Big Data

  • Content Count

  • Avg. Content Per Day

  • Joined

  • Last visited

Community Reputation

37 Excellent

About Big Data

  • Rank

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Big Data

    The command for editing the dictionary

    the command i use to help other cat rockyou.txt | sort | uniq | pw-inspector -m 8 -M 16 > newrockyou.txt but i need command for use More than one word on the same line
  2. hi all i want to know a command to edit wordlist to shrink size in hard disk space i use some of command to remove duplicate words and enhance word with min and max Length but still need more way to edit it what i want a command to use More than one word on the same line to use it in hashcat to crack with dictionary attack
  3. Description ـــــــــــــــــــــــــــــــــــــ In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation. Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons. Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ Anyone interested in Reverse Engineering and Exploit Development Requirements ـــــــــــــــــــــــــــــــــــــــــــ This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. [hide][Hidden Content]]
  4. Big Data

    Reverse Engineering Ransomware

    Description ـــــــــــــــــــــــــ The aim of this course is to provide a practical approach to analyzing ransomware. Working with real world samples of increasing difficulty, we will: Deep dive into identifying the encryption techniques, Navigate through various evasion tricks used by malware writers, Have fun discovering flaws in their logic or the implementation and Work out automated ways to recover the affected files. If you're already familiar with the basics and want to dive straight into advanced samples, navigate anti-virtualisation and anti-analysis tricks, and write C and Python decryptors for custom crypto algorithms, please check out our Advanced Reverse Engineering Ransomware course! Requirements ــــــــــــــــــــــــــــــــ -Basic programming knowledge -A computer that can run a Windows virtual machine. -An interest in disassembling things and understanding how they work! -Patience and perseverance to “try harder”. Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــــــ -Security testers -Malware analysts -Forensics investigators -System administrators -Information security students -Anyone interested in ransomware and malware analysis [hide] [Hidden Content]]
  5. Big Data

