mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#pentest

1 Beitrag1 Beteiligte*r0 Beiträge heute
Tanya Janca | SheHacksPurple :verified: :verified:<p>🎥 Missed one of my past conference talks? Let’s fix that.</p><p>I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.</p><p>“DIY Azure Security Assessment" - with Teri Radichel<br>📽️ <a href="https://twp.ai/4ipHDg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4ipHDg</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a></p>
Cyb3rk1d<p>🚀 Beginner’s Guide to Penetration Testing — Start Your Ethical Hacking Journey</p><p>Learn the five core phases of a pentest (recon → scanning → gaining access → post-exploitation → reporting), the essential tools you’ll use, and the ethical mindset to practice safely and legally. Perfect for beginners who want a practical, hands-on path into cybersecurity. 🛡️🧭</p><p><a href="https://defcon.social/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a> <a href="https://defcon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://defcon.social/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://defcon.social/tags/BeginnerGuide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BeginnerGuide</span></a> <a href="https://defcon.social/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaliLinux</span></a> <a href="https://defcon.social/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <a href="https://defcon.social/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a> <a href="https://defcon.social/tags/HackingTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackingTools</span></a> <a href="https://defcon.social/tags/SecurityTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityTesting</span></a> <a href="https://defcon.social/tags/WhiteHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhiteHat</span></a> <a href="https://defcon.social/tags/AxximumInfoSolutions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AxximumInfoSolutions</span></a></p>
Geekland<p>FlareProx: proxy HTTP por Cloudflare para rotación de IPs <a href="https://mastodon.social/tags/herramientas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>herramientas</span></a> <a href="https://mastodon.social/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://mastodon.social/tags/redes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redes</span></a><br><a href="https://www.hackplayers.com/2025/09/flareprox-proxy-http-por-cloudflare.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackplayers.com/2025/09/flarep</span><span class="invisible">rox-proxy-http-por-cloudflare.html</span></a></p>
Slopsec<p><span>Hey folks,<br><br>Decided it was time for a new instance, so here’s my </span><a href="https://miruku.cafe/tags/introduction" rel="nofollow noopener" target="_blank">#introduction</a><span>. I’m a creatively driven fellow with a passion for privacy, cybersecurity, Linux, and free and open source software. I enjoy gaming, creative writing, and technology—the latter of which inspired me to pursue cybersecurity and system administration.<br><br>I embarked on this journey around the start of the pandemic, when the sudden surplus of free time gave me the opportunity to try Manjaro, a distribution of Linux based on Arch. With the release of the Steam Deck, I moved over to NixOS, which I’ve been using ever since while studying cybersecurity in higher education.<br><br>The majority of my posts will be set to follower-only, so feel free to throw a follow my way if anything of mine has piqued your curiosity at all.<br><br>Look forward to interacting with you all in the future! ^^<br><br>Tags: </span><a href="https://miruku.cafe/tags/privacy" rel="nofollow noopener" target="_blank">#privacy</a>, <a href="https://miruku.cafe/tags/cybersecurity" rel="nofollow noopener" target="_blank">#cybersecurity</a>, <a href="https://miruku.cafe/tags/cybersec" rel="nofollow noopener" target="_blank">#cybersec</a>, <a href="https://miruku.cafe/tags/hacker" rel="nofollow noopener" target="_blank">#hacker</a>, <a href="https://miruku.cafe/tags/pentest" rel="nofollow noopener" target="_blank">#pentest</a>, <a href="https://miruku.cafe/tags/pentester" rel="nofollow noopener" target="_blank">#pentester</a>, <a href="https://miruku.cafe/tags/infosec" rel="nofollow noopener" target="_blank">#infosec</a>, <a href="https://miruku.cafe/tags/linux" rel="nofollow noopener" target="_blank">#linux</a>, <a href="https://miruku.cafe/tags/foss" rel="nofollow noopener" target="_blank">#foss</a>, <a href="https://miruku.cafe/tags/gaming" rel="nofollow noopener" target="_blank">#gaming</a>, <a href="https://miruku.cafe/tags/creativewriting" rel="nofollow noopener" target="_blank">#creativewriting</a>, <a href="https://miruku.cafe/tags/writing" rel="nofollow noopener" target="_blank">#writing</a>, <a href="https://miruku.cafe/tags/technology" rel="nofollow noopener" target="_blank">#technology</a>, <a href="https://miruku.cafe/tags/sysadmin" rel="nofollow noopener" target="_blank">#sysadmin</a>, <a href="https://miruku.cafe/tags/archlinux" rel="nofollow noopener" target="_blank">#archlinux</a>, <a href="https://miruku.cafe/tags/steamdeck" rel="nofollow noopener" target="_blank">#steamdeck</a>, <a href="https://miruku.cafe/tags/nix" rel="nofollow noopener" target="_blank">#nix</a>, <a href="https://miruku.cafe/tags/nixOS" rel="nofollow noopener" target="_blank">#nixOS</a>.</p>
MissConstrue<p>Y’all I apologize that I can’t remember from whom I found this article, so I can thank them. This is a great fun read, if your idea of fun includes being terrified. Highly recommend.</p><p><a href="https://mefi.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mefi.social/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://mefi.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mefi.social/tags/ohdear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ohdear</span></a> </p><p><a href="https://rootcat.de/blog/do_not_work_hacker24/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rootcat.de/blog/do_not_work_ha</span><span class="invisible">cker24/</span></a></p>
Bill<p>What does <span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cR0w</span></a></span> say? Hack more AI shit or something?</p><p>Well, here ya go. (Actually gonna play with this tomorrow on POINT's AI, Chiron.)</p><p><a href="https://arxiv.org/abs/2508.17155" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2508.17155</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/genai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genai</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a></p>
Bill<p>I have never had to do more than turn on burp waf bypass to solve this, but on some sites (the drug compounding site, for instance) it would be a great tool! Some sites are SUPER picky.</p><p><a href="https://www.darknet.org.uk/2025/09/thermoptic-chrome-perfect-http-fingerprint-cloaking-for-red-team-web-ops/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darknet.org.uk/2025/09/thermop</span><span class="invisible">tic-chrome-perfect-http-fingerprint-cloaking-for-red-team-web-ops/</span></a></p><p><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/bypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bypass</span></a></p>
Geekland<p>MITRE ATLAS: framework de amenazas en sistemas de IA <a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/frameworks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frameworks</span></a> <a href="https://mastodon.social/tags/inteligencia_artificial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>inteligencia_artificial</span></a> <a href="https://mastodon.social/tags/jailbreak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jailbreak</span></a> <a href="https://mastodon.social/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://mastodon.social/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://mastodon.social/tags/red_team" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>red_team</span></a> <a href="https://mastodon.social/tags/threat_intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threat_intelligence</span></a><br><a href="https://www.hackplayers.com/2025/09/mitre-atlas-framework-de-amenazas-en-IA.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackplayers.com/2025/09/mitre-</span><span class="invisible">atlas-framework-de-amenazas-en-IA.html</span></a></p>
gtbarry<p>A Digital Underground Is Using the Flipper Zero to Break Into Cars</p><p>Its creators call it a “multi-tool” device. For many users, it’s a hacking accessory. Since it first debuted in 2020, the Flipper Zero has been considered a fun, low-key pen-tester, but a new report bolsters claims made by the tool’s critics, many of whom have argued it makes hacking just a little too easy.</p><p><a href="https://mastodon.social/tags/Flipperzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flipperzero</span></a> <a href="https://mastodon.social/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://mastodon.social/tags/autotheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autotheft</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p><p><a href="https://gizmodo.com/flipper-zero-cars-hacking-2000646318" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gizmodo.com/flipper-zero-cars-</span><span class="invisible">hacking-2000646318</span></a></p>
r1cksec<p>WebClient is a common targeted service for NTLM relay attacks. This post covers if it is possible to start the service remotely as a low privileged user🕵️‍♂️</p><p><a href="https://specterops.io/blog/2025/08/19/will-webclient-start" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">specterops.io/blog/2025/08/19/</span><span class="invisible">will-webclient-start</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a></p>

