IYP Excellent Books Summary 2020 (March-April Edition) - Completely Free Download
- This series is updated every 2 months
Hi, friend! This is the second summary of 2020, the March-April edition, you can review the past content below:
- " IYP Excellent Books Annual Summary 2019 - Online Download for Free Reading " 64 copies
- " IYP Excellent Books Summary 2020 (January-February Edition) - Completely Free Download " 47 copies
Let's see if there is anything in this roundup that interests you?
1. "Cryptography: Cracking Codes"
Intelligence and Counterintelligence: Cracking the Code — —
Secret messages and code breaking are the basic skills of any confrontation.
In a standoff state, a successful encryption could have the effect of changing the trajectory of history.
Cryptography is a science, and to some extent an art, with roots dating back to ancient times.
Cryptography has no value in itself, it must be part of a system in order to function accordingly. You can think of cryptography as a lock in reality, the lock itself has no effect, it needs to function in a large system - like a building's gate, chain, safe...
👉This large system can even be extended to the person using the lock: make sure the system is locked when necessary, and the key cannot be obtained by others.
Likewise, cryptography functions as part of a larger security system.
While cryptography is only one part of the overall security system, it is the most important: it must identify what is legitimate and what is illegal. Therefore, passwords and some related factors tend to be a point of attack on any security system .
Even if the system has other vulnerabilities, it is very important to make the cryptosystem work well. Different vulnerabilities are useful to different attackers in different ways.
For example, an attacker who breaks a cryptosystem has a low probability of being detected, leaving little or no trace, because the attacker's access looks like legitimate access. Like real-life burglaries, if a burglar uses a crowbar, you'll immediately find out what's going on; if the thief uses a lock-picking method, you may have a hard time finding out that the door was opened. Many attack patterns leave traces, or cause some kind of disturbance to the system; however, attacks on cryptosystems are difficult to spot, and attackers will perform them again and again.
Beginning with definitions of basic terms like cryptanalysis, encryption, and decryption, this installment of the Intelligence and Counterintelligence series highlights that cryptography is now part of everyday business, not limited to espionage and the military.
👉 Here you can learn how to construct various encryptions from the simplest to the most complex, and then move on to the basic concepts and types of cryptanalysis.
And learn about the extremely complex structures in cryptographic systems and the advanced puzzle solutions needed to crack passwords.
👌 You'll see two sides of the cat-and-mouse game: those who try to engineer hard-to-crack encryptions, and those who try to crack those encryptions.
The book's facts and concepts are well-organized and clearly presented; graphs, photos, and sidebars add visual variety—a study best suited to serious students, not casual readers.
You can download it here: https://t.me/iyouport/7002
Movie - -
Mr. Jones, Agnieszka Holland's 2019 biographical thriller. Selected as a contender for the Golden Bear at the 69th Berlin International Film Festival.
The film tells the story of Welsh journalist Gareth Jones, who travels to the Soviet Union in 1933 to uncover the truth about the Great Famine in Ukraine, which killed millions.
This film once again confirms that the truth is unpopular and even fatal in any era, in any country, and in any system; however, the warriors who reveal the truth will never be absent in any era.
There may be scenes in this film that are familiar to Chinese readers...
https://idope.se/torrent-list/Mr. Jones/
2. "Counterintelligence: Theory and Practice"
Counterintelligence is not only a means of defense, but also an offensive weapon —
What would you do if you didn't want government spies to know your secrets? Encryption, threat modeling and assessment, disinformation at scale to obscure the real, team security training… what else?
Generally one would consider these measures to be in the basic counterintelligence model; but they are not comprehensive because, obviously, your actions are not targeted - i.e. you don't know what your adversary wants, you are just assuming "they want everything".
👉This is time-consuming and laborious, and, most likely, is sparse. A true counterintelligence tool has to be targeted, which means you need a solid understanding of what an adversary wants, how an adversary thinks, and how it acts; in order to craft the most effective counteroffensive .
Everyone in the world of security technology knows a truth: there is no one-size-fits-all solution, and there is no “guideline” that will give you peace of mind for the rest of your life, because your adversary never stops.
Time is the most innovator that cannot be ignored; if a man does not constantly seek new remedies, he is bound to encounter new difficulties - Francis Bacon
This phrase applies to most fields, including intelligence. If you want to avoid the "new evils" of the security of your vital information and the covert operations on which that data is based, you must keep digging for new remedies.
