♛𝐂𝐲𝐛𝐞𝐫𝐉𝐨𝐤𝐞𝐫𝐬♛


Гео и язык канала: не указан, не указан
Категория: не указана


🇭 🇦 🇨 🇰 🇮 🇳 🇬__ 🅘︎🅝︎__𝑽𝑬𝑰𝑵𝑺
🌐Part Of = @CIDHUB
"The quieter you become, the more you can hear."
🎭𝐋𝐞𝐚𝐫𝐧 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
🎭𝐂𝐲𝐛𝐞𝐫𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲
🎭𝐓𝐞𝐜𝐡𝐧𝐨𝐥𝐨𝐠𝐲
Contact us :- @PsychoHacksContact_bot

Связанные каналы

Гео и язык канала
не указан, не указан
Категория
не указана
Статистика
Фильтр публикаций


🌀 Z SECURITY [TOOLZ SPOT] COURSE LEAKED

♻️ This course is based on Ethical Hacking from beginning, whoever is a beginner in this field or don't kniow from where to start can start from this course.

🔗 Link :- https://bit.ly/3nqYpUx


imk-Satellites Communication.pdf
28.4Мб
🍎🍎Satellite Communication Course🍎🍎
#First #on #Telegram

🎐Posted By:@its_me_kali

Satellites communicate by using radio waves to send signals to the antennas on the Earth. The antennas then capture those signals and process the information coming from those signals.

❤️‍🔥 Here are some of the jobs satellites do:

❤️‍🔥 Television.

❤️‍🔥 Telephones.

❤️‍🔥 Navigation.

❤️‍🔥 Business & finance.

❤️‍🔥 Weather.

❤️‍🔥 Climate & environmental monitoring.

❤️‍🔥 Safety.

❤️‍🔥 Land stewardship.

❤️‍🔥 Military Uses

❤️‍🔥 Internet

❤️‍🔥Many More.

🥶Course🥶
https://bit.ly/30VtacT

🪅Sattelites Working🪅
https://bit.ly/3prn1PT

🪞Regards=@CIDHUB


🍏🍏Test 2021 IMK PAID CLASS🍏🍏

❤️‍🔥 Yesterday Test Answers By @Mr_Robleis


❤️‍🔥 1.) What is the difference between IP address and Mac address?

> Difference between MAC and IP address is that MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network.

❤️‍🔥 2.) List out some of the common tools used by Ethical hackers?

> Nmap Hacking Tool
Burp Suite Hacking Tool
Netsparker
Acunetix
Metasploit
Aircrack-Ng
Ettercap
John The Ripper
Wireshark
Angry IP Scanner

❤️‍🔥 3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?

> It Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Techniques : DNS Queries, N/W Enumeration, Network Queries, Ping Sweeps, Port Scanning.

❤️‍🔥 4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

> A denial-of-service (DoS) attack aims to obstruct a network or resource by flooding a target with artificial traffic, which restricts user access to the respective service being attacked. Types : Ddos, N/W Targeted Attacks, System Targeted, Teardrop.

❤️‍🔥 5.) Explain what is SQL injection?

> SQL Injection attacks (or SQLi) alter SQL queries, injecting malicious code by exploiting application vulnerabilities.

❤️‍🔥 6.) Explain what is Network Sniffing?

> Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets containing sensitive information such as password, account information etc.

❤️‍🔥 7.) Write Linux command to view text file?

> cat foo.txt or cat /etc/resolv.conf

❤️‍🔥 8.)Explain what is Burp Suite, what are the tools it consist of?

> Burp Suite is an integrated platform for performing security testing of web applications. Tools : Target, proxy, repeater, scanner, Intruder, sequencer, decoder, comparer etc.

❤️‍🔥 9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.

> When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps.

❤️‍🔥 10.) Find location and open ports of this ip address 49.33.178.116

> City : Mumbai
Region : Maharashtra (MH)
Postal code : 400070
Country : India (IN)
Continent : Asia (AS)
Coordinates : 19.0748 (lat) / 72.8856 (long)

Starting Nmap 7.40 ( https://nmap.org ) at 2021-10-22 16:14 UTC
Nmap scan report for 49.33.178.116
Host is up.
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp filtered http
110/tcp filtered pop3
143/tcp filtered imap
443/tcp filtered https
3389/tcp filtered ms-wbt-server

Nmap done: 1 IP address (1 host up) scanned in 3.15 seconds

❤️‍🔥Regards>@CIDHUB**


🍏🍏Test 2021 IMK PAID CLASS🍏🍏

❤️‍🔥 Topic: Ethical Hacking Basics


1.) What is the difference between IP address and Mac address?

2.) List out some of the common tools used by Ethical hackers?

3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?

4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

5.) Explain what is SQL injection?

6.) Explain what is Network Sniffing?

7.) Write Linux command to view text file?

8.)Explain what is Burp Suite, what are the tools it consist of?

9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.

10.) Find location and open ports of this ip address 49.33.178.116

❤️‍🔥 Try to practice, will be upload tomorrow!!

