Forwarded from Deleted Account
💎 چرخه گروه های امنیتی از نظر سایت Hackernoon. این سایت معتقد است که با ترکیب وظایف در سه گروه اصلی قرمز، آبی و زرد میتوان به 3 گروه جدید نارنجی، بنفش و سبز رسید. همچنین با اشتراک وظایف این گروه ها، گروه سفید و اجتماع وظایف گروه های این چرخه (افرادی با تجربه بیش از 10 سال در فیلدهای مختلف امنیت) گروه رنگین کمانی را تشکیل داد. https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Forwarded from Deleted Account
CISSP Exam Cram, 4th edition by Michael Gregg #CISSP #exam
---------------------------
CISSP Exam Cram, Fourth Edition, is the perfect study guide to help you pass the tough new electronic version of the CISSP exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of encryption, cloud security, information lifecycles, security management/governance, and more. The book contains an extensive set of preparation tools, such as quizzes, Exam Alerts, and two practice exams.
Covers the critical information you’ll need to pass the CISSP exam!
Enforce effective physical security throughout your organization
Apply reliable authentication, authorization, and accountability
Design security architectures that can be verified, certified, and accredited
Understand the newest attacks and countermeasures
Use encryption to safeguard data, systems, and networks
Systematically plan and test business continuity/disaster recovery programs
Protect today’s cloud, web, and database applications
Address global compliance issues, from privacy to computer forensics
Develop software that is secure throughout its entire lifecycle
Implement effective security governance and risk management
Use best-practice policies, procedures, guidelines, and controls
Ensure strong operational controls, from background checks to security audits
----------------------------
2016 | Inglés | PDF | 816 páginas | 5,29 MB
---------------------------
@iranopensource🐧
---------------------------
CISSP Exam Cram, Fourth Edition, is the perfect study guide to help you pass the tough new electronic version of the CISSP exam. It provides coverage and practice questions for every exam topic, including substantial new coverage of encryption, cloud security, information lifecycles, security management/governance, and more. The book contains an extensive set of preparation tools, such as quizzes, Exam Alerts, and two practice exams.
Covers the critical information you’ll need to pass the CISSP exam!
Enforce effective physical security throughout your organization
Apply reliable authentication, authorization, and accountability
Design security architectures that can be verified, certified, and accredited
Understand the newest attacks and countermeasures
Use encryption to safeguard data, systems, and networks
Systematically plan and test business continuity/disaster recovery programs
Protect today’s cloud, web, and database applications
Address global compliance issues, from privacy to computer forensics
Develop software that is secure throughout its entire lifecycle
Implement effective security governance and risk management
Use best-practice policies, procedures, guidelines, and controls
Ensure strong operational controls, from background checks to security audits
----------------------------
2016 | Inglés | PDF | 816 páginas | 5,29 MB
---------------------------
@iranopensource🐧
Forwarded from Deleted Account
CISSP_Exam_Cram,_4th_edition_by_Michael_Gregg.pdf
5.3 MB
Forwarded from Deleted Account
Kali-Linux-Revealed-1st-edition.pdf
9.8 MB
Forwarded from Deleted Account
Advanced Malware Analysis by Christopher C. Elisan #malware #analysis
---------------------------------
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.
After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you’ll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports.
A crucial tool for combatting malware?which currently hits each second globally
Filled with undocumented methods for customizing dozens of analysis software tools for very specific uses
Leads you through a malware blueprint first, then lab setup, and finally analysis and reporting activities
Every tool explained in this book is available in every country around the world
----------------------------------
2015 | Inglés | EPUB | 521 páginas | 17,7 MB
-----------------------------
@iranopensource🐧
---------------------------------
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.
After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you’ll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports.
A crucial tool for combatting malware?which currently hits each second globally
Filled with undocumented methods for customizing dozens of analysis software tools for very specific uses
Leads you through a malware blueprint first, then lab setup, and finally analysis and reporting activities
Every tool explained in this book is available in every country around the world
----------------------------------
2015 | Inglés | EPUB | 521 páginas | 17,7 MB
-----------------------------
@iranopensource🐧
Forwarded from Deleted Account
Advanced Malware Analysis.epub
17.8 MB
Forwarded from Deleted Account
♻️ دستورهای پاک کردن رد پا یا Clear Log
📌 پس از آنکه شما تست نفوذی روی سایت یا سروی انجام دادید در مرحله آخر باید رد پای خود را پاک کنید. تا رد پایی از شما به جا نماند. در سرورهای Debian فایلی تحت عنوان var/log/auth.log/ وجود دارد که اطلاعات مرتبط با احرازهویت های انجام شده در سیستم عامل را ضبط می کند. این اطلاعات شامل زمان رخداد، کاربر انجام دهنده، رخداد انجام شده و… می باشد.
