А тут ультимативный гайд по бурпу, бесплатно
"The Ultimate Guide to Learning Burp Suite for FREE"
Включено в смежных статьях(тож по бурпику):
The Beginner’s Guide to API Hacking
7 Essential Burp Extensions for Hacking APIs
Automate your API hacking with Autorize
A Step-by-Step Guide to Writing Extensions for API Hacking
Improve your API Security Testing with Burp BCheck Scripts
https://danaepp.com/the-ultimate-guide-to-learning-burp-suite-for-free
#Beacon
"The Ultimate Guide to Learning Burp Suite for FREE"
Включено в смежных статьях(тож по бурпику):
The Beginner’s Guide to API Hacking
7 Essential Burp Extensions for Hacking APIs
Automate your API hacking with Autorize
A Step-by-Step Guide to Writing Extensions for API Hacking
Improve your API Security Testing with Burp BCheck Scripts
https://danaepp.com/the-ultimate-guide-to-learning-burp-suite-for-free
#Beacon
Dana Epp's Blog
The Ultimate Guide to Learning Burp Suite for FREE
Learning Burp Suite is easy. Check out this curated list of FREE resources you can use to master Burp for web app and API security testing.
Индус ковыряет zomato.com ручками на протяжении часа и таки нашел что-то типа idor. Не самый интересный ролик, но всю рутину как и что происходит описывает +-
https://www.youtube.com/live/oWrqe-mhjJ8?si=l0E1QT3D3dl-ebeH
#Becon
https://www.youtube.com/live/oWrqe-mhjJ8?si=l0E1QT3D3dl-ebeH
#Becon
YouTube
🔎 Exciting Bug Hunting Session: Mastering Manual Techniques for Bug Bounty Beginners! | hacker vlog
#hackervlog #owasp #bugbounty
Are you a bug bounty beginner eager to unearth vulnerabilities in websites and enhance your skills? Join us for an immersive bug hunting session where we'll cover four essential techniques that will empower you to discover critical…
Are you a bug bounty beginner eager to unearth vulnerabilities in websites and enhance your skills? Join us for an immersive bug hunting session where we'll cover four essential techniques that will empower you to discover critical…
Автоматизация ручного пентеста,
https://youtu.be/DlTWet7JcKk?si=x6rhW6Bc7oQ3_Sdl
Прикольный спич про баг-баунти, девсекопс и underrated skills во всем этом, а также собственно как автоматизировать ручную работу
#Beacon
https://youtu.be/DlTWet7JcKk?si=x6rhW6Bc7oQ3_Sdl
Прикольный спич про баг-баунти, девсекопс и underrated skills во всем этом, а также собственно как автоматизировать ручную работу
#Beacon
YouTube
THREAT CON 2022- Automation for Manual Bug Bounty Hunters By Eugene Lim (spaceraccoonsec)
Slides: https://2022.threatcon.io/media/BountyTrack/Automation_for_Manual_Bug_Bounty_Hunters.pdf
In the bug bounty space, hunters are typically split into two camps: automation masters who detect and scan assets at scale, and manual researchers who dive…
In the bug bounty space, hunters are typically split into two camps: automation masters who detect and scan assets at scale, and manual researchers who dive…
Forwarded from SHADOW:Group
На пентестах внешнего периметра не всегда сразу доступен полный скоуп IP-адресов, доменов и поддоменов. В таких случаях приходится recon-ить все ресурсы компании самостоятельно. Зачастую компании сами не подозревают, какие ресурсы у них могут «торчать наружу».
Аналогичная ситуация ждет вас и на багбаунти, когда у программы широкий скоуп и грамотная разведка и сбор ресурсов компании может помочь найти вам то, что не нашли другие.
Из статьи ниже вы поймете на практическом примере как производить сбор IP-адресов заказчика, а также проводить горизонтальный и вертикальный поиск доменов.
Читать статью
#web #recon
Please open Telegram to view this post
VIEW IN TELEGRAM
Хабр
Увеличиваем Attack Surface на пентесте периметра
Сгенерировано нейросетью DALL-E Привет, Хабр! Типичная проблема: компании часто сами не подозревают, какие ресурсы у них могут «торчать наружу». А раз их может нарыть потенциальный злоумышленник...
Forwarded from PT SWARM
🚀 We're excited to unveil a new tool developed by our researcher @kiber_io: APKd. Now, you can effortlessly download APKs from AppGallery, APKPure, and RuStore directly from the terminal!
Check it out here: https://github.com/kiber-io/apkd
Check it out here: https://github.com/kiber-io/apkd
Pass-the-Challenge: Defeating Windows Defender Credential Guard
https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22
Why do we care?