    Powershell For Pentesters

    Description ــــــــــــــــــــــــــ The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators and other security professionals. You will be able to use and write tools in PowerShell which is installed by default of all modern Windows operating systems. The course will be of interest for anyone who wants to know more about using PowerShell for security research, penetration testing and red teaming. The course covers various phases of a penetration testing and PowerShell is used to enhance techniques in the each phase. What You Will Learn ـــــــــــــــــــــــــــــــــــــــــــ -Introduction to PowerShell -Basics of PowerShell -Scripting -Advanced Scripting Concepts -Modules -Jobs -PowerShell with .Net -Using Windows API with PowerShell -PowerShell and WMI -Working with COM objects -Interacting with the Registry -Recon and Scanning -Exploitation -Brute Forcing -Client Side Attacks -Using existing exploitation techniques -Porting exploits to PowerShell – When and how -Human Interface Device -PowerShell and Metasploit -Running PowerShell scripts -Using PowerShell in Metasploit exploits -Post Exploitation -Information Gathering and Exfiltration -Backdoors -Privilege Escalation -Getting system secrets -Post Exploitation -Passing the hashes/credentials -PowerShell Remoting -WMI and WSMAN for remote command execution -Web Shells -Achieving Persistence -Using PowerShell with other security tools -Defense against PowerShell attacks Who this course is for ــــــــــــــــــــــــــــــــــــــــــــــ It is for Novices and Experts. The language basics and PowerShell programming, which form almost half of the course, are covered with patiently and keeping in mind students with no or very little prior programming experience. During the part where application of PowerShell in penetration testing is discussed, the course gathers speed and even expert users will learn new concepts and applications of Offensive PowerShell. [Hidden Content]
  6. Description ـــــــــــــــــــــــــ in this course you will learn in detail fundamentals about the Next-Generation FireWall. We will start by looking at threat landscape and the techniques necessary to secure a network. The next learning objective is how to setup the FireWall from scratch, including networking, Application Identification and Content-ID (AntiVirus, AntiSpyware, Vulnerability Protection, URL Filtering, File Blocking) and look at URL filtering, Decryption and learn features like User-ID to determine who is accessing the internet and WildFire to reduce the number of zero-day attacks For each topic I will explain concepts and configuration and also demonstrate real life best practices and show you basic troubleshooting. Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــــ Palo Alto Networks administrators, security engineers, analysts, and operators [Hidden Content]
  7. Description ـــــــــــــــــــــــــــ If you are completely new to reverse engineering and malware analysis, then this course is for you. I will take you from zero to proficient level in reverse engineering and analyzing malware. You will learn using plenty of practical walk-throughs. We will learn the basics first then gradually proceed to more advanced topics. All the needed tools will be introduced and explained. By the end of this course, you will have the fundamentals of malware analysis under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained in reverse engineering and analysis would be beneficial to you to reverse software as well. Everything is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along. We will use tools like tridnet, bintext, pestudio, cff explorer, regshot, procdot, fakenet, wireshark, process monitor, process hacker, xdbg, Ghidra and more... Topics include: ـــــــــــــــــــــــــــــــ -Lab Setup -Tools -OS Fundamentals -Virtual Memory and the PE file -Windows Internals -Malware Components -Static analysis -Dynamic Analysis -Network Analysis -Unpacking Standard and Custom packers -Dumping memory and more... This course is suitable for: ــــــــــــــــــــــــــــــــــــــــــــــــــــــــ Anyone who has no background on malware analysis and just starting out in this field Hobbyist who just like to learn how to reverse engineer and analyze malware Students who like to get started on the career path to become malware analysts Hackers looking for additional tools and techniques to reverse software The prerequisites: ــــــــــــــــــــــــــــــــــــــــ Just a windows PC and an interest in malware analysis, or software reverse engineering. What you’ll learn ـــــــــــــــــــــــــــــــــــــ -Flare VM Lab Setup -OS fundamentals -Windows API -Virtual Memory -PE file structure -Static Analysis -Dynamic Analysis -Network Analysis -Memory Analysis -Identifying Standard and Custom Packers -Unpacking Packed Malware -Debugging Malware -Analysing Malware using Ghidra -Dumping memory and more... Are there any course requirements or prerequisites? ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ Windows PC Interest in malware analysis or reverse engineering Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــــ Anyone who has no background on malware analysis and just starting out in this field Hobbyist who just like to learn how to reverse engineer and analyze malware Students who like to get started on the career path to become malware analysts Hackers looking for additional tools and techniques to reverse software [hide][Hidden Content]]
  8. Big Data

