Comunidad Pen7esting
3.58K subscribers
510 photos
40 videos
142 files
5.08K links
Download Telegram
https://t.me/Pen7es7ing

Link del chat de grupo Anonimo501.
movie night pic.twitter.com/7CAxDbSyzb
— picolo (@_gabrielpicolo) July 6, 2020
Vulnerabilities in MikroTik's RouterOS (PoCs):
1. Memory corruption/assertion failure in console process
https://seclists.org/fulldisclosure/2020/Apr/7
2. Null Pointer Dereference/Division-By-Zero
https://packetstormsecurity.com/files/158359/mikrotik-nulldiv.txt
Suscribete y Comparte el canal entre mas suscriptores tenga mas contenido se subira.

Gracias y un saludo.

https://m.youtube.com/channel/UCnyWt6WHB8FyFX2N36uqWUg/videos
Web App Penetration Testing "Bug Bounty" Roadmap
1. What is bug bounty?
Identification and reporting of bugs and vulns in a responsible way.
+All depends on interest and hardwork, not on degree, age, branch, college, etc.
2. What to study?
1. Internet, HTTP, TCP/IP
2. Networking ( CCNA )
3. Command line
4. Linux
5. Web technologies, "JAVASCRIPT" "PHP" "SQL"
6. Atleast 1 prog language (Python/C/JAVA/Ruby..)
3. Choose your path (imp)
1. Web pentesting
2. Mobile pentesting
3. Desktop apps
4. Resources
Books
For web
1. Web app hackers handbook
2. Web hacking 101
3. Hacker's playbook 1,2,3
4. Hacking art of exploitation
5. Mastering modern web pen testing
6. OWASP Testing guide
For mobile
1.Mobile application hacker's handbook
Youtube channels
1. Hacking
1. Live Overflow
2. Hackersploit
3. Bugcrowd
4. Hak5
5. Hackerone
2. Programming
1. thenewboston
2. codeacademy
3. Writeups, Articles, blogs
1. Medium (infosec writeups)
2. Hackerone public reports
3. owasp.org
4. Portswigger
5. Reddit (Netsec)
6. DEFCON conference videos
7. Forums
5. Practice (imp)
1. Tools
1. Burpsuite
2. nmap
3. dirbuster
4. sublist3r
5. Netcat
2. Testing labs
1. DVWA
2. bWAPP
3. Vulnhub
4. Metasploitable
5. CTF365
6. Hack the box
6. Start!
1. Select a platform
1. Hackerone
2. Bugcrowd
3. Open bug bounty
4. Zerocopter
5. Antihack
6. Synack (private)
Road:📷
1. Choose wisely (first not for bounty)
2. Select a bug for hunt
3. Exhaustive search
4. Not straightforward always
REPORT:
5. Create a descriptive report
6. Follow responsible disclosure
7. Create POC and steps to reproduce
Words of wisdom
1. PATIENCE IS THE KEY, takes years to master, don't fall for overnight success
2. Do not expect someone will spoon feed you everything.
3. Confidence
4. Not always for bounty
5. Learn a lot
6. Won't find at the beginning, don't lose hope
7. Stay focused
8. Depend on yourself
9. Stay updated with infosec world
Amazon, Arduino, CompTIA, Computer Forensics, Hacking and PenTesting, IoT, Linux, Microsoft Courses, Networking, Programming, Security, Virtualization, VoIP


https://mega.nz/folder/4EZQACQY#0XA_5iNdP8F7FqB_lnj33Q
😁1
Buenos dias.

Les comparto un script que cree llamado RogueAP en bash de linux el cual se encarga de la instalacion automatizada y ejecucion el cual monta un punto de acceso falso wifi esta en su version 1.0 por lo cual con ayuda de wireshrak se podran obtener contraseñas de protocolos inseguros tales como http, ftp, telnet, etc. Solo se debe ingresar la informacion que pide el script el cual es solo para la configuracion que desea darle el creador de AP.

Ejecucion.

git clone https://github.com/Anonimo501/RogueAP

cd RogueAP
chmod +x RogueAP
./RogueAP
https://drive.google.com/drive/folders/1l_4tpdN7PvwdXdY36ek7mcsz0mTmlOqc

2TB de cursos variados de todo tipo👌👌👌
Citrix Releases Critical Software Patches for 11 New Security Vulnerabilities Affecting ADC, Gateway, and SD-WAN WANOP Appliances.

Read More: https://thehackernews.com/2020/07/citrix-software-security-update.html
Research:
Citrix ADC/NetScaler Gateway Vulnerability Details (CVE-2020-8194) (PoC)
https://dmaasland.github.io/posts/citrix.html