Pengantar Fuzzing Untuk Keamanan Aplikasi (Bag. 1)
https://blog.curphoo.com/pengantar-fuzzing-untuk-keamanan-aplikasi-bag-1-ca80af6cd9e4
https://blog.curphoo.com/pengantar-fuzzing-untuk-keamanan-aplikasi-bag-1-ca80af6cd9e4
Medium
Pengantar Fuzzing Untuk Keamanan Aplikasi (Bag. 1)
Note: Tulisan ini sempat saya buat untuk majalah elektronik salah satu komunitas keamanan beberapa tahun silam. Ditulis ulang (dan…
Can Meditation Cure Depression?
What I learned from trying to battle depression with mindfulness
https://medium.com/mind-cafe/can-meditation-cure-depression-d2868bba5fa6
What I learned from trying to battle depression with mindfulness
https://medium.com/mind-cafe/can-meditation-cure-depression-d2868bba5fa6
Medium
Can Meditation Cure Depression?
What I learned from trying to battle depression with mindfulness.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
https://github.com/buftas/Active-Directory-Exploitation-Cheat-Sheet
https://github.com/buftas/Active-Directory-Exploitation-Cheat-Sheet
GitHub
GitHub - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet: A cheat sheet that contains common enumeration and attack methods…
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. - S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
Video: IoT Hacking 101 – Firmware Funhouse
https://www.ethicalhacker.net/eh-net-tv/eh-net-live/video-iot-hacking-101-firmware-funhouse/
https://www.ethicalhacker.net/eh-net-tv/eh-net-live/video-iot-hacking-101-firmware-funhouse/
The Ethical Hacker Network
Members Only - The Ethical Hacker Network
The free content you are trying to access is for Members Only. If you’re already a member, simply login. Otherwise, please register to become a member of The Ethical Hacker Network and join the ranks of those we affectionately call EH-Netters. Soon you’ll…
Android Kernel Exploitation
The objective of this workshop is to get started with kernel vulnerability analsysis and exploitation in Android platform.
https://cloudfuzz.github.io/android-kernel-exploitation/
The objective of this workshop is to get started with kernel vulnerability analsysis and exploitation in Android platform.
https://cloudfuzz.github.io/android-kernel-exploitation/
cloudfuzz.github.io
Introduction · Android Kernel Exploitation
Detecting & Removing an Attacker’s WMI Persistence
https://medium.com/threatpunter/detecting-removing-wmi-persistence-60ccbb7dff96
https://medium.com/threatpunter/detecting-removing-wmi-persistence-60ccbb7dff96
Medium
Detecting & Removing an Attacker’s WMI Persistence
Windows Management Instrumentation (WMI) Event Subscription is a popular technique to establish persistence on an endpoint. I decided to…
Malicious Payloads vs Deep Visibility: A PowerShell Story - Sp4rkCon 2019
https://www.slideshare.net/DanielBohannon2/malicious-payloads-vs-deep-visibility-a-powershell-story
https://www.slideshare.net/DanielBohannon2/malicious-payloads-vs-deep-visibility-a-powershell-story
www.slideshare.net
Malicious Payloads vs Deep Visibility: A PowerShell Story
Daniel Bohannon (@danielhbohannon) Principal Applied Security Researcher FireEye's Advanced Practices Team Malicious Payloads vs A PowerShell Story https://vic...
VM Hardening tools
Ubuntu (also support for Windows): https://github.com/nsmfoo/antivmdetection
Windows: https://github.com/hfiref0x/VBoxHardenedLoader
Ubuntu (also support for Windows): https://github.com/nsmfoo/antivmdetection
Windows: https://github.com/hfiref0x/VBoxHardenedLoader
GitHub
GitHub - nsmfoo/antivmdetection: Script to create templates to use with VirtualBox to make vm detection harder
Script to create templates to use with VirtualBox to make vm detection harder - nsmfoo/antivmdetection
Threat Hunting via Sysmon - SANS Summit.pdf
14.3 MB
Threat Hunting via Sysmon - SANS Summit
Threat Hunting via Sysmon - SANS Blue Team Summit
https://www.youtube.com/watch?v=7dEfKn70HCI
https://www.youtube.com/watch?v=7dEfKn70HCI
YouTube
Threat Hunting via Sysmon - SANS Blue Team Summit
Speaker: Eric Conrad, CTO, Backshore Communications; Senior Instructor, Co-Author SEC511 and SEC542, Author MGT514, SANS Institute
Windows Sysinternal's Sysmon offers a wealth of information regarding processes running in a Windows environment (including…
Windows Sysinternal's Sysmon offers a wealth of information regarding processes running in a Windows environment (including…
Reverse Engineering a TCP Protocol
https://medium.com/swlh/reverse-engineering-a-tcp-protocol-455d248d68fa
https://medium.com/swlh/reverse-engineering-a-tcp-protocol-455d248d68fa
Medium
Reverse Engineering a TCP protocol
For fun and… nothing else
NULLCON Goa 2020 Playlist
https://www.youtube.com/watch?v=BhFl3oN2iiM&list=PLWv48qIcomCY1klVobWUQfkFNysQY47B0
https://www.youtube.com/watch?v=BhFl3oN2iiM&list=PLWv48qIcomCY1klVobWUQfkFNysQY47B0
YouTube
ML for security and security for ML | Training Tidbits | Nikhil Joshi | NULLCON Goa | March 2020
Register before 31st January 2020 & avail pre-con discount to save up to Rs. 6,000➡️ http://bit.ly/2NVSXsf 3-days expedition specially designed for security ...
We are happy to say our latest OSCE AMA Recording is now live for your listening pleasure. Check it out at https://anchor.fm/infosecprep or generally any place where you get your podcasts!
Anchor
Infosec Prep Podcast • A podcast on Anchor
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
Recognizing and Avoiding Email Scams - US-CERT
https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf
https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf