Discord Server Red Security Twitter Donation to Red Security Red Security Youtube Channel Red Security Tumblr Profile
Windscribe
Login or Register to Hide ads and Accessing all features on the forum
Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 2,271
» Latest member: efabuke
» Forum threads: 1,135
» Forum posts: 2,091

Full Statistics

Online Users
There are currently 34 online users.
» 0 Member(s) | 31 Guest(s)
Google, SEMrush, Yandex

Latest Threads
Ola
Forum: Portuguese
Last Post: MiDAS
Yesterday, 08:15 AM
» Replies: 0
» Views: 27
Microsoft Exchange Server...
Forum: News
Last Post: News
Yesterday, 08:12 AM
» Replies: 0
» Views: 57
Data Breaches Exposes Vet...
Forum: News
Last Post: News
09-16-2020, 02:03 AM
» Replies: 0
» Views: 67
RAD SecFlow-1v SF_0290_2....
Forum: News
Last Post: News
09-15-2020, 12:17 AM
» Replies: 0
» Views: 64
1Password is coming to Li...
Forum: Operating Systems
Last Post: ZDNet Linux
09-14-2020, 10:22 AM
» Replies: 0
» Views: 78
Zoom adds Two-factor auth...
Forum: News
Last Post: News
09-12-2020, 10:25 AM
» Replies: 0
» Views: 75
Exploitation course
Forum: Scripting
Last Post: Backdoor
09-12-2020, 04:27 AM
» Replies: 0
» Views: 52
Penetration testing cours...
Forum: Python
Last Post: Backdoor
09-12-2020, 04:22 AM
» Replies: 0
» Views: 89
Hi
Forum: Introductions
Last Post: Mr.Kurd
09-11-2020, 07:43 AM
» Replies: 1
» Views: 100
Hi my name is!
Forum: Introductions
Last Post: Mr.Kurd
09-11-2020, 07:39 AM
» Replies: 3
» Views: 69

 
  Ola
Posted by: MiDAS - Yesterday, 08:15 AM - Forum: Portuguese - No Replies

Ola alguem fala portugues aqui? Big Grin

Print this item

Star Microsoft Exchange Server DlpUtils AddTenantDlpPolicy Remote Code Execution - CXSecu
Posted by: News - Yesterday, 08:12 AM - Forum: News - No Replies

Microsoft Exchange Server DlpUtils AddTenantDlpPolicy Remote Code Execution - CXSecu

mr_me has realised a new security note Microsoft Exchange Server DlpUtils AddTenantDlpPolicy Remote Code Execution


https://cxsecurity.com/issue/WLB-2020090079

Print this item

Star Data Breaches Exposes Vets, COVID-19 Patients
Posted by: News - 09-16-2020, 02:03 AM - Forum: News - No Replies

Data Breaches Exposes Vets, COVID-19 Patients

Social engineering and employee mistakes lead to breach Veteran's Administration and the National Health Service.


https://threatpost.com/data-breach-duo-v...nts/159283

Print this item

Star RAD SecFlow-1v SF_0290_2.3.01.26 Cross Site Scripting ≈ Packet Storm
Posted by: News - 09-15-2020, 12:17 AM - Forum: News - No Replies

RAD SecFlow-1v SF_0290_2.3.01.26 Cross Site Scripting ≈ Packet Storm

Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers


https://packetstormsecurity.com/files/15...ow-xss.txt

Print this item

Brick 1Password is coming to Linux
Posted by: ZDNet Linux - 09-14-2020, 10:22 AM - Forum: Operating Systems - No Replies

1Password is coming to Linux

One of the most popular password managers, 1Password, is finally releasing a desktop Linux client.


https://www.zdnet.com/article/1password-...RSSbaffb68

Print this item

Star Zoom adds Two-factor authentication (2FA) as extra layer of security
Posted by: News - 09-12-2020, 10:25 AM - Forum: News - No Replies

Zoom adds Two-factor authentication (2FA) as extra layer of security

Like us on Facebook @ /HackRead


https://www.hackread.com/zoom-adds-two-f...r-security

Print this item

  Exploitation course
Posted by: Backdoor - 09-12-2020, 04:27 AM - Forum: Scripting - No Replies

In Advanced Penetration Testing, Exploit Writing, and Ethical Hacking, people will learn the ability to test secure networks.

In the advanced network penetration testing period, passing the layer 2 and 3 security mechanisms such as NAC, 802.1x and evaluating the coded mechanisms for proper implementation will be examined. In the other part of the advanced network penetration testing period, the level of access in different operating systems will increase. The new buffer overflow mechanisms are examined


Course Title :

Code:
Section1: Network Attacks for Penetration Testers

Bypassing network access/admission control (NAC)

Impersonating devices with admission control policy exceptions

Exploiting EAP-MD5 authentication

Custom network protocol manipulation with Ettercap and custom filters

Multiple techniques for gaining man-in-the-middle network access

IPv6 for penetration testers

Exploiting OSPF authentication to inject malicious routing updates

Using Evilgrade to attack software updates

Overcoming SSL transport encryption security with Sslstrip

Remote Cisco router configuration file retrieval
Section 2: Crypto, Network Booting Attacks, and Escaping Restricted Environments