    Penetration Test Skills

    Description ـــــــــــــــــــــــــــ -This course is designed and built for improve your knowledge & skills in penetration testing and Ethical Hacking ! -This course is Suitable for people who are familiar with the world of security and penetration testing and Ethical hackers , or at least know the basics . This specialized course can show you different ways to increase your abilities and knowledge in the field of penetration testing and teach you important points. ـــــــــــــــــــــــــــــــــــــــــــ •A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). •Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in — either virtually or for real — and reporting back the findings. You will learn ــــــــــــــــــــــــــــــ ✓ WebAppliction Scan & Attacks ✓ Webserver Scan & Attacks ✓ MITM Theory & Attack ✓ Network Scanning ✓ Exploit ✓ WAF ✓ sql methods ✓ Logs & LostTrack ✓ Honeypot ✓ Port Scanning With Python & etc. ✓ CCTV penetration testing ✓ Nmap tips What you’ll learn ـــــــــــــــــــــــــــــــــــــ WebAppliction Scan & Attacks Webserver Scan & Attacks MITM Theory & Attack Network Scanning Exploit WAF sql methods Logs & LostTrack Honeypot python tools Nmap tips CCTV penetration testing Are there any course requirements or prerequisites? Be familiar with network & security Be familiar with penetration test Be familiar with python pragramming Have two Penetration lab and a windows Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــ Beginner Penetration testers that want to improve their skills Beginner Hackers who want to improve their knowledge Security engineers that curious about ways to penetrate . [hide] [Hidden Content]]
  9. Description ــــــــــــــــــــــــــ This course will introduce Burp Suite and demonstrate the common modules and tools used by web application hackers to find and exploit vulnerabilities. This course provides practical examples through the PortSwigger labs and DVWA to help solidify the concepts and give you the opportunity to exploit systems. This course focuses on using Burp Suite to attack web applications. We will primarily use the community version, as it is free and accessible, and provides the important functionality required to start attacking systems. I've provided links to all of the resources used in the video, so you can follow along and practice your skills with the videos! Requirements ـــــــــــــــــــــــــــــــ Basic knowledge of HTTP protocols and communications Basic knowledge of web applications Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــ IT security engineers Students looking to learn IT security Ethical Hackers and Penetration Testers Bug Bounty hunters targetting web applications [Hidden Content]
  10. Description ــــــــــــــــــــــــــ In this course, I will walk you through the process of penetration testing applications to find vulnerabilities and earn bug bounties. We will analyze a vulnerable Android app, and see how vulnerabilities can be found using tools such as: Drozer Dex2Jar Jadx ApkTool Adb Burp Suite Learn about dynamic and static analysis to become an expert at finding Android exploits! Requirements ــــــــــــــــــــــــــــــــ A basic understanding of programming and app development is recommended Who this course is for: ــــــــــــــــــــــــــــــــــــــــــــــــ Android developers looking to secure their applications Hackers looking to learn common Android vulnerabilities Bug Bounty participants looking to target Android apps People looking to expand their knowledge of Computer Security [Hidden Content]
  11. Big Data