This book somehow fills a gap in the discipline's literature for some time. Not that there is little literature on this topic, on the contrary, there are quite a few books on the subject of counterintelligence; however, many of these sources have little practical explanation and no theoretical basis.
Most of this literature treats counterintelligence only as a "security" measure, which is not the case.
So while you can find a lot of material with "counterintelligence" in the title, they're narrow and clearly limited, and don't put counterintelligence in context. So they are probably not practical enough.
👉 The main body of the book examines the two main focuses of counterintelligence, namely: defensive and offensive counterintelligence. And it guides the reader through the practice of applying theory to practical situations. There are also four appendices that provide examples related to the issues discussed.
Introducing this book is to introduce the way of thinking it shows, you can ignore its use cases; 👌The way of thinking of counterintelligence can be used in any confrontation, including civil resistance groups and guerrillas .
The key is as Bacon said: the consciousness and spirit of continuous improvement.
You can download it here: https://t.me/iyouport/7008
Darknet Diaries -
This is an investigative blog created by Jack Rhysider to document true stories about hacking, malware, botnets, cryptography, cryptocurrencies, cybercrime and internet privacy.
There are a lot of interesting things.
If you're interested in security, defense, countermeasures, threat intelligence analysis, there might be something for you. http://uka5ybpmh3u54dkv.onion/
3. "Metasploit Revealed: Secrets of the Expert Pentester — Build your Defense against Complex Attacks"
"Hack the entire universe" — —
Metasploit Framework (MSF for short) is a penetration testing framework, but not a direct penetration testing attack software.
👉It contains a lot of vulnerability attack modules, almost every CVE and other vulnerabilities will be added to MSF, so some people call it a penetration testing framework that "can hack the entire universe".
Some common terms used in Metasploit include:
Exploit: refers to an attack performed by an attacker or penetration tester by exploiting a security vulnerability in a system, application or service.
Payload: It is the code that we expect the target system to execute after being penetrated.
Shellcode: is a set of machine instructions that are run as an attack payload in a penetration attack, usually written in assembly language.
Module: refers to a piece of software code component used in the Metasploit framework, which can be used to launch penetration attacks or perform some auxiliary attack actions.
Listener: A component in Metasploit that waits for a network connection.
"Post-penetration testing" includes intranet penetration, privilege maintenance, privilege escalation, reading user hashes, browser passwords, etc. MSF is often an artifact in the post-penetration testing phase.
There are quite a few books about Metasploit, the one uploaded today is relatively easy to read, and you only need a certain understanding of the concepts of networking and security to use this book.
It's an easy-to-understand practical guide to Metasploit that covers all aspects of the framework, from installation, configuration, and vulnerability hunting, to advanced client-side attacks and anti-forensics techniques.
Like all related knowledge, it focuses on practical rather than theoretical knowledge, which means that you are expected to be more hands-on and try to find the tricks .
You can download it here: https://t.me/iyouport/7031
4. "Complete Guide to Shodan"
The Complete Guide to Little Demons -
We provided a dig at Shodan last year, and it definitely makes sense that it's become a hacker's favorite because it can be pretty powerful, especially in this world of "connecting everything".
It is very exciting to hear that there are Chinese readers interested in Shodan, so the book we will upload today will introduce Shodan systematically, and it is relatively simple and requires no relevant foundation.
⚠️ Disclaimer: Shodan has numerous use cases ranging from security defenses to penetration testing to real-world attacks; the content provided here is for Creative Commons educational use only, and we are not responsible for any impact on specific operations.
You can download the book here: https://t.me/iyouport/7042
snooping camera — —
It looks like many readers are more interested in snooping on surveillance cameras. Yes, Shodan can do what the book above describes. But in order to use it proficiently, it may require some basic
To, as 👆 introduced in that book. But to use it proficiently, you need a little foundation.
In fact, there are many tools and technical methods for finding webcams online, including the simplest Googledorking that Evans once recommended .
👌Here is a list to help you summarize **webcam search tools**: still not comprehensive, but they all work.
Today is the era of surveillance cameras everywhere, and the development of related investigative tools is also booming.
list — —
hereinreality.com/webcams/
webcamtaxi.com/en/
webcam.nl
worldcams.tv
world-webcams.nsspot.net
kroooz-cams.com
webcamsmania.com
camhacker.com
opentopia.com
camvista.com
webcamhopper.com
camsecure.co.uk
webcamsabroad.com
public-camera.com/en/
mylivestreams.com
pictimo.com
livefromiceland.is
the-webcam-network.com
iplivecams.com
ip-24.net
leonardsworlds.com
whatsupcams.com/en/
wxyzwebcams.com
webcamlocator.com
123webcam.com
goandroam.com
hdontap.com
city-webcams.com
camscape.com
gobefore.me
explorewebcams.com
hereinreality.com/webcams/
myworldwebcams.com
liveincam.com
geocam.ru/en/
onlinewebcameras.com
webcambiglook.com
bit.ly/37M3Qou
cse.google.com/cse?cx=partner-pub-2526982841387487:1817040253&ie=UTF-8
cse.google.com/cse?cx=004985303091853907970:enq82n069w8
Don't miss our "Emerging Intelligence Tools" series, featuring lesser- known technologies that you may have trouble getting through conventional channels. The series will be continuously updated. It 's in the "Open Source Intelligence" section of <List-5 "Direct Action" , so you know what it's for :)
5. "Open Source Intelligence Investigation From Strategy to Implementation"
The capabilities of open source intelligence have surpassed human intelligence and even signals intelligence —
We were once in " How Technology Changed the Intelligence Industry?" - The Future of Technology and Espionage " explains this issue. Mass surveillance has undermined the freedom of movement of everyone, including government spies who need to strictly hide their identities — especially spies operating across borders, and this is one of their most prominent jokes.
As a result, artificial intelligence has been severely limited in the age of digital surveillance. At the same time, with the rise of civil disobedience (such as PI, ACLU etc.) and the efforts of the Transparency Revolution (Snowden, etc.), access to signals intelligence, while still largely unrestricted, can be exploited by spies as long as they can be exposed. The consequences of the actions can be troublesome for the government.
In this case, open source intelligence has become the most vital and effective way to obtain intelligence .
Because it is completely legal (at least in any country so far), and is extremely permissive (social engineering tricks and hacking are both permitted and required to a certain extent), and in particular, it can be powerfully intrusive Ability (because almost everyone puts themselves on the Internet these days, and many of them even expose their entire lives online).
The future of open source intelligence being restricted is extremely low because it can be used by everyone, not just government spies – from investigative journalists to civil society organizations, from fact-checking platforms to any citizen seeking the truth ——And, 👉For the public, open source intelligence is a weapon of counter-reconnaissance and counter-intelligence #AdversarialThinking
Simply put, it is an offensive weapon, a defensive tool, and a resistance. On more than one occasion, the United Nations has cited open source intelligence investigation reports as evidence of human rights violations.
This is an authoritative and accessible guide on how to conduct an open source intelligence ( OSINT ) investigation - from data collection to intelligence analysis, to the design and review of OSINT tools, and more.
👉** One of the most important aspects of any successful operation is that the planner of the operation has access to timely, reliable and actionable intelligence about the investigation or incident at hand** .
In addition to traditional investigative techniques and sources of information, open source intelligence provides valuable avenues for accessing and collecting such information.
Examples of OSINT covered in this book include: information posted on social media — also known as social media intelligence , which is one of the most public means of accessing and gathering OSINT to location tracking; also includes information obtained from the dark web a combination of open source intelligence resources, to open source intelligence with real-time analytics.
This book provides an in-depth understanding of open source intelligence from a theoretical, practical, and legal perspective; it deciphers design and deployment strategies for LEINT OSINT and other entities that need to leverage open source data; and a wealth of hands-on guides.
Note that the use cases shown here are basically from the defense and stability agency stance, but you know, the approach is the same , 👉If you're a defender, you can learn that "when the stability agency is the most professional situation" what they would do, which will help you design a more effective *counterintelligence defense* practice plan from a high level.
👌The three authors are from the European intelligence asset base - the United Kingdom, and the most significant rookie in open source intelligence - the Netherlands. Hope the knowledge it provides will be useful to you.
The IYP's "Open Source Intelligence" column is placed in Category List-5 "Direct Action" , and you surely understand what it means. Below we upload the book.
