Useful is a collection of useful materials and tools:
- What Can Examining Server Response Time Tell Us?
- Will AI Take Over Jobs in Cybersecurity? Quite the Opposite – Example of XSS in Zoomin!
- Biometrics are safer – how malware robs Android users
- Cracking a password-protected PDF in seconds – PZU and their illusory protection. NN Investment Partners also repeats these bad practices.
- Guide to cybersecurity certificates with ranking
- Hidden Data in Files – How Metadata Can Be Useful in Penetration Testing
- Most useful plugins for Burp Suite
- FFUF and EyeWitness – speeding up the search process
- Search/Fuzz faster with FFUF
- Automate file transfer tests – Upload Scanner
- (no) IP camera security
- Report for 0 points EY GDS Poland Cybersecurity Challenge via Challenge Rocket
- Optimizing IP camera configuration
- Identification of technologies used on websites – Wappalyzer
- Some statistics from pentester's work 2018-2020
- An even simpler way to print waterproof
- An easy way to print waterproof
- Omis WAFa, filters, and match xss attack vector to technology
- Print graphics to the wall, ie how to cut a large flat model better method
- Print graphics on a wall, or how to cut a large flat model
- How to make a dial from a photo?
- Publicly available results of coronavirus tests – how not to secure your data
- How do I make JWT JSON Web Tokens more secure?
- How to improve your online security
- Tplmap – identify and use the template engine
- ATOR – Authentication Token Obtain and Replace – Burp Suite plug-in for complex session mechanisms
- CSP Evaluator – Is your CSP policy secure?
- Hidden content – do you know what to look for? Ready good dictionary.
- PassiveTotal – find hidden subdomains
- Example password policy
- Serpico – automate the writing of reports
- LinEnum or find a hole in Linux and escalate your permissions
- Printers for hospitals is an unusual action in the fight against the coronavirus pandemic
- Fiberlogy PP Polypropylene Settings for Prussia MK3/MK3S
- Retire.js – the answer to the question is whether you are using outdated components
- IT security policy using Firewall and DNS configuration
- Example of an IT security procedure
- Let the sun wake you up or automatic controller for roller shutters
- ssllabs – check SSL configurations
- DIRB – find hidden content on pages
- XXEinjector – a tool to help with XXE exploitation
- AliYun_OSS_Security
- LED lighting for Prussia i3 MK2 / MK2S / MK3
- Gyroscopic rotomat is something for watch collectors
- Sample actual penetration test report
- What should a good penetration test report look like?
- Testing for SQL Query Injection
- Testing for javascript injection.
- CSRF vulnerability testing
- Path traversal susceptibility testing
- mic006 discount code nice to fit you 5%
- Test the session management process
- Test the session termination process
- Test the password reset process
- Testing the possibility of circumvention of the authenticity mechanism
- Test for authentication data compatibility with popular dictionaries
- Rapid prototyping or rapid prototyping on non-commercial Sundays
- Programmable "flash drive" or how to quickly take over your computer
- Tests of the use of encrypted channels to transmit passwords and sensitive data.
- SSL/TLS Implementation Validation Analysis
- Analyze messages with errors
- Discover apps
- Collection of "fingerprints" of operating services
- Identification of entry points
- Page mapping
- Penetration test phases
- The most common vulnerabilities of web applications
- What are penetration tests?
- A few words of introduction…