با یک دستور echo به مقدار خالی به سادگی می توان محتویات این فایل را حذف کرده:
echo "" > /var/log/auth.log
♻️ حذف پیام های سیستمی (لاگ رخدادها)
📌 فایل دیگری با نام var/log/messages/ وجود دارد که حاوی پیام های سراسری سیستم می باشد. اطلاعات مختلفی در این فایل ذخیره می شوند که شامل پیام های لاگ شده در حین startup سیستم، پیام های سرویس های mail یا Cron Kernel و برنامه های مختلف دیگر. با دستور زیر می توان log فایل ها را مشاهده کرد:
cat /var/log/messages
همچنین با دستور زیر می توانید این فایل را پاک کنید:
echo "" > /var/log/messages
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
📌 پس از آنکه شما تست نفوذی روی سایت یا سروی انجام دادید در مرحله آخر باید رد پای خود را پاک کنید. تا رد پایی از شما به جا نماند. در سرورهای Debian فایلی تحت عنوان var/log/auth.log/ وجود دارد که اطلاعات مرتبط با احرازهویت های انجام شده در سیستم عامل را ضبط می کند. این اطلاعات شامل زمان رخداد، کاربر انجام دهنده، رخداد انجام شده و… می باشد.
با یک دستور echo به مقدار خالی به سادگی می توان محتویات این فایل را حذف کرده:
echo "" > /var/log/auth.log
♻️ حذف پیام های سیستمی (لاگ رخدادها)
📌 فایل دیگری با نام var/log/messages/ وجود دارد که حاوی پیام های سراسری سیستم می باشد. اطلاعات مختلفی در این فایل ذخیره می شوند که شامل پیام های لاگ شده در حین startup سیستم، پیام های سرویس های mail یا Cron Kernel و برنامه های مختلف دیگر. با دستور زیر می توان log فایل ها را مشاهده کرد:
cat /var/log/messages
همچنین با دستور زیر می توانید این فایل را پاک کنید:
echo "" > /var/log/messages
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
هیچ دزدی، به هر میزان که مهارت داشته باشد نمی تواند دانش را بدزدد، و به همین دلیل است که دانش بهترین و امن ترین گنج برای بدست آوردن است ...
@iranopensource🐧
@iranopensource🐧
Iran Open Source (IOS)
🐧 لینک گروه جامعه متن باز ایران https://t.iss.one/joinchat/BDE3OUs-jzRKVI8btbY4kA @iranopensource🐧
Zabbix 4 Network Monitoring, 3rd Edition by Patrik Uytterhoeven, Rihards Olups #Zabbix
--------------------------------------------
Zabbix 4 Network Monitoring is the perfect starting point for monitoring the performance of your network devices and applications with Zabbix. Even if you’ve never used a monitoring solution before, this book will get you up and running quickly. You’ll learn to monitor more sophisticated operations with ease and soon feel in complete control of your network, ready to meet any challenges you might face.
Starting with the installation, you will discover the new features in Zabbix 4.0. You will then get to grips with native Zabbix agents and Simple Network Management Protocol (SNMP) devices. You will also explore Zabbix's integrated functionality for monitoring Java application servers and VMware. This book also covers notifications, permission management, system maintenance, and troubleshooting, so you can be confident that every potential challenge and task is under your control. If you're working with larger environments, you'll also be able to find out more about distributed data collection using Zabbix proxies. Once you're confident and ready to put these concepts into practice, you will understand how to optimize and improve performance. Troubleshooting network issues is vital for anyone working with Zabbix, so the book also helps you work through any technical snags and glitches you might face.
By the end of this book, you will have learned more advanced techniques to fine-tune your system and make sure it is in a healthy state.
--------------------------------------------
2019 | Inglés | EPUB | 798 páginas | 29,4 MB
---------------------------------------------
@iranopensource🐧
--------------------------------------------
Zabbix 4 Network Monitoring is the perfect starting point for monitoring the performance of your network devices and applications with Zabbix. Even if you’ve never used a monitoring solution before, this book will get you up and running quickly. You’ll learn to monitor more sophisticated operations with ease and soon feel in complete control of your network, ready to meet any challenges you might face.
Starting with the installation, you will discover the new features in Zabbix 4.0. You will then get to grips with native Zabbix agents and Simple Network Management Protocol (SNMP) devices. You will also explore Zabbix's integrated functionality for monitoring Java application servers and VMware. This book also covers notifications, permission management, system maintenance, and troubleshooting, so you can be confident that every potential challenge and task is under your control. If you're working with larger environments, you'll also be able to find out more about distributed data collection using Zabbix proxies. Once you're confident and ready to put these concepts into practice, you will understand how to optimize and improve performance. Troubleshooting network issues is vital for anyone working with Zabbix, so the book also helps you work through any technical snags and glitches you might face.
By the end of this book, you will have learned more advanced techniques to fine-tune your system and make sure it is in a healthy state.
--------------------------------------------
2019 | Inglés | EPUB | 798 páginas | 29,4 MB
---------------------------------------------
@iranopensource🐧