- Don't miss, on intelligence classification and history, and investigative presentation "The Map of Songs is a Better Spy Than James Bond"
You can download the book here: https://t.me/iyouport/7065
6. "Automating Open Source Intelligence; Algorithms for OSINT"
From defense to offense ——
A little different from the European Open Source Intelligence investigation guide uploaded yesterday, this book will introduce the technology from the perspective of different use cases in actual combat – including a defensive perspective. Defense is the most valuable aspect of open source intelligence to the general public, and is the main focus of IYP-related columns.
👉This book will cover data analysis, automated data collection, APIs and various investigative tools; algorithms, including supervised and unsupervised machine learning, geolocation tracking methods, means of de-anonymization, and more .
And, when it comes to ethical and situational issues, how do these contradictions occur within OSI? Big data has devoured the security and stability of private life, how should open source intelligence deal with this thorny issue?
Your cell phone provider tracks you all the time and knows who's with you; they record your online and in-store purchase patterns and show if you're unemployed, sick, or pregnant; any of your emails and texts will Expose your close friends; Google knows your most secret thoughts, Facebook can determine your sexual orientation and psychological weaknesses without your own need to mention…
The Internet itself is a tool for tracking, eavesdropping, monitoring, and making money .
👉Open source intelligence is one of the important players in the data revolution. How can we make it a messenger for defending democracy and justice, rather than adding to the nightmare of high-tech human rights violations?
We have seen successful cases of open source intelligence in promoting democracy, whether it is the investigative operations of Anonymous or the investigation and disclosure of international human rights organizations, and we have also seen cases of suffering that open source intelligence may cause, such as the epidemic of human flesh in China and many other countries. Searches, and the unbridled social media intelligence of government spies to catch people.
Internet-driven ways of collecting, storing, and disseminating data, and the advancements associated with it, have profoundly changed, and with the establishment of the Open Source Intelligence Center in the United States, it is clear enough that OSINT’s legitimacy shifts in the intelligence process from all sources.
Global interconnectivity has increased dramatically, and OSINT can generate new and useful data and intelligence insights; however, it also presents technical, political, and ethical challenges, as well as obstacles. must be treated with caution.
OSI methodology is a synthesis of several fields: data science, statistics, machine learning, programming, databases, computer science, and many others, but there is no overarching unified theory of OSI. 👉The more flexible your knowledge is, the more efficient you will be; the same can be achieved if you and your organization are good at aligning other professionals.
You can download the book here: https://t.me/iyouport/7068
Multiple nation-state advanced persistent threat (APT) actors have weaponized CVE-2019–11510, CVE-2019–11539, and CVE-2018–13379 to gain access to vulnerable VPN devices. The Canadian Cyber Security Centre has published guidelines for mitigating vulnerabilities in 3 major VPN products (PulseSecure®, Palo Alto GlobalProtect™ and Fortinet Fortigate®). #security
You can download the report here: https://t.me/iyouport/7078
"Hong Kong Users Targeted with Mobile Malware via Local News Links"
Warning: Malicious local news links are designed to take over your device —
A watering hole attack targeting iOS users was recently discovered in Hong Kong, which was first enabled in January 2020.
The attack designed multiple fake web pages masquerading as local news pages, and then injected them with iframes that could load iOS exploits. The iOS exploit is designed to exploit vulnerable iOS versions 12.1 and 12.2 on multiple models from the iPhone 6S to the iPhone X.
Visitors will be infected with iOS malware, which spyware can monitor and take full control of the device.
Such malicious news links are posted on various forums. It takes control of the victim's phone and steals data, including:
- hardware information
- contact
- keychain
- SMS message
- phone history
- GPS location
- Connected Wi-Fi History
- Safari and Chrome browser history and more
- The malware also reports the device's surroundings by
- Scan local network IP addresses
- Scan for available Wi-Fi networks
⚠️ The attack also employs specially designed modules to steal data from popular messaging apps like QQ, WeChat, and telegram.
