white2hack πŸ“š
12.5K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
ΠšΠΈΠ±Π΅Ρ€Π±Π΅Π·. Книги, Π³Π°ΠΉΠ΄Ρ‹, how to, Π»ΠΈΠΊΠ±Π΅Π·. Аналитика, Ρ‚Ρ€Π΅Π½Π΄Ρ‹, ΠΊΠ°Ρ€ΡŒΠ΅Ρ€Π°, эвСнты. Π­Ρ‚ΠΈΡ‡Π½Ρ‹ΠΉ Ρ…Π°ΠΊΠΈΠ½Π³ ΠΈ Π·Π°Ρ‰ΠΈΡ‚Π° своих Π΄Π°Π½Π½Ρ‹Ρ…

πŸ”Š Бвязь @w2hack_feed_bot
πŸ’¬ Π§Π°Ρ‚ https://t.iss.one/+VdkEIWudTi5m3dsA
πŸ’‘ ΠšΠΎΠ½ΡΡƒΠ»ΡŒΡ‚Π°Ρ†ΠΈΡ https://forms.gle/iB9iX3BwyxJM4Ktx5
πŸ› ОбмСн -- private --
Download Telegram
OSCP channel

Course for ethical beginner and mid-level hackers.Basic understanding of Linux systems. Acquaintance with such hacker tools like Kali Linux and Metasploit /Msfvenom.Learn to identify potential vulnerabilities to increase the privileges in the Linux system

Source
https://t.iss.one/hackers_ethical

#pentest #education
πŸ‘3πŸ”₯3
Π₯Π°ΠΊΠΈΠ½Π³ НА LINUX, ΠšΠΎΠ»ΠΈΡΠ½ΠΈΡ‡Π΅Π½ΠΊΠΎ Π”. Н., 2022

Данная ΠΊΠ½ΠΈΠ³Π° расскаТСт, ΠΊΠ°ΠΊ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Linux для нСсанкционированного доступа ΠΊ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹ΠΌ систСмам, ΠΈΠ»ΠΈ,попросту говоря, для Π²Π·Π»ΠΎΠΌΠ°. (ΠŸΡ€ΠΈΠΌΠ΅Ρ‡Π°Π½ΠΈΠ΅.

ΠŸΠ΅Ρ€Π²Π°Ρ Ρ‡Π°ΡΡ‚ΡŒ ΠΊΠ½ΠΈΠ³ΠΈ ΠΏΠΎΠΊΠ°Π·Ρ‹Π²Π°Π΅Ρ‚, ΠΊΠ°ΠΊ Π²Π·Π»ΠΎΠΌΠ°Ρ‚ΡŒ саму Linux - Π²Ρ‹ ΠΏΠΎΠ·Π½Π°ΠΊΠΎΠΌΠΈΡ‚Π΅ΡΡŒ с основами Linux; ΡƒΠ·Π½Π°Π΅Ρ‚Π΅, ΠΊΠ°ΠΊ Π²Π·Π»ΠΎΠΌΠ°Ρ‚ΡŒ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΡƒΡŽ Linux-систСму ΠΈ ΠΏΠΎΠ»ΡƒΡ‡ΠΈΡ‚ΡŒ ΠΏΡ€Π°Π²Π° root; ΠΏΠΎΠ³ΠΎΠ²ΠΎΡ€ΠΈΠΌ ΠΎ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… уязвимостях Π² систСмС ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ Ρ„Π°ΠΉΠ»ΠΎΠ² ΠΈ ΠΏΠ°ΠΏΠΎΠΊ eCryptfs; Π½Ρƒ ΠΈ, Π² Π·Π°ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ ΠΏΠ΅Ρ€Π²ΠΎΠΉ части, Π±ΡƒΠ΄Π΅Ρ‚ ΠΏΠΎΠΊΠ°Π·Π°Π½ΠΎ ΠΊΠ°ΠΊ Π²Π·Π»ΠΎΠΌΠ°Ρ‚ΡŒ Apache, MySQL, Π° Ρ‚Π°ΠΊΠΆΠ΅ CMS WordPress.

