سعی کن آنقدر کامل باشی
که بزرگترین تنبیه تو برای دیگران،
گرفتن خودت از آنها باشد...!
پائولو کوئیلو
@iranopensource🐧
که بزرگترین تنبیه تو برای دیگران،
گرفتن خودت از آنها باشد...!
پائولو کوئیلو
@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Mastering Metasploit - Second Edition by Nipun Jaswal #Metasploit
—----------------
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.
We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher, and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.
In the next section, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.
By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
—------------——————————————
2016 | PDF | 432 pages | 26.8 MB
—-----------——————————————-
@iranopensource🐧
—----------------
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.
We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher, and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit.
In the next section, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework.
By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
—------------——————————————
2016 | PDF | 432 pages | 26.8 MB
—-----------——————————————-
@iranopensource🐧
Iran Open Source (IOS)
🐧 لینک گروه جامعه متن باز ایران https://t.iss.one/joinchat/BDE3OUs-jzRKVI8btbY4kA @iranopensource🐧
Ansible provides a clear and concise way to manage the configuration of your Linux infrastructure. It can help in making your infrastructure more maintainable, quicker to deploy, and easier to understand.
“Ansible Configuration Management” will take you from your very first command all the way to extending the very capabilities of Ansible itself. It takes a practical approach with hands-on examples, which ensures that the readers walk away with all the knowledge and skills they will need to harness Ansible.
“Ansible Configuration Management” starts with an explanation of the basics and builds the reader’s knowledge through step-by-step guidelines.
The book concentrates on discussions related to realistic worked examples. Using this approach we discuss how to perform ad-hoc actions, script actions together to set up services, and how to script more complicated tasks. The discussion carries onto explanation of organising your configurations for large deployments and warps up with examples of how to extend the capabilities of Ansible.
“Ansible Configuration Management” provides the knowledge you require to effectively manage your systems in a simple, quick, and maintainable way.
What you will learn from this book
Configure your systems and services with Ansible
Use Ansible command line tools to interrogate systems
Script Ansible to perform multiple actions with one command
Build maintainable configurations for large environments
Learn how and when to use advanced features of Ansible
Use an inventory that is dynamically generated
Understand the use of Ansible roles to split your configurations into logical parts
Extend the functionality of Ansible by writing your own module
——————————————-
2013 | PDF | 92 Pages | 0.8 MB
——————————————-
@iranopensource🐧
“Ansible Configuration Management” will take you from your very first command all the way to extending the very capabilities of Ansible itself. It takes a practical approach with hands-on examples, which ensures that the readers walk away with all the knowledge and skills they will need to harness Ansible.
“Ansible Configuration Management” starts with an explanation of the basics and builds the reader’s knowledge through step-by-step guidelines.
The book concentrates on discussions related to realistic worked examples. Using this approach we discuss how to perform ad-hoc actions, script actions together to set up services, and how to script more complicated tasks. The discussion carries onto explanation of organising your configurations for large deployments and warps up with examples of how to extend the capabilities of Ansible.
“Ansible Configuration Management” provides the knowledge you require to effectively manage your systems in a simple, quick, and maintainable way.
What you will learn from this book
Configure your systems and services with Ansible
Use Ansible command line tools to interrogate systems
Script Ansible to perform multiple actions with one command
Build maintainable configurations for large environments
Learn how and when to use advanced features of Ansible
Use an inventory that is dynamically generated
Understand the use of Ansible roles to split your configurations into logical parts
Extend the functionality of Ansible by writing your own module
——————————————-
2013 | PDF | 92 Pages | 0.8 MB
——————————————-
@iranopensource🐧
در زندگی آموخته ام؛
که جایگاه و موقعیت را
میتوان خرید
ولی
احترام را باید کسب کرد... (پروفسور سمیعی)
@iranopensource🐧
که جایگاه و موقعیت را
میتوان خرید
ولی
احترام را باید کسب کرد... (پروفسور سمیعی)
@iranopensource🐧
💎 منظور از APT یا Advaced Persistent Threat چیست؟
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Iran Open Source (IOS)
💎 منظور از APT یا Advaced Persistent Threat چیست؟ 💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
💎 منظور از APT یا Advaced Persistent Threat چیست؟
منظور از APT به حملات تحت شبکه اطلاق می شود که یک شخص احراز هویت نشده می تواند برای مدت زمان زیادی به صورت ناشناس به شبکه دسترسی پیدا کند. هدف یک حمله APT سرقت اطلاعات است، نه صرفا ضربه زدن به سازمان و یا انجام اعمال خراب کارانه. به همین منظور اغلب هدف این گونه حملات معمولا سازمانی های است که اطلاعات مفیدی در اختیار دارند مانند سازمان دفاع، صنایع تولیدی و مالی.در یک حمله معمولی، حمله کننده تلاش می کند تا به سرعت وارد شده، اطلاعات را سرقت نماید و از شبکه خارج شود تا سیستم های تشخیص نفوذ شانس کمتری برای یافتن این گونه حملات داشته باشند. هرچند در این حملات هدف ورود و خروج سریع نیست و معمولا این گونه حملات، مانا (Persistent) هستند. بدین منظور حمله کننده باید دائما کد های فایل مخرب را بازنویسی نماید و تکنیک های پنهان سازی پیچیده ای (به همین دلیل به آنها Advanced گفته میشود) استفاده نماید.