Download the report here: https://t.me/iyouport/7081
7. "Imagery Intelligence"
Image Intelligence -
There are 6 types of information:
- SIGINT: Signals Intelligence - Data collected from electronic systems (passed in secrecy because privacy violations are likely to be unconstitutional) is a Prism-like program. MI5 has recently admitted to its illegal spying on the international rights group Privacy International, finally: A global mass surveillance system is being used against civil society like you. These surveillance programs today are often not about crime or terrorism, but about power — about control over society;
- OSINT: Open Source Intelligence —that is, the independent private investigation we recommend. Information comes from various open sources. As long as you master mining techniques, superb logical analysis, and strong critical thinking skills, you can master citizenship;
- HUMINT: Human Intelligence - Intelligence gathered from human sources, both intentional and unintentional (aka informants). Unintentional collection refers to, for example, the source of information is not an official informant, but the information provided is true and reliable and useful to the ongoing investigation;
- IMINT: Image Intelligence - data collected through images, whether they are photographs, radar screens, or other representations;
- GEOINT: Geospatial Intelligence - Intelligence obtained from satellites, drones and other sources to track and derive intelligence from security-related activities around the world. Often closely related to IMINT;
- MASINT: Measurement and Trace Intelligence - pretty much all-encompassing. MASINT intelligence comes from all sources not attributable to SIGINT or IMINT.
Today's book is about IMINT (Imagery Intelligence).
Imagery, and the graphical, geospatial, and textual intelligence products derived from it, have become increasingly important elements of planning and decision-making at all levels.
Much of the imagery available to commanders requires detailed analysis by trained experts to fully utilize its value. Image Intelligence (IMINT) is created when images and image-related information are processed, developed, analyzed, and fused with other intelligence information.
👉IMINT is not only the fundamentals of operational planning, but also one of the main sources of signals intelligence (SIGINT) or human intelligence (HUMINT).
To give the simplest example, during the Hong Kong protests, the map app made by activists that can display police presence is a fundamental aspect of IMNT.
The real IMNT focuses on interpretation, not just display, that is, intelligence analysis. IMINT must support a leader's decision-making process by reducing hostilities and mitigating uncertainty in the surrounding environment; it then requires a deeper interpretation from professional analysts about what those images mean.
👉It is both time-sensitive and must be forward-looking. For example, if an activist learns that the police are on their way to A through inside informants (artificial intelligence), and radio monitoring (signals intelligence) shows that the police are dispatched to A, then the image intelligence needs to point out the actions of the actor. What is the best route for one step.
The book's explanation of IMNT is at a relatively high level—military use cases, but it's the same for intelligence analysis and use. You can learn some skills and ways of thinking about image intelligence analysis, which will be helpful to open source intelligence investigation, citizen action planning, independent military analysis, etc.
You can get the book now here: https://t.me/iyouport/7095
8. "Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence"
Track Cryptocurrency Transactions — —
Those in power always associate cryptocurrencies with "crime", which directly leads to the thirst and constant exploration of cryptocurrency tracking technology by government spies. As a result, cryptocurrency users who aim for privacy and basic human rights are constantly losing confidence.
This is not something that happened recently. For more information, see Category Knowledge List-2 "Monitoring Blockchain and the War Against Cash" .
For most cryptocurrencies, especially Bitcoin, tracking is not difficult, we have demonstrated some basic methods, see:
- How to Use Blockchain to Track Dark Web Services Transactions
- How to Track Bitcoin Transactions on the Blockchain? 》
- Possible Security Vulnerability " VPN? Invasion? Bitcoin? How on earth were the Russian attackers discovered? 》
There is no 100% commitment in the security world, 100% now and a week from now can be completely different, the same is true in the cryptocurrency world.
Monero has been considered the option for privacy over other coins for a while, but last February, cryptocurrency industry giant Coinbase announced it had acquired a small startup called Neutrino — no ordinary company, it was made by Founded by three former employees of Hacking Team , Italy's top and notorious surveillance technology provider that has repeatedly sold spyware to tyranny, including authoritarian countries such as Ethiopia, Saudi Arabia and Sudan.
The company claims to be able to monitor and track cryptocurrencies, as well as privacy-oriented coins such as Monero.
What's more, developing and selling spyware like Hacking Team isn't illegal per se, even though it's very dangerous.
In December 2018, the U.S. Department of Homeland Security (DHS) released a pre-solicitation document for fiscal 2019, which explained that they want to devote resources to creating a **blockchain forensic application* that can monitor the movement of digital assets. *. Previous efforts have addressed bitcoin tracking, and now the agency hopes to use monitoring tools for cryptocurrencies such as monero and zcash .
Cryptocurrency money flow tracking may not be a fair game. Open- source intelligence -based tracking methods available to citizens can only stay in the middle of the target — such as investigations into the use of cryptocurrency payments by government information warfare mercenaries, investigations into scams and ransomware, and more — while confirming the true identity of the trader The final step requires information from relevant parties and cryptocurrency exchanges, which only the government has access to (unless you're lucky enough to run into one of those low-level errant trackers who themselves slapped their teammates out on social media) ).
