white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://t.iss.one/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
SQL инъекции и тестирование баз данных для начинающих, Mefodiy Kelevra (Udemy), 2024 (2018 leak)

На этом курсе Вы познакомитесь с основами тестирования баз данных на проникновение! Научитесь находить и эксплуатировать уязвимости инъекций SQL! Мы изучим просты инъекции SQL, инъекции слепым методом, методом Time - based а так же encoded based

Научимся использовать sqlmap чтобы автоматизировать тестирование на проникновение!

❗️Официальная страничка

#education #web
👍5🤷‍♂2🔥2
Advanced Web Penetration Testing Certification, Hack The Box Academy, 2024

HTB Certified Web Exploitation Expert (HTB CWEE) is a highly hands-on certification that assesses candidates' skills in identifying advanced and hard-to-find web vulnerabilities using both black box and white box techniques.

HTB CWEE certification holders will possess technical competency in the web security, web penetration testing, and secure coding domains at an advanced level and be well-versed in the application debugging, source code review, and custom exploit development aspects of web security testing.

They will also be able to professionally conduct web penetration tests against modern and highly secure web applications, as well as report vulnerabilities found in code or arising from logical errors.

❗️Official page

Passwords: @hindsec

#education #web
🔥6🤝21👍1
A Beginner's Guide To Web Application Penetration Testing, Ali Abdollahi, 2025

You'll learn about common vulnerabilities and how to perform a variety of effective attacks on web applications. Consistent with the approach publicized by the Open Web Application Security Project (OWASP), the book explains how to find, exploit and combat the ten most common security vulnerability categories, including broken access controls, cryptographic failures, code injection, security misconfigurations, and more.

You will also learn to identify and exploit vulnerabilities using automated tools and manual testing methodologies. The book provides hands-on guidance on using leading web application security tools, such as Burp Suite, OWASP ZAP, and Nmap. It covers how to conduct common attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF), required for a practical understanding of web application vulnerabilities.

Beyond just identifying vulnerabilities, the book guides on analyzing testing results to improve the security measures of web applications systematically. It explores web application security frameworks and standards, helping you to align your security practices with industry-recognized guidelines. The book focuses on practical exercises and real-world examples, making it an essential tool for anyone looking to understand or improve the security of web applications. This hands-on approach ensures that you can translate theoretical knowledge into actionable skills.

❗️GitHub
⚠️OVA download
⛳️YouTube

#book #web
3👍6🤝2
👩‍💻 Attacking and defensing Nginx

Nginx, a popular web server and reverse proxy, is a critical component in many web infrastructures, making it a prime target for attacks. To secure Nginx, it’s crucial to apply best practices in configuration.

📌 Missing Root Location in Nginx Configuration:
- Explanation;
- The Missing Root Location Issue.

📌 Attack Scenario: Exploiting the Missing Root Location:
- Mitigating the Risk.

📌 Unsafe Path Restriction in Nginx:
- Explanation;
- Potential Bypass Techniques;
- Attack Scenario: Exploiting Path Restriction Bypass;
- Mitigation Strategies.

📌 Unsafe variable use / HTTP Request Splitting:
- Unsafe Use of Variables: $uri and $document_uri;
- Regex Vulnerabilities;
- Safe Configuration;
- Attack Scenarios and Detection Techniques;
- CRLF Injection and HTTP Request Splitting;
- Bypassing Path Restrictions Using Encoded Characters;
- Examples of Vulnerable Configurations.

📌 Raw Backend Response Reading:
- Example Scenario: Exposing Raw Backend Responses;
- Example uWSGI Application;
- Nginx Configuration;
- Example Invalid HTTP Request;
- Example Output for Invalid Request;
- Attack Scenario;
- Mitigation Strategies.

📌 merge_slashes set to off:
- merge_slashes Directive;
- Malicious Response Headers;
- map Directive Default Value;
- DNS Spoofing Vulnerability;
- proxy_pass and internal Directives.

📌 proxy_set_header Upgrade & Connection:
- Vulnerable Configuration;
- Vulnerability;
- Attack Scenario;
- Mitigation;
- Additional Attack Scenarios and Commands.

#hardening #web #linux
Please open Telegram to view this post
VIEW IN TELEGRAM
5🔥5👍3🤡1
Краткий справочник тестировщика, Дмитрий Самойлов, 2023

Данная книга является кратким справочником для тестировщиков, который позволит ознакомиться с основами тестирования, методами и инструментами тестирования, а также с процессом тест-планирования и тест-дизайна.