حملات APT معمولا از طریق حمله Spear Fishing، که نوعی حمله به سبک مهندسی اجتماعی است، به شبکه نفوذ میکنند. و وقتی نفوذ انجام شد فایل مخرب یک در پشتی بر روی شبکه ایجاد مینماید.قدم بعدی یافتن نام و پسورد کاربری معتبر (مانند ادمین شبکه) می باشد تا بتواند خود را بر روی دیگر سیستم های درون شبکه منتقل نماید و در پشتی را بر روی آن ها نیز نصب نماید. در پشتی به حمله کننده این امکان را میدهد تا هر زمان که خواست ابزار مخرب را بر روی سیستم ها نصب کند و اصطلاحا یک "زیرساخت روح" یا Ghost Infrastructure برای توزیع بدافزار ایجاد نماید.هرچند یافتن حملات APT کار به نظر دشواری است، ولی سرقت اطلاعات کاملا مخفی باقی نمی ماند. می توان با تشخیص انومالی در ترافیک خروجی سازمان، که شاید بهترین راه ممکن هم باشد، این حملات را شناسایی نمود.
@iranopensource🐧
منظور از APT به حملات تحت شبکه اطلاق می شود که یک شخص احراز هویت نشده می تواند برای مدت زمان زیادی به صورت ناشناس به شبکه دسترسی پیدا کند. هدف یک حمله APT سرقت اطلاعات است، نه صرفا ضربه زدن به سازمان و یا انجام اعمال خراب کارانه. به همین منظور اغلب هدف این گونه حملات معمولا سازمانی های است که اطلاعات مفیدی در اختیار دارند مانند سازمان دفاع، صنایع تولیدی و مالی.در یک حمله معمولی، حمله کننده تلاش می کند تا به سرعت وارد شده، اطلاعات را سرقت نماید و از شبکه خارج شود تا سیستم های تشخیص نفوذ شانس کمتری برای یافتن این گونه حملات داشته باشند. هرچند در این حملات هدف ورود و خروج سریع نیست و معمولا این گونه حملات، مانا (Persistent) هستند. بدین منظور حمله کننده باید دائما کد های فایل مخرب را بازنویسی نماید و تکنیک های پنهان سازی پیچیده ای (به همین دلیل به آنها Advanced گفته میشود) استفاده نماید.
حملات APT معمولا از طریق حمله Spear Fishing، که نوعی حمله به سبک مهندسی اجتماعی است، به شبکه نفوذ میکنند. و وقتی نفوذ انجام شد فایل مخرب یک در پشتی بر روی شبکه ایجاد مینماید.قدم بعدی یافتن نام و پسورد کاربری معتبر (مانند ادمین شبکه) می باشد تا بتواند خود را بر روی دیگر سیستم های درون شبکه منتقل نماید و در پشتی را بر روی آن ها نیز نصب نماید. در پشتی به حمله کننده این امکان را میدهد تا هر زمان که خواست ابزار مخرب را بر روی سیستم ها نصب کند و اصطلاحا یک "زیرساخت روح" یا Ghost Infrastructure برای توزیع بدافزار ایجاد نماید.هرچند یافتن حملات APT کار به نظر دشواری است، ولی سرقت اطلاعات کاملا مخفی باقی نمی ماند. می توان با تشخیص انومالی در ترافیک خروجی سازمان، که شاید بهترین راه ممکن هم باشد، این حملات را شناسایی نمود.
@iranopensource🐧
Iran Open Source (IOS)
🐧 لینک گروه جامعه متن باز ایران https://t.iss.one/joinchat/BDE3OUs-jzRKVI8btbY4kA @iranopensource🐧
Pro Python 3 Features and Tools for Professional Development, 3rd edition by J. Burton Browning #python #programming
----------------------------------------
Refine your programming techniques and approaches to become a more productive and creative Python programmer. This book explores the concepts and features that will improve not only your code but also your understanding of the Python community with insights and details about the Python philosophy.