But citizen investigations can do a lot, as those articles above 👆 demonstrate; and if you can understand how to track, you can devise more practical methods in terms of defense.
The book recommended today may help you learn more about cryptocurrency tracking surveillance; it will be useful whether you are a defender or a practitioner of direct citizen action.
Ignoring the book's description of "criminals," these tracking methods can catch drug dealers and just about anyone, including those most interested in government spies, activists, dissidents, and journalists.
This book will start with the basics, so it shouldn't be difficult to read even if you're not a fan or user of blockchain.
You can download the book here: https://t.me/iyouport/7098
9. "Cryptography Apocalypse: Preparing For The Day When Quantum Computing Breaks Today's Crypto"
Encryption in the Age of Quantum Computers ——
This is a new book for 2020. Regarding, the day quantum computers break encryption on the internet, how can you and your organization protect yourself?
Encryption is critical to protecting users, data and infrastructure in the digital age. Unfortunately, many current encryption methods will soon become obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers would soon be able to break the most popular forms of public-key encryption.
That said, the encryption technologies we rely on every day — HTTPS, TLS, WiFi protection, VPNs, encryption, PKI, digital certificates, smart cards, and most two-factor authentications — all but fail. unless you are prepared.
This book is an essential resource to help every IT and information security professional prepare for the coming quantum computing revolution. Post-quantum cryptographic algorithms are already a reality, but implementation will take a lot of time and computing power.
👌This guide helps IT leaders and implementers make appropriate decisions as quickly as possible to meet tomorrow's challenges. It provides some practical advice and provides up-to-date information on new encryption methods; describing the appropriate steps leaders must take to defend against the security threat posed by quantum computers.
Hope it works for you. Below we upload the book.
You can download the book here: https://t.me/iyouport/7101
10. "The Language of the Third Reich" in Chinese!
Four Attitudes and Five Pauses—
I once communicated with some Chinese journalists about the wording of the propaganda document; for example, language such as "5 perseverance, 3 stability", do you find it interesting? The reporters also failed to explain why the hilarious phrase became so popular. The conversation ends with "Hahaha".
The barrenness of language can be very meaningful, as Victor Klemperer has tried to illustrate with a book effort. Of course, this book analyzes the Nazi Third Reich; but when you read it... it might feel familiar.
The language of the Third Reich was impoverished. Its barrenness is fundamental; like every poverty oath it has ever made.
This language changes from the language of a group to the language of a nation, that is, it controls all spheres of public and private life: politics, court decisions, economics, arts, sciences, schools, sports, families, Kindergartens and Nurseries.
All discourse—whether printed or spoken, with literate people or with less literate people—is the same cliché, the same tone of voice.
The language of the Third Reich is entirely directed at the individual, stifling the essence of the individual, numbing his dignity as an individual, making him one of a multitude of mindless, willless animals, driven to flock to a certain prescribed direction, turning him into an atom of a rolling boulder .
The language of the Third Reich is the language of mass fanaticism. When it turns to the individual, not only to his will, but also to his mind, when it teaches, it teaches the way of fanaticism and the way of instigating the masses.
👉The reason why language is poor is not only because everyone has to follow the same example, but also because it expresses only one side of the essence of human nature in the limitation of self-selection...
Every language that is free to act serves all human needs, for the affections, and for the reason; it is telling and talking, talking to oneself and prayer, petition, command, and oath .
The language of the Third Reich serves only to swear. No matter what domain the subject belongs to, private or public - no, no, there is no difference between the private and the public domain for the language of the Third Reich any more than it is for the written language and the spoken language. The difference is the same -
👉Everything is speech, everything is public. "You are nothing, the people are everything," says one of its slogans. This means: you are never alone with yourself, never with your loved ones, you are always in the sight of your people .
If you feel the same way, please share this book. Below we upload it.
You can download the book here: https://t.me/iyouport/7104
11. Anonymous — Survival Guide for Citizens in a Revolution
A Citizen's Guide to Survival in a Revolution -
Created by Anonymous.
This guide is for *civilians* in countries that are about to be led into violent uprisings or revolutions to overthrow their oppressive governments.
