The Debugger;
- General Advice.
• Obfuscation & Deobfuscation:
- Minification;
- Beautification;
- Source Maps;
- Minification and Analysis;
- Obfuscation;
- Deobfuscation;
- Obfuscation and Analysis.
• Hands-On: Analyze obfuscated code:
- Example Application;
- Finding the Entry Point;
- Locating the Value of Interest;
- The Unpacking Function;
- Reconstructing the Signing Call;
- Decoding the Key;
- Signing Manipulated JWTs.
• Local Overrides:
- Temporary Changes in Developer Tools;
- Persistent Changes in Developer Tools;
- Persistent Changes in Burp Suite.
• Bypass code protection:
- Setup;
- Self Defending;
- Debug protection;
- Disable console output;
- General advice.
• Wrapping Up:
- Some References.
#JavaScript #Pentest
• Вероятно, что это самое объемное руководство по анализу JavaScript-файлов для пентестеров на сегодняшний день:
• Static Analysis:
- Gather JavaScript Code;
- Identify Endpoints;
- Detect Secrets;
- Locate Dangerous Functions;
- Discover Outdated Libraries.
• Dynamic analysis:
- Basic Tools;
- Example Application;
- Client-Side Filtering;
- Finding the Entry Point;
- The Debugger;
- General Advice.
• Obfuscation & Deobfuscation:
- Minification;
- Beautification;
- Source Maps;
- Minification and Analysis;
- Obfuscation;
- Deobfuscation;
- Obfuscation and Analysis.
• Hands-On: Analyze obfuscated code:
- Example Application;
- Finding the Entry Point;
- Locating the Value of Interest;
- The Unpacking Function;
- Reconstructing the Signing Call;
- Decoding the Key;
- Signing Manipulated JWTs.
• Local Overrides:
- Temporary Changes in Developer Tools;
- Persistent Changes in Developer Tools;
- Persistent Changes in Burp Suite.
• Bypass code protection:
- Setup;
- Self Defending;
- Debug protection;
- Disable console output;
- General advice.
• Wrapping Up:
- Some References.
#JavaScript #Pentest
kpwn.de
JavaScript Analysis for Pentesters
Pentesting web applications thoroughly requires you to analyze their JavaScript. I’ve summarized my knowledge from 5 years of pentests into this blog post.
❤1
https://splunkbase.splunk.com/
https://splunkbase.splunk.com/app/3544 —> Sysmon App for Splunk
#SIEM #Splunk #App
https://splunkbase.splunk.com/app/3544 —> Sysmon App for Splunk
#SIEM #Splunk #App
Forwarded from Codeby
Инструмент для аудита Active Directory, который использует запросы Cypher для анализа данных из базы данных BloodHound и предоставляет исчерпывающий обзор существующих недостатков в виде статического веб-отчета. AD Miner изначально был создан компаний Forvis Mazars и поддерживается командой Grant Thornton Cybersecurity Audit & Advisory
Установка
pipx install 'git+https://github.com/Mazars-Tech/AD_Miner.git'
Использование
AD-miner [-h] [-b BOLT] [-u USERNAME] [-p PASSWORD] [-e EXTRACT_DATE] [-r RENEWAL_PASSWORD] [-a] [-c] [-l LEVEL] -cf CACHE_PREFIX [-ch NB_CHUNKS] [-co NB_CORES] [--rdp] [--evolution EVOLUTION] [--cluster CLUSTER]
AD-miner -cf My_Report -u neo4j -p mypassword
Если у вас есть несколько отчётов AD-Miner за определённый период, вы можете легко отслеживать изменения с помощью аргумента --evolution: каждый отчёт AD-Miner генерирует файл данных JSON вместе с файлом index.html . Вам нужно просто собрать эти разные файлы JSON в одну папку и указать путь к этой папке после аргумента --evolution. Затем на главной странице появляется вкладка "Evolution over time".
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1
Forwarded from Sploitus Agency
Qidiruv tizimlaridan pentest maqsadlarida foydalanish bo'yicha ro'yxat
🔥3