Pen testing cryptographic implementations

Exploiting CBC bit flipping vulnerabilities

Exploiting hash length extension vulnerabilities

Delivering malicious operating systems to devices using network booting and PXE

PowerShell Essentials

Enterprise PowerShell

Post Exploitation with PowerShell and Metasploit

Escaping Software Restrictions

Two-hour evening Capture the Flag exercise against a modern network with hardened servers, desktops, and vApp targets
Section 3: Python, Scapy, and Fuzzing

Becoming familiar with Python types

Leveraging Python modules for real-world pen tester tasks

Manipulating stateful protocols with Scapy

Using Scapy to create a custom wireless data leakage tool

Product security testing

Using Taof for quick protocol mutation fuzzing

Optimizing your fuzzing time with smart target selection

Automating target monitoring while fuzzing with Sulley

Leveraging Microsoft Word macros for fuzzing .docx files

Block-based code coverage techniques using Paimei
Section 4: Exploiting Linux for Penetration Testers

Stack and dynamic memory management and allocation on the Linux OS

Disassembling a binary and analyzing x86 assembly code

Performing symbol resolution on the Linux OS

Identifying vulnerable programs

Code execution redirection and memory leaks

Identifying and analyzing stack-based overflows on the Linux OS

Performing return-to-libc (ret2libc) attacks on the stack

Return-oriented programming

Defeating stack protection on the Linux OS

Defeating ASLR on the Linux OS
Section 5: Exploiting Windows for Penetration Testers

The state of Windows OS protections on Windows 7, 8, 10, Server 2008 and 2012

Understanding common Windows constructs

Stack exploitation on Windows

Defeating OS protections added to Windows

Creating a Metasploit module

Advanced stack-smashing on Windows

Using ROP

Building ROP chains to defeat DEP and bypass ASLR

Windows 7 and Windows 8 exploitation

Porting Metasploit modules

Client-side exploitation

Windows Shellcode

Course duration: ‌30 hours

Prerequisites for Network Concepts Course

Course level: ‌ Advanced

Send me a private message to buy

Print this item

  Penetration testing course with Python
Posted by: Backdoor - 09-12-2020, 04:22 AM - Forum: Python - No Replies

The purpose of this course is to train people to write penetration testing tools in the field of network testing and web penetration. After this penetration testing course with Python, people can perform all the steps of penetration testing with tools that they have written

Before learning the Python penetration test course, it is recommended that people learn the Python programming language.

Course Title :

Code:
Section 1 : OSINT with python

    whois
    IG with shodan API
    IG with censys
    Email Harvestin
    Social Network IG

Section 2: writing netWork Scanner

    change your mac
    Detecting live system
    Port scan with python
    Send and recieved packet with scapy

Section 3: network sniffing

    arp spoofing
    Packet sniffing
    Extracting credential from network Traffic
    DNS spoofing

Section 4: writing undetectable Keylogger

    Keylogger Structure
    logging special key
    reporting keylogger

Section 5: writing Remote Access trojan

    Sending data over TCP
    Sending Data over HTTP
    Serialisation
    Upload function in listener
    Sending Command

Section 6: bypassing Antivirus

    pyinstaller
    persistent Access
    spoof file Extension
    Packing
    Converting pyhon to Linux Executable
    Converting pyhon to OS X Executable

Section 7: site crawling

    Discovering Hidden file and directory
    Extracting link
    Discovering Subdomain

Section 8: brute force Social Network

    Dictionary Attack on form (Instagram)
    Dictionary Attack with Post (Gmail)
    Dictionary Attack POST (twitter)

Section 9: Web Application Penetst with python

    XSS
    SQLi
    Command Injection
    Code Injection
    Writing Vulnerability Scanner

Course duration: ‌30 hours

Penetration test period prerequisites

Course level: ‌ Advanced
Send me a private message to buy

Print this item

Star Adobe fixes flaws in Adobe InDesign,Framemaker, Experience ManagerSecurity Affairs
Posted by: News - 09-09-2020, 05:31 AM - Forum: News - No Replies

Adobe fixes flaws in Adobe InDesign,Framemaker, Experience ManagerSecurity Affairs

Adobe has released security updates to address 12 critical vulnerabilities in Adobe InDesign, Adobe Framemaker, and Adobe Experience Manager.


https://securityaffairs.co/wordpress/108...flaws.html

Print this item

  32.7 gigs of ebooks
Posted by: ac3r - 09-08-2020, 09:18 AM - Forum: eBooks - Replies (1)

https://g.sicp.me/books/

This has a huge collections of books (about 33 gigs) from stuff like programming, to networking, into things like algorithms and graphic design. Just about anything to get you started on your journey. Hope it helps some of you guys out.


https://g.sicp.me/books/listing.html

Here's a link of all the books they include, in case you are looking for specific ones. And here are the topics that will be included, the exact size and how many files are in the download.



Attached Files Thumbnail(s)
       
Image(s)
   
Print this item