This guide will provide you and your friends/neighbors/family with some basic ideas and tips on how to stay safe during the violent unrest around you. It's not a ready-made recipe, but contains general survival strategies and tactics.
👉Please note that these strategies are not only applicable to societies after violent revolutions, but also to societies and regions facing sudden large-scale disasters.
Goal: to survive and create the future.
You can download it here: https://t.me/iyouport/7107
12. "The official CIA manual of trickery and deception"
CIA Fraud Manual -- --
What are the commonalities between magic and espionage?
There are many things in common, and basically, they all belong to the art of deception.
This manual by John Mulholland for the CIA aims to apply the techniques of stealth and misdirection used by spies and professional magicians to important aspects of espionage.
👌 Just like the magician's method, the spy first needs to confuse the target in the investigation. If the target is too awake, the investigation will fail due to being discovered; similarly, the intelligence analyst must also be familiar with the method of deception like a magician, Because analysts are almost always working with incomplete information and with adversaries trying to mislead them.
Stealth operations, in particular, must be able to place the target entirely in the fraud matrix. See what Covert Ops is here.
This manual, produced for the CIA, is not explained like a seasoned professional magician, it is clearly explaining to an amateur audience, using the simplest of terms to illustrate the issues and methods.
In particular, it uses the fundamentals of magic to explain how spies avoid detection in various covert operations, for example, how to secretly obtain and hide various materials, etc.
You might be able to find something interesting here.
You can download the book here: https://t.me/iyouport/7126
13. "100 Deadly Skills: The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation"
100 Skills to Survive Sudden Disasters ——
- how to escape kidnapping;
- how to avoid the shooter;
- How to make a simple Taser gun;
- How to deceive facial recognition software;
- How to protect yourself from cybercriminals
- ...
Here's a "Hands-On Guide" by SEAL Clint Emerson that covers various ways to evade pursuers, escape capture, and survive any cataclysmic situation.
In today's increasingly dangerous world, threats to personal safety are everywhere. Danger isn't limited to dark alleys or unstable areas; disaster strikes at any time, and it doesn't say hello, and this guide hopes to help more people prepare.
👌 This book contains a variety of proven self-defense skills, evasion tactics and eclectic maneuvers to help you act in many "worst-case scenarios".
With easy-to-follow instructions and illustrations, it provides a detailed overview of many survival strategies designed to teach you how to think and act like a member of the Special Forces - from low-tech tactics to "no-tech" responses.
The overall picture is clear, detailed, and easy to understand, as with a sudden threat, you don't have the time or need to go into detail.
👉 Some readers left a message asking whether books like "Survival Guide" can have Chinese versions, yes! Yes, in the future we will publish a more detailed set of escape skills and knowledge and articles, very specific skills and training manuals - techniques to help you escape from disasters, physical threats, fighting government spies and gangsters, especially not covered in these content of the book.
You can download it here: https://t.me/iyouport/7129
14. "Complete Google Dorks List in 2019 For Ethical Hacking and Penetration Testing"
The latest GoogleDorks list -
We introduced GoogleDorks, see:
- Offensive and Defensive: A Complete List of Advanced GoogleDorking Operators
- Demonstration " Google can even easily search for passwords to hack...how to do it?" 》
- Demonstrate How to Find Confidential Information Online
Google Dorks (Google Hacking) is designed to extract strange information that is not easy to find, especially sensitive information left on the Internet ; it used to be mainly used by ethical hackers and penetration testing teams, but with the popularity of open source intelligence, The public has also begun to use this method more to get the desired content more precisely.
👉Especially for defenders, it's worth learning - if you can quickly find your own vulnerabilities before malicious actors target you, and remediate them in time, your security level can be significantly enhanced.
🌟 This upcoming *2019 Dorks List* upload below has many new additions to help you find some incredible information such as: email addresses and mailing lists, login credentials, sensitive files, website vulnerabilities...even Financial information - such as data from payment cards.
If you want to understand the basics, then there are the articles above 👆; this manual goes further.
You can download it here: https://t.me/iyouport/7150
Well that's it!
Yes, April is not over yet, so the content that has not been updated by the end of this month will be collected in the next issue (May-June edition). Hope you can gain more knowledge that you are looking forward to! See you next time. ⚪️
—— Continuously updated——
Like my work? Don't forget to support and clap, let me know that you are with me on the road of creation. Keep this enthusiasm together!
- Author
- More