Вторая Ρ‡Π°ΡΡ‚ΡŒ ΠΊΠ½ΠΈΠ³ΠΈ расскаТСт, ΠΊΠ°ΠΊ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ инструмСнты, доступныС Π² Linux, для Π²Π·Π»ΠΎΠΌΠ° Π΄Ρ€ΡƒΠ³ΠΈΡ… систСм (Π² Ρ‚ΠΎΠΌ числС ΠΈ Linux) - познакомимся с хакСрским дистрибутивом Kali Linux ΠΈ ΡƒΠ·Π½Π°Π΅ΠΌ ΠΎ Π»ΡƒΡ‡ΡˆΠΈΡ… инструмСнтах ΠΈΠ· этого дистрибутива; расскаТСм ΠΊΠ°ΠΊ Π²Π·Π»ΠΎΠΌΠ°Ρ‚ΡŒ Π°ΠΊΠΊΠ°ΡƒΠ½Ρ‚ Π² ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ сСти; научимся ΡΠΊΡ€Ρ‹Π²Π°Ρ‚ΡŒ свою Π΄Π΅ΡΡ‚Π΅Π»ΡŒΠ½ΠΎΡΡ‚ΡŒ с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ Π’ΠΎr; ΠΏΠΎΠΏΡ€ΠΎΠ±ΡƒΠ΅ΠΌ Π²Π·Π»ΠΎΠΌΠ°Ρ‚ΡŒ Android-ΠΏΡ€ΠΈΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅ посрСдством инструмСнтов, входящих Π² состав Linux ΠΈ Π΅Ρ‰Π΅ ΠΌΠ½ΠΎΠ³ΠΎ Ρ‡Π΅Π³ΠΎ интСрСсного.

#book #linux
πŸ‘15πŸ”₯1😒1
Π₯Π°ΠΊΠΈΠ½Π³ Π½Π° LINUX.pdf
27.8 MB
Π₯Π°ΠΊΠΈΠ½Π³ НА LINUX, ΠšΠΎΠ»ΠΈΡΠ½ΠΈΡ‡Π΅Π½ΠΊΠΎ Π”. Н., 2022
πŸ‘5
Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit by Debasish Mandal, 2022

Penetration Testing for Job Seekers is an attempt to discover the way to a spectacular career in cyber security, specifically penetration testing. This book offers a practical approach by discussing several computer and network fundamentals before delving into various penetration testing approaches, tools, and techniques.

Written by a veteran security professional, this book provides a detailed look at the dynamics that form a person's career as a penetration tester. This book is divided into ten chapters and covers numerous facets of penetration testing, including web application, network, Android application, wireless penetration testing, and creating excellent penetration test reports. This book also shows how to set up an in-house hacking lab from scratch to improve your skills.

#book
πŸ‘6
Penetration Testing for Jobseekers.epub
9.6 MB
Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit by Debasish Mandal, 2022
πŸ‘1
Pentester's Promiscuous Notebook - PDF version of GitHub by snovvcrash

ΠŸΡ€Π΅Π΄Ρ‹Π΄ΡƒΡ‰ΠΈΠΉ пост
https://t.iss.one/w2hack/2304

#book #pentest
πŸ”₯6
Pentester's Promiscuous Notebook09.pdf
7 MB
Pentester's Promiscuous Notebook - PDF version of GitHub by snovvcrash
πŸ‘1
Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber, Brad Hibbert

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

#book #pentest
πŸ‘3
Privileged_Attack_Vectors_2018_Haber_M_J__Hibbert_B.pdf
3.7 MB
Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber, Brad Hibbert
πŸ‘1
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python by Hussam Khrais

Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script.

This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is divided into clear bite-sized chunks, so you can learn at your own pace and focus on the areas of most interest to you. This book will teach you how to code a reverse shell and build an anonymous shell. You will also learn how to hack passwords and perform a privilege escalation on Windows with practical examples. You will set up your own virtual hacking environment in VirtualBox, which will help you run multiple operating systems for your testing environment.