Pro Python 3, Third Edition gives you the tools to write clean, innovative code. It starts with a review of some core Python principles, which are illustrated by various concepts and examples later in the book. The first half of the book explores aspects of functions, classes, protocols, and strings, describing techniques which may not be common knowledge, but which together form a solid foundation. Later chapters cover documentation, testing, and app distribution. Along the way, you’ll develop a complex Python framework that incorporates ideas learned throughout the book.
Updates in this edition include the role of iterators in Python 3, web scraping with Scrapy and BeautifulSoup, using Requests to call web pages without strings, new tools for distribution and installation, and much more. By the end of the book you'll be ready to deploy uncommon features that can take your skills to the next level in Python.
What You’ll Learn
Implement programs with various types of Python functions
Work with classes and object-oriented programming
Use strings from the standard library and third-party libraries
Harvest web site data with Python
Automate unit testing by writing a test suite
Review imaging, random number generation, and NumPy scientific extensions
Understand The Zen of Python documentation to help you decide the best way to distribute your code
-----------------------------------------
2019 | PDF | 468 Pages | 5,95 MB
--------------------------------------
@iranopensource🐧
----------------------------------------
Refine your programming techniques and approaches to become a more productive and creative Python programmer. This book explores the concepts and features that will improve not only your code but also your understanding of the Python community with insights and details about the Python philosophy.
Pro Python 3, Third Edition gives you the tools to write clean, innovative code. It starts with a review of some core Python principles, which are illustrated by various concepts and examples later in the book. The first half of the book explores aspects of functions, classes, protocols, and strings, describing techniques which may not be common knowledge, but which together form a solid foundation. Later chapters cover documentation, testing, and app distribution. Along the way, you’ll develop a complex Python framework that incorporates ideas learned throughout the book.
Updates in this edition include the role of iterators in Python 3, web scraping with Scrapy and BeautifulSoup, using Requests to call web pages without strings, new tools for distribution and installation, and much more. By the end of the book you'll be ready to deploy uncommon features that can take your skills to the next level in Python.
What You’ll Learn
Implement programs with various types of Python functions
Work with classes and object-oriented programming
Use strings from the standard library and third-party libraries
Harvest web site data with Python
Automate unit testing by writing a test suite
Review imaging, random number generation, and NumPy scientific extensions
Understand The Zen of Python documentation to help you decide the best way to distribute your code
-----------------------------------------
2019 | PDF | 468 Pages | 5,95 MB
--------------------------------------
@iranopensource🐧
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
Iran Open Source (IOS)
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA @iranopensource🐧
Learning OpenStack Networking, 3rd Edition by James Denton #OpenStack #Networking
-----------------------------------
OpenStack Networking is a pluggable, scalable, and API-driven system to manage physical and virtual networking resources in an OpenStack-based cloud. Like other core OpenStack components, OpenStack Networking can be used by administrators and users to increase the value and maximize the use of existing datacenter resources. This third edition of Learning OpenStack Networking walks you through the installation of OpenStack and provides you with a foundation that can be used to build a scalable and production-ready OpenStack cloud.
In the initial chapters, you will review the physical network requirements and architectures necessary for an OpenStack environment that provide core cloud functionality. Then, you'll move through the installation of the new release of OpenStack using packages from the Ubuntu repository. An overview of Neutron networking foundational concepts, including networks, subnets, and ports will segue into advanced topics such as security groups, distributed virtual routers, virtual load balancers, and VLAN tagging within instances.
By the end of this book, you will have built a network infrastructure for your cloud using OpenStack Neutron.
-----------------------------------————————
2018 | PDF | 46 MB | 705 Pages
--------------------------------—————————
@iranopensource🐧
-----------------------------------
OpenStack Networking is a pluggable, scalable, and API-driven system to manage physical and virtual networking resources in an OpenStack-based cloud. Like other core OpenStack components, OpenStack Networking can be used by administrators and users to increase the value and maximize the use of existing datacenter resources. This third edition of Learning OpenStack Networking walks you through the installation of OpenStack and provides you with a foundation that can be used to build a scalable and production-ready OpenStack cloud.
In the initial chapters, you will review the physical network requirements and architectures necessary for an OpenStack environment that provide core cloud functionality. Then, you'll move through the installation of the new release of OpenStack using packages from the Ubuntu repository. An overview of Neutron networking foundational concepts, including networks, subnets, and ports will segue into advanced topics such as security groups, distributed virtual routers, virtual load balancers, and VLAN tagging within instances.
By the end of this book, you will have built a network infrastructure for your cloud using OpenStack Neutron.
-----------------------------------————————
2018 | PDF | 46 MB | 705 Pages
--------------------------------—————————
@iranopensource🐧