    Mastering Wireshark 3

    Description ــــــــــــــــــــــــــ Mastering Wireshark 3.2 will help you master the many features of Wireshark. It includes practical examples of analyzing applications and troubleshooting network traffic. The course focuses on packet analysis, command-line utilities, and ways to build upon many of the features included in Wireshark. Learn to use Pyshark and other command-line tools that will help to complement Wireshark’s capabilities.This course will enable you to use Wireshark for analyzing, monitoring network traffic and the tools for troubleshoot a variety of common network problems. What You Will Learn ـــــــــــــــــــــــــــــــــــــــــــ -Understand how to use Wireshark to help troubleshoot dropped packets, latency issues, and malicious activity on your network -Learn to capture and analyze network traffic to understand what is happening on your network. -Troubleshoot network problems by analyzing network latency, performance, and availability. Detect, diagnose, and resolve network performance issues. -Examine security issues to protect your network from malicious code and network vulnerabilities. -Verify network communications to analyze your network strength and connections and ensure good network quality. -Analyze network protocols to capture data for further analysis and understand of the technical means necessary packets. -Analyze application protocols to troubleshoot network problems and use them to examine security problems. -Expand Wireshark's capabilities and functions with plugins and APIs. -Use PyShark to modify how Wireshark captures and filters packets. Assumed Knowledge ــــــــــــــــــــــــــــــــــــــــــــــ This course assumes that the viewer is already familiar with the OSI and TCP/IP models and only briefly covers the specifics required to understand the course. Knowledge of Python is required to learn PyShark and familiarity with Wireshark is assumed. Technical Requirements ـــــــــــــــــــــــــــــــــــــــــــــــــــ This course has the following requirements: Understanding of Python, Basic Programming Languages and Understanding of Network Protocols Software Requirements: Wireshark Software Hardware Requirements: Modern laptop or desktop [hide][Hidden Content]]
  12. Description ـــــــــــــــــــــــــ Most enterprise networks today are managed using Windows Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure. Active Directory Pretesting is designed to provide security professionals to understand, analyze and practice threats and attacks in a modern Active Directory environment. The course is beginner friendly and comes with a walkthrough videos course and all documents with all the commands executed in the videos. The course is based on our years of experience of breaking Windows and AD environments and research. When it comes to AD security, there is a large gap of knowledge which security professionals and administrators struggle to fill. Over the years, I have taken numerous world trainings on AD security and always found that there is a lack of quality material and specially, a lack of good walkthrough and explanation. The course simulate real world attack and defense scenarios and we start with a non-admin user account in the domain and we work our way up to enterprise admin. The focus is on exploiting the variety of overlooked domain features and not just software vulnerabilities. We cover topics like AD enumeration, tools to use, domain privilege escalation, domain persistence, Kerberos based attacks (Golden ticket, Silver ticket and more), ACL issues, SQL server trusts, and bypasses of defenses. Attacking and Hacking Active Directory With Kali Linux Full Course - Read Team Hacking Pentesting What you’ll learn ـــــــــــــــــــــــــــــــــــــ How to Use Metasploit to Exploit Active Directory How to Use Empire to Exploit Active Directory How to Use Evil-WinRM to Exploit Active Directory How to Use CrackMapExec to Exploit Active Directory How to Exploit Active Directory From Windows How to Do Active Directory Enumeration How to do Lateral Movement Active Directory Post Exploitation Active Directory Domain Privilege Escalation Active Directory Persistence Attacks How to use Kali Linux to hack Active Directory How to use nmap to Enumerate Servers How to exploit EternalBlue Are there any course requirements or prerequisites? ـــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ How Active Directory Work Windows Server Experience Who this course is for: ـــــــــــــــــــــــــــــــــــــــــــــــــ Students who would love to become an Active Directory Pentesting Expert Students who would love to learn how to Attack Active Directory Students who would love a Job as a Red Team Windows - Privilege Escalation and Local Enumeartion Cheat Sheet [hide] [Hidden Content]]
  13. Description We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to exploiting each vulnerability. This course not just focuses on attacks but also helps understanding the mitigations for each vulnerability. Students will understand the mitigations through Secure Source Codes and Best Practices provided in this course that should be followed by the developers to protect their web application from these vulnerabilities. What you’ll learn Web Application Pentesting Completing 20 exercise of Mutillidae Vulnerable Web Application OWASP top 10 2017 Mitigations for each vulnerability Secure code for mitigation Are there any course requirements or prerequisites? This course is for beginners Basic knowledge of OWASP top 10 Basics of using Burp Suite and Proxy Burpsuite and Browser Setup Who this course is for: Beginner ethical hacking students Students who want to learn Web Application Pentesting Students who want to perform exercises on Mutillidae Vulnerable Application Students who want to learn about the Mitigations of each vulnerability in OWASP top 10 2017 [Hidden Content]
  14. WiFi Hacking using Evil Twin Attacks and Captive Portals Description In this course I will show you how to create the most common and effective evil twin attacks using captive portals. You'll learn how to perform evil twin attacks on targets using a wide variety of tools, and create a captive portal that effectively steals the login credentials. All the attacks in this course are highly practical and straight to the point. By the time you've completed this course, you will have the knowledge to create and customize your own evil twin attack for different scenarios. What you’ll learn Set Up an Access Point with a Captive Portal. Create a Fake Captive Portal and use it to Steal Login Information. Customizing the Captive Portal Page. How to Sniff and Inject Packets into a Wireless Network. Use Wireshark Filters to Inspect Packets. Perform an Evil Twin Attack with Airgeddon. Stealing Social Media Accounts using a Captive Portal. How to use Dns Spoofing and BeEF using WiFi Pumpkin. Stealing Login Credentials from a WPA Enterprise Network. Detect and Secure Your System from Evil Twin Attacks. Are there any course requirements or prerequisites? Computer with at least one wireless card to act as an access point. Desire to learn. Who this course is for: For everyone who wants to learn Wi-Fi Hacking using Evil Twin Attacks. [Hidden Content]
  15. Big Data

    Free Lifetime Windows RDP Method

    do you have any method to bypass the time limited