white2hack πŸ“š
12.5K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
ΠšΠΈΠ±Π΅Ρ€Π±Π΅Π·. Книги, Π³Π°ΠΉΠ΄Ρ‹, how to, Π»ΠΈΠΊΠ±Π΅Π·. Аналитика, Ρ‚Ρ€Π΅Π½Π΄Ρ‹, ΠΊΠ°Ρ€ΡŒΠ΅Ρ€Π°, эвСнты. Π­Ρ‚ΠΈΡ‡Π½Ρ‹ΠΉ Ρ…Π°ΠΊΠΈΠ½Π³ ΠΈ Π·Π°Ρ‰ΠΈΡ‚Π° своих Π΄Π°Π½Π½Ρ‹Ρ…

πŸ”Š Бвязь @w2hack_feed_bot
πŸ’¬ Π§Π°Ρ‚ https://t.iss.one/+VdkEIWudTi5m3dsA
πŸ’‘ ΠšΠΎΠ½ΡΡƒΠ»ΡŒΡ‚Π°Ρ†ΠΈΡ https://forms.gle/iB9iX3BwyxJM4Ktx5
πŸ› ОбмСн -- private --
Download Telegram
Ubuntu Llnux с нуля, Π‘Π΅Ρ€Π³Π΅ΠΉ Π’ΠΎΠ»ΠΎΡ…, 2-Π΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅, 2021

Π‘ ΠΏΠΎΠ·ΠΈΡ†ΠΈΠΈ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Ρ рассмотрСна Ρ€Π°Π±ΠΎΡ‚Π° Π² популярной ОБ Ubuntu Linux, Π² Ρ‚ΠΎΠΌ числС установка ΠΈ настройка систСмы, Π΄Ρ€Π°ΠΉΠ²Π΅Ρ€ΠΎΠ² для Ρ€Π°Π±ΠΎΡ‚Ρ‹ с ΠΏΡ€ΠΈΠ½Ρ‚Π΅Ρ€Π°ΠΌΠΈ, с ΡŽΠ·Π΅Ρ€Π°ΠΌΠΈ ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΠΌ ΠΏΠ΅Ρ€ΠΈΡ„Π΅Ρ€ΠΈΠΉΠ½Ρ‹ΠΌ ΠΎΠ±ΠΎΡ€ΡƒΠ΄ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ. Описан процСсс установки ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌ ΠΈ настройка ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ ΠΊ Π˜Π½Ρ‚Π΅Ρ€Π½Π΅Ρ‚Ρƒ. Π”Π°Π½Ρ‹ совСты ΠΏΠΎ использованию графичСского Ρ€Π΅ΠΆΠΈΠΌΠ° ΠΈ ΠΊΠΎΠΌΠ°Π½Π΄Π½ΠΎΠΉ строки. ΠžΠΏΠΈΡΠ°Π½Ρ‹ систСмныС слуТбы Ubuntu Linux, освСщСны вопросы ΠΏΠΎ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΡΠΊΠΈΠΌ ΠΏΡ€Π°Π²Π°ΠΌ доступа.

ΠŸΡ€ΠΈΠ²Π΅Π΄Π΅Π½Π° информация ΠΏΠΎ поиску нСисправностСй Ρ€Π°Π±ΠΎΡ‚Ρ‹ сСти ΠΈ ΡƒΡΡ‚Ρ€Π°Π½Π΅Π½ΠΈΡŽ сбоСв систСмы. ΠœΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π» ΠΊΠ½ΠΈΠ³ΠΈ Π°ΠΊΡ‚ΡƒΠ°Π»Π΅Π½ ΠΈ ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈΠΌ для Ρ€Π°Π±ΠΎΡ‚Ρ‹ с Π΄Ρ€ΡƒΠ³ΠΈΠΌΠΈ LinuΡ…-ΠΏΠΎΠ΄ΠΎΠ±Π½Ρ‹ΠΌΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹ΠΌΠΈ систСмами.

#linux #book #newbie
πŸ‘7
Ubuntu Linux с нуля.pdf
42.7 MB
Ubuntu Llnux с нуля, Π‘Π΅Ρ€Π³Π΅ΠΉ Π’ΠΎΠ»ΠΎΡ…, 2-Π΅ ΠΈΠ·Π΄Π°Π½ΠΈΠ΅, 2021
πŸ‘3
The Nmap cookbook: Beat the Beast by Nima Shahmoradi, Nasim Kangari, 2022

To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation. Nmap is the scanner that other scanners are measured against. it is an indispensable tool that all techies should know well. It is used by all ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. This book is based on real experiences using Nmap in network security tests on a huge variety of networks. In the end, you will have the information you need to safely and effectively scan networks for vulnerabilities, services, and hosts.

