white2hack πŸ“š
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
ΠšΠΈΠ±Π΅Ρ€Π±Π΅Π·. Книги, Π³Π°ΠΉΠ΄Ρ‹, how to, Π»ΠΈΠΊΠ±Π΅Π·. Аналитика, Ρ‚Ρ€Π΅Π½Π΄Ρ‹, ΠΊΠ°Ρ€ΡŒΠ΅Ρ€Π°, эвСнты. Π­Ρ‚ΠΈΡ‡Π½Ρ‹ΠΉ Ρ…Π°ΠΊΠΈΠ½Π³ ΠΈ Π·Π°Ρ‰ΠΈΡ‚Π° своих Π΄Π°Π½Π½Ρ‹Ρ…

πŸ”Š Бвязь @w2hack_feed_bot
πŸ’¬ Π§Π°Ρ‚ https://t.iss.one/+VdkEIWudTi5m3dsA
πŸ’‘ ΠšΠΎΠ½ΡΡƒΠ»ΡŒΡ‚Π°Ρ†ΠΈΡ https://forms.gle/iB9iX3BwyxJM4Ktx5
πŸ› ОбмСн -- private --
Download Telegram
БША Π·Π°ΠΏΡ€Π΅Ρ‚ΠΈΠ»ΠΈ ΠΎΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ IT-услуги ΠΈ ΠΏΡ€ΠΎΠ΄Π°Π²Π°Ρ‚ΡŒ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ ПО Π»ΡŽΠ±ΠΎΠΌΡƒ Π»ΠΈΡ†Ρƒ Π² России

Π’Π²Π΅Π΄Π΅Π½ΠΎ Π±ΠΎΠ»Π΅Π΅ 300 Π½ΠΎΠ²Ρ‹Ρ… ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½ΠΈΠΉ Π½Π° доступ российского Π’ΠŸΠš ΠΊ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Ρ‘Π½Π½ΠΎΠΌΡƒ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠΌΡƒ ΠΎΠ±Π΅ΡΠΏΠ΅Ρ‡Π΅Π½ΠΈΡŽ ΠΈ ИВ-услугам. Π˜ΡΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ ΡΠ΄Π΅Π»Π°ΡŽΡ‚ для ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΉ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ находятся Π² собствСнности ΠΈΠ»ΠΈ ΠΏΠΎΠ΄ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»Π΅ΠΌ Π³Ρ€Π°ΠΆΠ΄Π°Π½ΠΈΠ½Π° БША.

ΠžΠ΄Π½ΠΎΠ²Ρ€Π΅ΠΌΠ΅Π½Π½ΠΎ ΠœΠΈΠ½Ρ‚ΠΎΡ€Π³ БША Π²Π²Π΅Π» Π½ΠΎΠ²Ρ‹Π΅ ограничСния Π½Π° поставку ПО Π² Россию ΠΈ Π‘Π΅Π»ΠΎΡ€ΡƒΡΡΠΈΡŽ. Под Π·Π°ΠΏΡ€Π΅Ρ‚ ΠΏΠΎΠΏΠ°Π΄Π°ΡŽΡ‚ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹ для планирования рСсурсов прСдприятия, управлСния связями с ΠΊΠ»ΠΈΠ΅Π½Ρ‚Π°ΠΌΠΈ, бизнСс-Π°Π½Π°Π»ΠΈΡ‚ΠΈΠΊΠΈ, управлСния Ρ†Π΅ΠΏΠΎΡ‡ΠΊΠ°ΠΌΠΈ поставок, управлСния ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π°ΠΌΠΈ, Π° Ρ‚Π°ΠΊΠΆΠ΅ Ρ…Ρ€Π°Π½ΠΈΠ»ΠΈΡ‰Π° ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… ΠΈ ПО для модСлирования ΠΈ контроля Π½Π° производствС.

Π’Π°ΠΊΠΆΠ΅ ΠœΠΈΠ½Ρ„ΠΈΠ½ БША объявил ΠΎ Π²Π²Π΅Π΄Π΅Π½ΠΈΠΈ ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… ΠΌΠ΅Ρ€ Π² ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΠΈ 41 китайской ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ (Π² основном тСхнологичСских) Π·Π° поставки Π² Россию ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ†ΠΈΠΈ Π΄Π²ΠΎΠΉΠ½ΠΎΠ³ΠΎ назначСния.

