Jump to content

paxx

Members
  • Posts

    8
  • Joined

  • Last visited

Reputation

4 Neutral

About paxx

  • Rank
    Newbie
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Chiar fun read, nu e hype sau buzzword. Sunt exemplificate scenarii in fiecare capitol despre cum despre cum s-au ars unii si cum face Google handle la problemele respective, adesea cu referinte catre industry standards. Cartea cred ca e mai degraba adresata "arhitectilor" de sisteme in cloud care au resursele necesare sa tina cont si de security(cu toate ca in carte se dezbat si trade-offs pentru ca e aproape imposibil sa construiesti o arhitectura 100% secure odata ce creste in complexitate - de unde si conceptul de "defense in depth"). Multe subiecte sunt common sense pentru cineva venit din pentest / linux, dar cartea asta le delimiteaza si le pune intr-un cloud context cu un emphasis pe reliability
  2. Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure. Two previous O’Reilly books from Google—Site Reliability Engineering and The Site Reliability Workbook—demonstrated how and why a commitment to the entire service lifecycle enables organizations to successfully build, deploy, monitor, and maintain software systems. In this latest guide, the authors offer insights into system design, implementation, and maintenance from practitioners who specialize in security and reliability. They also discuss how building and adopting their recommended best practices requires a culture that’s supportive of such change. You’ll learn about secure and reliable systems through: Design strategies Recommendations for coding, testing, and debugging practices Strategies to prepare for, respond to, and recover from incidents Cultural best practices that help teams across your organization collaborate effectively LINK
  3. De ce esti ipocrit? Noi faceam deface la site-uri la fel de interesante si nu ceream nimic LOL Daca pune mana pe carte are un viitor, altfel ajunge ca Iceman fara dinti in gura FYI, Contractele pana in 50k EUR sunt cu incredintare directa, adica fara licitatie, deci sunt confidentiale. Cel mult poti afla cheltuieli defalcate, in urma unui audit publicat de curtea de conturi.
  4. Vino man cu requirements clare. In ce context vrei sa ruleze scriptul asta? Ce variante ai gasit? E wallet-ul tau, da?
  5. Ain't no Discord moderator Zatarra m-ai uitat??
  6. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: • Make performant tools that can be used for your own security projects • Create usable tools that interact with remote APIs • Scrape arbitrary HTML data • Use Go's standard package, net/http, for building HTTP servers • Write your own DNS server and proxy • Use DNS tunneling to establish a C2 channel out of a restrictive network • Create a vulnerability fuzzer to discover an application's security weaknesses • Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer • Implant data within a Portable Network Graphics (PNG) image. LINK: http://library.lol/main/ADBA1B1959F70CEF0D3351F0AE0DA1B9
  7. paxx

    Fun stuff

    Trimite un newsletter si cheama lumea inapoi
  8. Salut barosanii de la mici la mari Spunea Nytro acum 10 minute intr-un thread ca nu mai foloseste lumea forumurile, asa ca am intrat sa-l contrazic
×
×
  • Create New...