Attackers often attempt to dump credentials from the LSASS process memory on a compromised machine in order to move laterally within the network, using tools like Mimikatz that can extract various credentials, including plaintext passwords, NTLM hashes, and Kerberos tickets.
Credential Guard appears to protect against these types of attacks by isolating NTLM hashes (and Kerberos tickets) in the LSASS process memory, thus protect against the initial compromise of a user’s NTLM hash.
Now, if we compromise a system that has Credential Guard enabled and attempt to extract credentials from the LSASS process memory using Mimikatz, what do we observe?...
(Дальше скрин в посте, хорошая статья)
#Beacon
https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22
Why do we care?
Attackers often attempt to dump credentials from the LSASS process memory on a compromised machine in order to move laterally within the network, using tools like Mimikatz that can extract various credentials, including plaintext passwords, NTLM hashes, and Kerberos tickets.
Credential Guard appears to protect against these types of attacks by isolating NTLM hashes (and Kerberos tickets) in the LSASS process memory, thus protect against the initial compromise of a user’s NTLM hash.
Now, if we compromise a system that has Credential Guard enabled and attempt to extract credentials from the LSASS process memory using Mimikatz, what do we observe?...
(Дальше скрин в посте, хорошая статья)
#Beacon
Medium
Pass-the-Challenge: Defeating Windows Defender Credential Guard
In this blog post, we present new techniques for recovering the NTLM hash from an encrypted credential protected by Windows Defender…
"I’m Not A Pentester (And You Might Not Want To Be One Either)"
https://assume-breach.medium.com/im-not-a-pentester-and-you-might-not-want-to-be-one-either-8b5701808dfc?source=user_profile---------4----------------------------
https://assume-breach.medium.com/im-not-a-pentester-and-you-might-not-want-to-be-one-either-part-2-the-response-ab838cca3519?source=user_profile---------3----------------------------
Погружение в реальный мир ИБ
#Beacon
https://assume-breach.medium.com/im-not-a-pentester-and-you-might-not-want-to-be-one-either-8b5701808dfc?source=user_profile---------4----------------------------
https://assume-breach.medium.com/im-not-a-pentester-and-you-might-not-want-to-be-one-either-part-2-the-response-ab838cca3519?source=user_profile---------3----------------------------
Погружение в реальный мир ИБ
#Beacon
Medium
I’m Not A Pentester (And You Might Not Want To Be One Either)
Hi all! So, this is going to be a different type of post. I’ve tried to stay a little off the radar personally with my blogs and Twitter account for a lot of reasons. It’s not hard to find out who I…
A LNK Between Browsers: Hunting Methodologies and Extension Abusing Actors
https://cloud.google.com/blog/topics/threat-intelligence/lnk-between-browsers
#Beacon
https://cloud.google.com/blog/topics/threat-intelligence/lnk-between-browsers
#Beacon
Google Cloud Blog
A LNK Between Browsers: Hunting Methodologies and Extension Abusing Actors | Mandiant | Google Cloud Blog
Red Team Fails - “Oops my bad I ruined the operation”, a story on how to fail a red team assessment.
https://swisskyrepo.github.io/Drink-Love-Share-Rump/
#Beacon
https://swisskyrepo.github.io/Drink-Love-Share-Rump/
#Beacon
PENTEST_AD.pdf
35.6 MB
This book is truly intended to be an all-in-one guide for security professionals who work with Windows-
based infrastructure, especially AD. Penetration testers and red team operators will find practical
attack scenarios that they may encounter during real-life assessments. Security and IT engineers, as
well as blue teamers and incident responders, will benefit from detection and remediation guidelines.
To get the most out of this book, you should have basic knowledge of Windows services and AD
#Beacon
based infrastructure, especially AD. Penetration testers and red team operators will find practical
attack scenarios that they may encounter during real-life assessments. Security and IT engineers, as
well as blue teamers and incident responders, will benefit from detection and remediation guidelines.
To get the most out of this book, you should have basic knowledge of Windows services and AD
#Beacon
🥱1
Прикольный и интересный гайдик по основа редтима (да, это база)
Active Directory (Attack & Defense )
understand the specific tactics, techniques, and procedures (TTP) attackers are leveraging to compromise the active directory, this document is being updated regularly grabbed from different sources
https://0xsp.com/offensive/active-directory-attack-defense/#Discovery
Active Directory (Attack & Defense )
understand the specific tactics, techniques, and procedures (TTP) attackers are leveraging to compromise the active directory, this document is being updated regularly grabbed from different sources
https://0xsp.com/offensive/active-directory-attack-defense/#Discovery
0Xsp
Active Directory (Attack & Defense ) -
understand the specific tactics, techniques, and procedures (TTP) attackers are leveraging to compromise the active directory, this document is being updated regularly grabbed from different sources Table of Contents DiscoveryPrivilege EscalationDefense …