Ralf Hacker Channel
28.3K subscribers
469 photos
17 videos
503 files
595 links
Пул тегов:
https://t.me/RalfHackerChannel/297

Админ: @hackerralf8
Download Telegram
SEC 642.5 (2020): Advanced Web App Testing, Ethical Hacking, and Exploitation Techniques. pt 5

#sans #cource #web
Please open Telegram to view this post
VIEW IN TELEGRAM
Section5 - Web Application Firewall and Filter Bypass.zip
287.4 MB
1 - Web Application Security Defenses
2 - Developer Created Defenses
3 - Web Framework Defenses
4 - Inline Security Defenses
5 - Figerprint Defenses
6 - Bypassing XSS Defense
7 - Bypassing SQL Injection Defense
👍1
Please open Telegram to view this post
VIEW IN TELEGRAM
SEC 506.1-506.3 (2020): Securing Linux pt1-3

#sans #course #linux #defence #blueteam #pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
1. Linux Hardening.zip
567.6 MB
1 - Intro
2 - Memory Attacks and Overflows
3 - Minimization and Patching
4 - Stopping Boot Services
5 - Session Hijacking and Sniffing
6 - SSH
7 - Host Based Firewalls
8 - WrapUp
2. Linux Hardening.zip
566.6 MB
1 - Rootkits and File Integrity Assessment
2 - Physical Attacks and Defenses
3 - Password Attacks and Access Controls
4 - Sudo
5 - Warning Banners
6 - Kernel Settings for Security
7 - WrapUp
3. Linux Hardening.zip
735.6 MB
1 - Automated Tasks Via SSH
2 - Unix Logging Overview
3 - SSH Port Forwarding
4 - SyslogNG
5 - Final Remarks
6 - Appendix A Password Alternatives
SEC 506.4-506.5 (2020): Securing Linux pt 4,5

#sans #course #linux #defence #blueteam #pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
4. Linux Application Security.zip
962.3 MB
1 - Notes on chroot
2 - SCPOnly Shell
3 - SELinux
5. Linux Application Security.zip
562.5 MB
1 - DNS and BIND
2 - Splithorizon DNS
3 - Configuring BIND
4 - DNSSEC
5 - WrapUp
6 - Appendix A Sendmail
7 - Appendix B PortSentry
SEC 506.6 (2020): Securing Linux pt 6

#sans #course #linux #defence #blueteam #pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
6. Digital Forensics for Linux.zip
736.9 MB
1 - Linux Filesystems Basics
2 - Introduction to Forensics
3 - Forensic Preparation
4 - Incident Response Process
5 - Evidence Collection
6 - MAC Timelines
7 - Analyze Media
8 - Section 6 WrapUp