You’ve probably heard of Cold Boot attacks [1], but have you ever seen a practical example? If not, I recommend reading this report securitum.com/public-reports/m (point 002, page 15).

There is even more: for example, as a bonus, in point 001 there’s an interesting analysis concerning the incorrect configuration of PCR banks of the disk encryption process using LUKS.

[1] en.wikipedia.org/wiki/Cold_boo

Mini Pen Test Diaries story, happened in the last couple of years. The debrief meeting went like this:

“In your report you said you we’re able to crack the domain admin account instantly because the password was stored using the LM hash?”

“That’s right, yes.”

“But we’ve had LM hashing disabled for like 15 years, that can’t be possible?!”

“When was the last time that password was changed?”

“Well it’s been the same since I got here, 20 years ago.”

“And what hashing mechanism do you think was used back then?”

“Oh no."

For more, less mini stories like this, check out infosecdiaries.com.

Infosec DiariesInfosec DiariesLearn Pen Testing, Blue Teaming and Digital Forensics
#infosec#pentest#pentesting

Arch is down (again). AskUbuntu is hotter than OnlyFans. Kali’s fresh ISO comes with 500 updates pre-installed. BlackArch is a museum of broken clones. BackBox vanished like a ghost.

Meanwhile, the few who actually know what they’re doing quietly grab BashCoreTX.

No drama, just domination. 😆👊💪

🔥 CORSO "ACTIVE DIRECTORY PENETRATION TEST". APERTE LE PRE ISCRIZIONI E AVVIATA LA PROMO🔥

💥OFFERTA ESCLUSIVA entro il 31 AGOSTO! -15% sul prezzo già scontato del corso (in quanto è la prima live class su questo argomento) a chi effettua la pre-iscrizione entro l 31 di Agosto!

Informazioni di dettagli del corso: 📩 Per info e iscrizioni scrivi a formazione@redhotcyber.com oppure su WhatsApp al 393791638765 redhotcyber.com/servizi/academ

📩 Per info e iscrizioni scrivi a formazione@redhotcyber.com oppure su WhatsApp al 393791638765

🔥 Diventa un ethical hacker professionista ora! Non perdere tempo!

A friend is looking for an ICS pentesting gig in the UK. He has lots of experience in maritime, power, water, gas OT & SCADA.

He's also excellent on internal inf / red team especially when there's an OT element to the org and you need a safe pair of hands.

If you have any leads please message me and I'll hook you up.