Кроме того, в книге описаны особенности тестирования в Agile, приведен краткий обзор автоматизации тестирования и инструментов, обзор тестирования безопасности (OWASP Top10), производительности и особенностей тестирования мобильных и web-приложений.

#book #web #mobile
👍5
Security Training for Web Developers by HackSplaining

Completely free, comprehensive security training for web developers. Covers every major security vulnerability you are likely to face. Concrete, no-nonsense advice for the developer in a hurry.

❗️The lessons + OWASP classificatory
📌The book

#web #AppSec
🔥64👏2👨‍💻1
Exploitology: Web Apps Exploits: Exploitation strategies for pentesters, Mahdi Alemi, 2025

The book focusing on vulnerabilities, exploitation methods, and advanced strategies. With practical examples and real-world scenarios, this book helps readers understand, exploit, and defend against web app threats. Whether you're new to security or an experienced pro, it sharpens your penetration testing skills for the evolving cybersecurity world.

Exploitology explores various common vulnerabilities such as Cross-Site Scripting (XSS), SQL Injection, Server-Side Request Forgery (SSRF), and many more well-known and emerging vulnerabilities. In addition, it delves into the concepts of attack analysis and how to exploit these vulnerabilities, simulating attacks in controlled environments, and using these exploits to strengthen the defensive capabilities of systems and networks.

This book is not only a comprehensive guide for security professionals but also a valuable resource for those looking to enter the field. Whether you are an experienced security expert looking to master advanced exploitation techniques or a newcomer wanting to learn the fundamentals of web security and penetration testing, this book provides the knowledge and practical insights you need.

Ultimately, the goal of this book is to teach readers how to effectively simulate, analyze, and use vulnerabilities in real-world scenarios. Furthermore, it will help you develop strong defensive strategies to protect against these attacks. Exploitology will accompany you on your journey through the intricate and ever-changing world of cybersecurity.

You should be comfortable with the fundamentals of programming. It’s not necessary to be an expert, but familiarity with at least one programming language will be highly beneficial.

❗️Official page

#book #web #coding
Тестирование безопасности, тренер: Арсений Батыров, приглашенный эксперт: Виталий Котов, 2020/2025

Тестирование безопасности — одна из наиболее интересных тем во всей профессии тестировщика. Здесь пересекаются знания теории тестирования, поведения приложений, человеческой психологии и распространенных компьютерных ошибок.

❗️Официальный сайт
➡️Загрузить с Mail.Cloud

#education #web
Please open Telegram to view this post
VIEW IN TELEGRAM
THE OWASP TOP TEN: A RESTAURANT TALE by MoS, 2025

This document uses a restaurant analogy to illustrate the OWASP Top Ten application security vulnerabilities, highlighting common application security flaws.

From a guest 𝘀𝗻𝗲𝗮𝗸𝗶𝗻𝗴 𝗶𝗻𝘁𝗼 𝘁𝗵𝗲 𝗸𝗶𝘁𝗰𝗵𝗲𝗻 (𝗕𝗿𝗼𝗸𝗲𝗻 𝗔𝗰𝗰𝗲𝘀𝘀 𝗖𝗼𝗻𝘁𝗿𝗼𝗹), to 𝗰𝗵𝗲𝗳𝘀 𝘂𝘀𝗶𝗻𝗴 𝗽𝗼𝗶𝘀𝗼𝗻𝗲𝗱 𝗺𝘂𝘀𝗵𝗿𝗼𝗼𝗺𝘀 (Insecure Design), this creative MoS guide serves you the most critical web vulnerabilities, plated with real-world analogies that even your grandma would get.

Simple
Visual
Memorable

#web #fun
Comprehensive Guide on Unrestricted File Upload

"Upload Here” or “Drag Your File To Upload” you might have seen these two phrases almost everywhere, whether you are se􀆫ng up your profile picture or you are simply applying for a job. Developers scripts up File Upload HTML forms, which thus allows its users to upload files over onto the web-server. However, this ease might bring up the danger, if he does not validate what files are being uploaded.

Atackers exploit file upload vulnerabili􀆟es, which are major problems within web-based applica􀆟ons. In many web servers, this vulnerability relies en􀆟rely on inten􀆟on, enabling an atacker to upload a file containing malicious code that can then execute on the server.

#web
2