#book
πŸ‘5
The Nmap cookbook Beat the Beast.epub
10.3 MB
The Nmap cookbook: Beat the Beast by Nima Shahmoradi, Nasim Kangari, 2022
❀4
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats by Mark Dunkerley, Matt Tumbarello

Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions.

What you will learn
+ Understand baselining and learn the best practices for building a baseline
+ Get to grips with identity management and access management on Windows-based systems
+ Delve into the device administration and remote management of Windows-based systems
+ Explore security tips to harden your Windows server and keep clients secure
+ Audit, assess, and test to ensure controls are successfully applied and enforced
+ Monitor and report activities to stay on top of vulnerabilities

#windows #book #hardening
πŸ‘7πŸ”₯1πŸ‘1
Mastering Windows Security and Hardening.epub
44.8 MB
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats by Mark Dunkerley, Matt Tumbarello
πŸ‘3πŸ”₯1
DevSecOps AwesomeList for newbie

Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe

GitHub
https://github.com/hahwul/DevSecOps

#SecDevOps
πŸ”₯7πŸ‘1
Ну, Ρ‡Ρ‚ΠΎ Π΄Ρ€ΡƒΠ·ΡŒΡ, ΡƒΠΆΠ΅ Π½Π° этой августовской Π½Π΅Π΄Π΅Π»Π΅ Π² Ρ‡Π΅Ρ‚Π²Π΅Ρ€Π³ ΠΈ пятницу Π² МосквС локация Loft Hall ΠΏΡ€ΠΎΠΉΠ΄Π΅Ρ‚ ΠΊΠΎΠ½Ρ„Π° OffZone 2022. И срСди @w2hack ΠΊΠΎΠΌΡŒΡŽΠ½ΠΈΡ‚ΠΈ Π΅ΡΡ‚ΡŒ 2 счастливчика, ΠΊΡ‚ΠΎ ΠΈΠ΄Π΅Ρ‚ Ρ‚ΡƒΠ΄Π° с ΠΏΠΎΠ΄Π°Ρ€ΠΎΡ‡Π½Ρ‹ΠΌ Π±ΠΈΠ»Π΅Ρ‚ΠΎΠΌ.

Надо ΡΠΊΠ°Π·Π°Ρ‚ΡŒ, Ρ‡Ρ‚ΠΎ тСхничСских Π·Π°Π΄Π°Π½ΠΈΠΉ Π½Π΅ Π±Ρ‹Π»ΠΎ Π²ΠΎΠΎΠ±Ρ‰Π΅, Π° вопросы конкурса Π±Ρ‹Π»ΠΈ простыС, ΠΈ ΠΊΠ°ΠΆΠ΄Ρ‹ΠΉ ΠΈΠΌΠ΅Π» Ρ€Π΅Π°Π»ΡŒΠ½Ρ‹ΠΉ шанс ΠΏΠΎΡƒΡ‡Π°ΡΡ‚Π²ΠΎΠ²Π°Ρ‚ΡŒ ΠΈ Π²Ρ‹ΠΈΠ³Ρ€Π°Ρ‚ΡŒ! НуТно Π±Ρ‹Π»ΠΎ ΠΏΡ€ΠΈΠ»ΠΎΠΆΠΈΡ‚ΡŒ Π½Π΅ΠΌΠ½ΠΎΠ³ΠΎ усилий. А ΠΊΡ‚ΠΎ ΠΆΠ΅ просто постарался Ρ‡ΡƒΡ‚ΡŒ большС? - Π²ΠΎΡ‚ эти ΠΈΠΌΠ΅Π½Π° (Π½ΠΈΠΊΠ½Π΅ΠΉΠΌ Π² Π°Π½ΠΊΠ΅Ρ‚Π΅):

1. avlllo
2. MANDR

ΠŸΠΎΠ±Π΅Π΄ΠΈΡ‚Π΅Π»ΠΈ конкурса, поТалуйста, Π² ΠΊΡ€Π°Ρ‚Ρ‡Π°ΠΉΡˆΠ΅Π΅ врСмя ΡΠ²ΡΠΆΠΈΡ‚Π΅ΡΡŒ Ρ‡Π΅Ρ€Π΅Π· @w2hack_feed_bot для получСния Π±ΠΈΠ»Π΅Ρ‚Π°.

#info
❀4πŸ‘3πŸ‘1
Vulmap is an open-source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also, they can be used for privilege escalation by pentesters/red teamers.