Π˜ΡΡ‚ΠΎΡ‡Π½ΠΈΠΊΠΈ:
3N + Π Π‘Πš + Lenta + CNews + Ved

Π”ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ:
(+) МнСниС экспСртов ΠΎ Π±Π»ΠΎΠΊΠΈΡ€ΠΎΠ²ΠΊΠ΅ (ΠΊΠΎΠ³ΠΎ коснСтся ΠΈ сроки)
(+) БША Π²Π²Π΅Π»ΠΈ санкции ΠΏΡ€ΠΎΡ‚ΠΈΠ² ΠœΠΎΡΠ±ΠΈΡ€ΠΆΠΈ
(+) БША ΡƒΠ½ΠΈΡ‡Ρ‚ΠΎΠΆΠΈΠ»ΠΈ достояниС России (Π“Π°Π·ΠŸΡ€ΠΎΠΌ)
(+) ΠžΡ‚Ρ‡Π΅Ρ‚ Π“Π°Π·ΠΏΡ€ΠΎΠΌΠ°. Π’Ρ€ΡƒΠΏΠ½Ρ‹ΠΉ Π·Π°ΠΏΠ°Ρ… усиливаСтся
(+) РоссийскоС производство Ρ‡ΠΈΠΏΠΎΠ² отстаёт ΠΎΡ‚ амСриканского Π½Π° 20 Π»Π΅Ρ‚
(+) РоссиянС Π·Π°ΠΊΠ»Π°Π΄Ρ‹Π²Π°ΡŽΡ‚ ΠΌΠ°ΡˆΠΈΠ½Ρ‹ Ρ‡Ρ‚ΠΎ Π±Ρ‹ Ρ€Π°ΡΠΏΠ»Π°Ρ‚ΠΈΡ‚ΡŒΡΡ с ΠΊΡ€Π΅Π΄ΠΈΡ‚Π°ΠΌΠΈ

#event
πŸ”₯12🀑11❀1😁1😱1🫑1
The Art of Hacking by Omar Santos, 2024

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.

GitHub
Official page
About author

#education #useful
πŸ‘4πŸ‘2❀1
Pentesting Azure Applications. The Definitive Guide to Testing and Securing Deployments by Matt Burrough, 2018

A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.

Packed with real-world examples from the author's experience as a corporate penetration tester, sample scripts from pen-tests and "Defenders Tips" that explain how companies can reduce risk, Pentesting Azure Applications provides a clear overview of how to effectively perform security tests so that you can provide the most accurate assessments possible.

#book #SecDevOps #pentest
πŸ”₯4πŸ‘3
Pentesting_Azure_Applications_The_Definitive_Guide_to_Testing_and.pdf
5 MB
Pentesting Azure Applications. The Definitive Guide to Testing and Securing Deployments by Matt Burrough, 2018
πŸ‘3πŸ”₯3
Mastering Network Forensics: A practical approach to investigating and defending against network attacks by Nipun Jaswal, 2024

Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation.

Written by a seasoned expert with over 15 years of experience, this hands-on guide includes practical exercises in offensive security, Windows internals, reverse engineering, and cyber forensics. The book begins with the basics of network forensics, including concepts like digital evidence, network traffic analysis, and log analysis. It teaches you how to identify intrusion attempts, mitigate cyber incidents, and investigate complex cyber attacks.

#book #forensic #defensive
πŸ‘4πŸ”₯2
Mastering Network Forensics.epub
44.4 MB
Mastering Network Forensics: A practical approach to investigating and defending against network attacks by Nipun Jaswal, 2024
πŸ‘3πŸ”₯3
Secure the Border and Build the Wall. A Compendium of Access Control on Unix-Like OSes by Patrick Louis, 2023-02-28

This article will focus on the topic of access control on Unix-like systems. Sit back and relax as it transports you on a journey of discovery. We’ll unfold the map, travel to different places, allowing to better understand this wide, often misunderstood, and messy territory. The goal of this article is to first and foremost describe what is present, allowing to move forward, especially with the countless possibilities already present. How can we better shape the future if we don’t know the past.

