Security

Cybersecurity Resources

Blogs, cybersecurity news sites, and resources I come across #

Pentesting #

Writing a report #

Containers #

News sites #

OSINT Search Engines #

Github projects #

Certifications #

Cybersecurity Search Engines #

Daniel Kelly, 22 Aug 2023, LinkedIn

  1. DeHashed—View leaked credentials.
  2. SecurityTrails—Extensive DNS data.
  3. DorkSearch—Really fast Google dorking.
  4. ExploitDB—Archive of various exploits.
  5. ZoomEye—Gather information about targets.
  6. Pulsedive—Search for threat intelligence.
  7. GrayHatWarfare—Search public S3 buckets.
  8. PolySwarm—Scan files and URLs for threats.
  9. Fofa—Search for various threat intelligence.
  10. LeakIX—Search publicly indexed information.
  11. DNSDumpster—Search for DNS records quickly.
  12. FullHunt—Search and discovery attack surfaces.
  13. AlienVault—Extensive threat intelligence feed.
  14. ONYPHE—Collects cyber-threat intelligence data.
  15. Grep App—Search across a half million git repos.
  16. URL Scan—Free service to scan and analyse websites.
  17. Vulners—Search vulnerabilities in a large database.
  18. WayBackMachine—View content from deleted websites.
  19. Shodan—Search for devices connected to the internet.
  20. Netlas—Search and monitor internet connected assets.
  21. CRT sh—Search for certs that have been logged by CT.
  22. Wigle—Database of wireless networks, with statistics.
  23. PublicWWW—Marketing and affiliate marketing research.
  24. Binary Edge—Scans the internet for threat intelligence.
  25. GreyNoise—Search for devices connected to the internet.
  26. Hunter—Search for email addresses belonging to a website.
  27. Censys—Assessing attack surface for internet connected devices.
  28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
  29. Packet Storm Security—Browse latest vulnerabilities and exploits.
  30. SearchCode—Search 75 billion lines of code from 40 million projects

Bug Bounty #

How I’d Get Into Bug Bounty Hunting: A Practical Guide #

Daniel Kelly, Apr 22, 2023 Daniel Kelly

...

On PCI DSS v4 and Passwords

PCI DSS v4.0 & Passwords #

Several years of research have shown that frequent password rest cycles hurt the user, and the security of the password 1,2. Users tend to slightly modify the password rather than coming up with a new password. For example, changing MyPassword^ to MyPassword1^.

In addition, best practices suggest users have a minimum of 12 characters, mix alphanumeric and special symbols. Imagine applying this rule to each of our accounts, since passwords shouldn’t be reused. Most users do not store their password in a password manager, making these recommendations a burden and a challenge for people.

...