GitHub
https://github.com/vulmon/Vulmap

#hacktools
πŸ‘7
Forwarded from RuSecJobs Channel
Π“Ρ€ΡƒΠΏΠΏΠ° CV Cybersecurity создана для людСй, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ хотят Π½Π°ΠΉΡ‚ΠΈ Ρ€Π°Π±ΠΎΡ‚Ρƒ Π² сфСрС ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности. МоТно Π²Ρ‹Π»ΠΎΠΆΠΈΡ‚ΡŒ Ρ€Π΅Π·ΡŽΠΌΠ΅ (ΠΏΡ€ΠΈΠΌΠ΅Ρ€ - https://hh.ru/article/3015367/). НапримСр, ΡƒΠΊΠ°Π·Π°Ρ‚ΡŒ свой Π½ΠΈΠΊ Π² Telegram для связи для Π°Π½ΠΎΠ½ΠΈΠΌΠ½ΠΎΠ³ΠΎ поиска Ρ€Π°Π±ΠΎΡ‚Ρ‹.

Бсылка - https://t.iss.one/cvcyber
πŸ‘5πŸ‘2
Database Security Problems and Solutions, Christopher Diaz, Ph.D., 2022

Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database securityconsiders and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints.

Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows)

#book #windows #linux #defensive
πŸ‘5❀2
Database Security.pdf
14.7 MB
Database Security Problems and Solutions, Christopher Diaz, Ph.D., 2022
❀7
Π‘ΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Π°Ρ инТСнСрия ΠΈ этичный Ρ…Π°ΠΊΠΈΠ½Π³ Π½Π° ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ΅, Π”ΠΆΠΎ Π“Ρ€Π΅ΠΉ, 2022

Π­Ρ‚Π° ΠΊΠ½ΠΈΠ³Π° ΠΏΠΎΠΌΠΎΠΆΠ΅Ρ‚ Π²Π°ΠΌ Π»ΡƒΡ‡ΡˆΠ΅ ΠΏΠΎΠ½ΡΡ‚ΡŒ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹, Π»Π΅ΠΆΠ°Ρ‰ΠΈΠ΅ Π² основС Π°Ρ‚Π°ΠΊ ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΈΠΈ, ΠΈ ΡƒΠ·Π½Π°Ρ‚ΡŒ, ΠΊΠ°ΠΊ ΠΏΠΎΠΌΠ΅ΡˆΠ°Ρ‚ΡŒ кибСрпрСступникам ΠΈ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ°ΠΌ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ чСловСчСскиС слабости Π² своих цСлях.

Π”ΠΆΠΎ Π“Ρ€Π΅ΠΉ, ΠΎΡ‚ΠΌΠ΅Ρ‡Π΅Π½Π½Ρ‹ΠΉ Π½Π°Π³Ρ€Π°Π΄Π°ΠΌΠΈ экспСрт Π² области ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΈΠΈ, дСлится ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π°ΠΌΠΈ ΠΈΠ· ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΈ, ΠΏΠ΅Ρ€Π΅Π΄ΠΎΠ²Ρ‹ΠΌ ΠΎΠΏΡ‹Ρ‚ΠΎΠΌ, инструмСнтами Π°Π½Π°Π»ΠΈΡ‚ΠΈΠΊΠΈ с ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹ΠΌ исходным ΠΊΠΎΠ΄ΠΎΠΌ (OSINT), Π·Π°Π³ΠΎΡ‚ΠΎΠ²ΠΊΠ°ΠΌΠΈ для ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π°Ρ‚Π°ΠΊ ΠΈ шаблонами ΠΎΡ‚Ρ‡Π΅Ρ‚ΠΎΠ², Ρ‡Ρ‚ΠΎΠ±Ρ‹ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ ΠΌΠΎΠ³Π»ΠΈ Π»ΡƒΡ‡ΡˆΠ΅ Π·Π°Ρ‰ΠΈΡ‚ΠΈΡ‚ΡŒ сСбя. Он описываСт творчСскиС ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΠΎΠ±ΠΌΠ°Π½Π½Ρ‹ΠΌ ΠΏΡƒΡ‚Π΅ΠΌ Π²Ρ‹ΠΌΠ°Π½ΠΈΡ‚ΡŒ Ρƒ ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Π΅ΠΉ ΠΈΡ… ΡƒΡ‡Π΅Ρ‚Π½Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅: использованиС сцСнариСв Python ΠΈ Ρ€Π΅Π΄Π°ΠΊΡ‚ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ Ρ„Π°ΠΉΠ»ΠΎΠ² HTML для клонирования лСгального Π²Π΅Π±-сайта.

#book #OSINT
❀10πŸ‘5
Π‘ΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Π°Ρ_инТСнСрия_ΠΈ_этичный_Ρ…Π°ΠΊΠΈΠ½Π³_Π½Π°_ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ΅.pdf
62.3 MB
Π‘ΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Π°Ρ инТСнСрия ΠΈ этичный Ρ…Π°ΠΊΠΈΠ½Π³ Π½Π° ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ΅, Π”ΠΆΠΎ Π“Ρ€Π΅ΠΉ, 2022
❀8πŸ‘5