#book #linux #defensive
πŸ‘5πŸ€”1
A Compendium of Access Control on Unix-Like OSes.pdf
3.9 MB
Secure the Border and Build the Wall. A Compendium of Access Control on Unix-Like OSes by Patrick Louis, 2023-02-28
πŸ‘3πŸ™1
Counter-OSINT: руководство ΠΏΠΎ приватности ΠΈ Π·Π°Ρ‰ΠΈΡ‚Π΅ своих Π΄Π°Π½Π½Ρ‹Ρ… Π² Π‘Π΅Ρ‚ΠΈ

Π˜ΡΡ‡Π΅Ρ€ΠΏΡ‹Π²Π°ΡŽΡ‰Π΅Π΅ руководство ΠΏΠΎ приватности ΠΈ ΠΊΠΎΠ½Ρ‚Ρ€-ОБИНВ для Π ΡƒΠ½Π΅Ρ‚Π° ΠΈ всСго БНГ

GitHub + Eng

#OSINT
πŸ”₯7πŸ‘1
Paged Out E-zine

Paged Out! is a free experimental (one article == one page) technical magazine about programming (especially programming tricks!), hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics.

It's made by the community for the community. And it's not-for-profit (though in time, we hope it will be self-sustained) - this means that the issues will always be free to download, share, and print.

Official page
Issues
FAQ
Call for pages!

#useful #fun
πŸ‘5πŸ”₯4
ΠœΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹ΠΉ рСпост. Как соцсСти Π·Π°ΡΡ‚Π°Π²Π»ΡΡŽΡ‚ нас Π²Π΅Ρ€ΠΈΡ‚ΡŒ Ρ„Π΅ΠΉΠΊΠΎΠ²Ρ‹ΠΌ новостям, Борислав Козловский, 2018

Автор ΠΊΠ½ΠΈΠ³ΠΈ, Π½Π°ΡƒΡ‡Π½Ρ‹ΠΉ Турналист, пытаСтся Ρ€Π°Π·ΠΎΠ±Ρ€Π°Ρ‚ΡŒΡΡ: ΠΏΠΎΡ‡Π΅ΠΌΡƒ люди склонны Π²Π΅Ρ€ΠΈΡ‚ΡŒ Ρ„Π΅ΠΉΠΊΠΎΠ²Ρ‹ΠΌ новостям большС, Ρ‡Π΅ΠΌ ΠΏΡ€Π°Π²Π΄ΠΈΠ²ΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ? И ΠΎΡ‚ΠΊΡƒΠ΄Π° Π² нашСм ΠΎΠΊΡ€ΡƒΠΆΠ΅Π½ΠΈΠΈ Ρ‚Π°ΠΊ ΠΌΠ½ΠΎΠ³ΠΎ Π°Π½Ρ‚ΠΈΠΏΡ€ΠΈΠ²ΠΈΠ²ΠΎΡ‡Π½ΠΈΠΊΠΎΠ², сторонников Β«Ρ‚Π°ΠΉΠ½Ρ‹Ρ… Π·Π°Π³ΠΎΠ²ΠΎΡ€ΠΎΠ²Β» ΠΈ ΠΏΡ€ΠΈΠ²Π΅Ρ€ΠΆΠ΅Π½Ρ†Π΅Π² Β«Π°Π»ΡŒΡ‚Π΅Ρ€Π½Π°Ρ‚ΠΈΠ²Π½ΠΎΠΉ ΠΌΠΈΡ€ΠΎΠ²ΠΎΠΉ истории»?

Π­Ρ‚Π° ΠΊΠ½ΠΈΠ³Π° ΠΏΠΎΠΌΠΎΠ³Π°Π΅Ρ‚ ΠΏΠΎΠ½ΡΡ‚ΡŒ, ΠΊΠ°ΠΊ ΠΏΡ€Π°Π²ΠΈΠ»ΡŒΠ½ΠΎ ΠΎΡ€ΠΈΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ Π² ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΠΈΠ· ΡΠΎΡ†ΠΈΠ°Π»ΡŒΠ½Ρ‹Ρ… сСтСй, отсСивая Ρ‚ΠΎΠ½Π½Ρ‹ Π»ΠΆΠΈ ΠΈ вычлСняя ΠΊΡ€ΡƒΠΏΠΈΡ†Ρ‹ ΠΏΡ€Π°Π²Π΄Ρ‹. ΠšΡ€ΠΎΠΌΠ΅ Ρ‚ΠΎΠ³ΠΎ, Ρ€Π°Π±ΠΎΡ‚Π° Π·Π½Π°ΠΊΠΎΠΌΠΈΡ‚ Ρ‡ΠΈΡ‚Π°Ρ‚Π΅Π»Π΅ΠΉ с соврСмСнными исслСдованиями Π² области Π³Π΅Π½Π΅Ρ‚ΠΈΠΊΠΈ ΠΈ психологии.

