Jump to content

kasidisaueb

Banned
  • Content Count

    5
  • Joined

  • Last visited

Community Reputation

59 Excellent

About kasidisaueb

  • Rank
    Junior Member

Recent Profile Visitors

58 profile views
  1. Find below a post that covers pentesting exposed Redis (NoSQL) instances, Redis security posture and how to leverage unprotected Redis instances for stealthy payload transfers and lateral movement. Definitely useful for red teamers... [Hidden Content]
  2. Find below a post that includes free video training regarding both osquery fundamentals and advanced functionality. The video explains how modern attacks are being detected by osquery in a step by step manner. Definitely useful for red teamers who operate on osquery-protected environments. [hide][Hidden Content]]
  3. For GB visit the Group Buy section. Strictly NO GB related discussions / initiations under this thread. All GB related comments have been removed. To start a GB, go to the Group Buy section, read the pinned GB rules topic, create a new GB topic and wait for approval.
  4. We can at least create a list of good free resources. If anyone has additional links, please feel free to add them.... Consolidating everything into one list below. [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] (in youtube there videos how to solve all challenges) [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] ------------- MOOC [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] LINUX:-- [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]#linux-exploitation-course [Hidden Content] https://translate.googleusercontent.com/translate_c?act=url&depth=1&hl=en&ie=UTF8&prev=_t&rurl=translate.google.com&sl=zh-CN&sp=nmt4&tl=en&u=[Hidden Content]&usg=ALkJrhh8wzWCE5R17IhQ9G2fmt8REm-Czw#linux-exploit-%E5%BC%80%E5%8F%91%E5%85%A5%E9%97%A8 [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] ------------- [Hidden Content] [Hidden Content]
  5. Anyone who got the 599 material please reshare.....
  6. Hi all, I am looking for the SANS SEC511: Continuous Security Monitoring Virtual Machines. Has anyone seen them shared somewhere? Thanks in advance...
  7. Firewall/proxy rules especially deployed by a GPO would be better i believe.
  8. Nice answer EQNish. For a small number of hosts this could work beautifully
  9. PowerShell based penetration testing tool are the [Hidden Content]
  10. FYI: I have used the enterprise key successfully, haven't tested the Professional one yet....
  11. Yeah, a bit confusing. Thanks for the clarification.
  12. Hi from Greece guys, I am working as a junior security analyst for the time being. Nice to meet you all Best, Andreas
  13. Very good explanation indeed. Thank you.
  14. By the way not patched by me guys. So, use it on an isolated VM just to be on the safe side....
  15. sirdba. I can also confirm the high level security market in Canada is great. I mean CISA, CISM, CGEIT etc. +1 about the weather.
×
×
  • Create New...