#book #python #coding #defensive
πŸ‘5❀1
Python_for_Offensive_PenTest_A_Complete_Practical_Guide_to_Ethical.pdf
7.3 MB
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python by Hussam Khrais
πŸ”₯5
Взгляд с ΠΎΠ±Ρ€Π°Ρ‚Π½ΠΎΠΉ стороны: ΠΊΠ°ΠΊ смотрит Π½Π° ΠΊΠΎΠ΄ рСвСрсСр

Π― Ρ…ΠΎΡ‡Ρƒ Ρ€Π°ΡΡΠΊΠ°Π·Π°Ρ‚ΡŒ, ΠΊΠ°ΠΊ Π½Π° ΠΊΠΎΠ΄ C++ смотрит рСвСрсСр ΠΈ Ρ‡Ρ‚ΠΎ ΠΎΠ½ Π²ΠΈΠ΄ΠΈΡ‚ Π² этом ΠΊΠΎΠΌΠ±Π°ΠΉΠ½Π΅ прСкрасном языкС. ΠžΠ±Ρ‹Ρ‡Π½ΠΎ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Ρ‡ΠΈΠΊ ΠΈΠ΄Π΅Ρ‚ ΠΎΡ‚ исходного ΠΊΠΎΠ΄Π° ΠΊ Π΄Π²ΠΎΠΈΡ‡Π½ΠΎΠΌΡƒ, Π° ΠΌΡ‹ β€” Π½Π°ΠΎΠ±ΠΎΡ€ΠΎΡ‚. Ко ΠΌΠ½Π΅ ΠΈ ΠΊΠΎΠ»Π»Π΅Π³Π°ΠΌ ΠΏΡ€ΠΈΠ΅Π·ΠΆΠ°ΡŽΡ‚ самплы β€” ΡƒΠΆΠ΅ скомпилированныС исполняСмыС (PE, ELF, etc.) Ρ„Π°ΠΉΠ»Ρ‹, Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ, ΠΊΠ°ΠΊΠΎΠΉ-Ρ‚ΠΎ Π±Π°ΠΉΡ‚ΠΊΠΎΠ΄ ΠΎΠ΄Π½ΠΎΠ³ΠΎ ΠΈΠ· intermediate languages ΠΈΠ»ΠΈ Π΄Π°ΠΆΠ΅ ΠΏΡ€ΠΎΡˆΠΈΠ²ΠΊΠ°.

Π˜ΡΡ‚ΠΎΡ‡Π½ΠΈΠΊ
https://habr.com/ru/company/kaspersky/blog/680696/

#reverse #coding
πŸ‘6
cheat.sh - это ΠΎΠ½Π»Π°ΠΉΠ½ΠΎΠ²Ρ‹ΠΉ сСрвис, ΠΊ ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌΡƒ ΠΌΠΎΠΆΠ½ΠΎ ΠΎΠ±Ρ€Π°Ρ‰Π°Ρ‚ΡŒΡΡ ΠΈΠ· ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΎΠΉ строки ΠΈ ΠΈΡΠΊΠ°Ρ‚ΡŒ ΠΏΠΎ Π²Π½ΡƒΡˆΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠΉ ΠΊΠΎΠ»Π»Π΅ΠΊΡ†ΠΈΠΈ ΠΈΠ· Ρ‡ΠΈΡ‚-ΡˆΠΈΡ‚ΠΎΠ², собранных силами сообщСства. Бюда Π²Ρ…ΠΎΠ΄ΠΈΡ‚ ΠΎΠΊΠΎΠ»ΠΎ тысячи ΠΊΠΎΠΌΠ°Π½Π΄ Unix/Linux ΠΈ 55 языков программирования. А Ссли этого окаТСтся нСдостаточно, Ρ‚ΠΎ Π² Π΄Π΅Π»ΠΎ ΠΏΠΎΠΉΠ΄Π΅Ρ‚ наш Π»ΡŽΠ±ΠΈΠΌΡ‹ΠΉ Stack Overflow.

Official page
cheat.sh

GitHub
https://github.com/chubin/cheat.sh

Extra
https://betterprogramming.pub/cheat-sh-the-ultimate-multi-language-cheat-sheet-8e97c16407aa

#useful
πŸ”₯19πŸ‘3