#book #OSINT #privacy
πŸ‘6😁3
ΠœΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹ΠΈΜ† рСпост.pdf
2.9 MB
ΠœΠ°ΠΊΡΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹ΠΉ рСпост. Как соцсСти Π·Π°ΡΡ‚Π°Π²Π»ΡΡŽΡ‚ нас Π²Π΅Ρ€ΠΈΡ‚ΡŒ Ρ„Π΅ΠΉΠΊΠΎΠ²Ρ‹ΠΌ новостям, Борислав Козловский, 2018
πŸ‘5πŸ€”1
Бимулякры ΠΈ симуляция, Π–Π°Π½Π° Бодрийяра, 1981, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015

Π—Π½Π°Π΅Ρ‚Π΅ Π»ΠΈ Π²Ρ‹, какая ΠΊΠ½ΠΈΠ³Π° Π²Π΄ΠΎΡ…Π½ΠΎΠ²ΠΈΠ»Π° Π½Π° созданиС Ρ„ΠΈΠ»ΡŒΠΌΠ° Β«ΠœΠ°Ρ‚Ρ€ΠΈΡ†Π°Β»? Π­Ρ‚ΠΎ ΠΊΠ½ΠΈΠ³Π° Π–Π°Π½Π° Бодрийяра «Бимулякры ΠΈ симуляция». ИмСнно Π΅Π΅ ΠΎΡ‚ΠΊΡ€Ρ‹Π²Π°Π΅Ρ‚ Π² Π½Π°Ρ‡Π°Π»Π΅ Ρ„ΠΈΠ»ΡŒΠΌΠ° НСо.

Π­Ρ‚ΠΎ ΠΏΡ€ΠΎΠΈΠ·Π²Π΅Π΄Π΅Π½ΠΈΠ΅ ΠΏΠΎΠΌΠΎΠ³Π»ΠΎ мноТСству людСй ΠΏΠΎ всСму ΠΌΠΈΡ€Ρƒ Π²Π·Π³Π»ΡΠ½ΡƒΡ‚ΡŒ Π½Π° Π½Π°ΡˆΡƒ Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΡΡ‚ΡŒ с ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΠΈΠ°Π»ΡŒΠ½ΠΎ ΠΈΠ½ΠΎΠΉ стороны, с ΠΏΠΎΠ·ΠΈΡ†ΠΈΠΈ признания Π΅Π΅ Ρ„ΠΈΠΊΡ‚ΠΈΠ²Π½ΠΎΠΉ, поддСльной, Β«ΠΊΠΎΠΏΠΈΠ΅ΠΉ ΠΊΠΎΠΏΠΈΠΈΒ», ΠΈΠ»Π»ΡŽΠ·ΠΎΡ€Π½ΠΎΠΉ субстанциСй, Π° Ρ‚Π°ΠΊΠΆΠ΅ Π²Π΄ΠΎΡ…Π½ΠΎΠ²ΠΈΠ»Π° кинСматографистов Π½Π° созданиС ΠΊΡƒΠ»ΡŒΡ‚ΠΎΠ²ΠΎΠ³ΠΎ Ρ„ΠΈΠ»ΡŒΠΌΠ° Β«ΠœΠ°Ρ‚Ρ€ΠΈΡ†Π°Β».

#book #fun
πŸ‘6πŸ”₯4❀2🀣1
2015_Zhan_Bodriyyar_Simulyakry_I_Simulyatsii.pdf
3.6 MB
Бимулякры ΠΈ симуляция, Π–Π°Π½Π° Бодрийяра, 1981, ΠΈΠ·Π΄Π°Π½ΠΈΠ΅ 2015
πŸ”₯8πŸ‘2
Google Cloud Platform (GCP) Professional Cloud Security Engineer Certification Companion: Learn and Apply Security Design Concepts to Ace the Exam, Dario Cabianca, 2024

Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network.

What You Will Learn:
(+) Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud
(+) Secure identities with Cloud Identity and Identity & Access Management (IAM)
(+) Secure the network with segmentation and private connectivity
(+) Protect sensitive data with the Data Loss Prevention (DLP) API and encryption
(+) Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite
(+) Ensure compliance and address regulatory concerns

#book #SecDevOps #exam
πŸ‘5πŸ”₯1
Google.Cloud.Platform.GCP.2024.pdf
34.7 MB
Google Cloud Platform (GCP) Professional Cloud Security Engineer Certification Companion: Learn and Apply Security Design Concepts to Ace the Exam, Dario Cabianca, 2024
πŸ”₯3πŸ‘2