💀PRATICE COURSE💀
https://bit.ly/3jpI2qa

🍎Ethical Hacking Class🍎
https://bit.ly/30Os4Q3

❤️‍🔥 Regards:@CIDHUB




Would you like to be informed about computer forensics and investigation crime ?
Опрос
  •   Yess😍
  •   Nope🙁
40 голосов


🦅RedBlueSec🦅

Hey people,

Today we will able to analyze the IP address and the service which is being hacked thus there are 2 sections, first part we have to identify the sources and services for that IP in Wireshark furthermore, I will be searching for any username and password on that service. The second part which is meant for red team operators we are going to be able to compromise the machine and looking for any services at this IP address which we'd found before, so enough for now, have fun and don't forget to like and subscribe my channel for more contents,challenges,and more.

happy hacking:)

#redteam
#oscp
#ethicalhacker
#linux
#system32
#tryhackme

https://youtu.be/8j7ypzz2x5s


🍎🍎2021 Job Guide 🍎🍎

Top Apps That Surely Help You In getting Future Job. For that first develop your skills from @CIDHUB then apply for a job either if you want to learn from basics and 24*7 professional guidance then check below ethical hacking article.

❤️‍🔥Apna India Job
https://bit.ly/3ngpb1P

❤️‍🔥Linkdin
https://bit.ly/3nh5hDY

❤️‍🔥GlassDoor
https://bit.ly/3aZ2ZDW

❤️‍🔥Shine Jobs
https://bit.ly/3DZll43

❤️‍🔥Indeed Jobs
https://bit.ly/3ndiVrQ

🏅To build resume use below app:

❤️‍🔥 Professional CV
https://bit.ly/3m3313G

❤️‍🔥 CV Maker
https://bit.ly/2Z6kP55

🏅Portfolio Making🏅
https://bit.ly/3G8ovEj

🏝Ethical Hacking 🏝
https://bit.ly/30Os4Q3

Regards=@CIDHUB


🐻‍❄️Golang Course and Guide🐻‍❄️

Go is a statically typed, compiled programming language designed at Google by Robert Griesemer, Rob Pike, and Ken Thompson. Go is syntactically similar to C, but with memory safety, garbage collection, structural typing, and CSP-style concurrency. 

🧟‍♂Characteristics of Golang🧟‍♂

❤️‍🔥 Open-Source. The foremost characteristic of Golang programming language is that it is open-source.

❤️‍🔥 Static Typing.

❤️‍🔥 Concurrency Support.

❤️‍🔥 Powerful Standard Library and Tool Set.

❤️‍🔥 Testing Capabilities.

❤️‍🔥 Garbage Collection. ...

❤️‍🔥 Ease of Use.

❤️‍🔥 Cross-Platform Development Opportunities.

🦸‍♂Download link🦸‍♂
https://golang.org

🎅Course🎅

❤️‍🔥 Basic
https://t.me/cybertorrenthub/178

❤️‍🔥 Advance
https://mega.nz/folder/0IxkGDrb#HBWbVFE_UuPj7vQD6MinKw

🧜‍♂Full Ethical Hacking 🧜‍♂
https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08

🔥Regards=@CIDHUB


My official LinkedIn profile everyone is welcome there will be more and more concepts and valuable information stay tuned

https://www.linkedin.com/in/ahmet-göker-0a603521b


21/10/2021 blue and red teamer operation CTF challenge are you ready !!!
Опрос
  •   Yess👍👍
  •   Nope :(
20 голосов


⠀⠀⠀⠀⠀⠀⠀.          ⠀⠀⠀✦ ⠀ ⠀              ⠀⠀⠀⠀⠀* ⠀⠀⠀.          . ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀✦⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀🌀⠀⠀⠀⠀⠀⠀⠀🌠⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀☄️ ⠀ ⠀⠀⠀⠀⠀⠀.             .   ゚ .             .                ✦      ,       .
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀☀️
      *           .
.             .   ✦⠀       ,         *
   🔹  ⠀    ⠀  ,
⠀⠀⠀⠀⠀⠀⠀⠀🔸⠀⠀⠀⠀.        ⠀   ⠀. 
  ˚   ⠀ ⠀    ,  ▫    .
             .
      *⠀  ⠀       ⠀✦⠀ 
         ▪         .
    .  .   ⠀🌕
           .
       🚀
   ˚        ゚     .
 .⠀  🌎⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀‍⠀,
   *  ⠀.
     .          ⠀✦
 ˚      ✨        *
.⠀           . 🔅       .
     ✦⠀       ,  ✡            .⚛




🦅RedBlueSec🦅

Rootme challenges will be shared and solved soon stay tuned only at

https://YouTube.com/TurkishHoodie


Video about TOR for beginners ?
Опрос
  •   Yes
  •   Not interested
52 голосов


❤️‍🔥A White Hat Hacker won 300,000 US Dollars in a Chinese Cyber Security Competition for Hacking an iPhone 13 with iOS 15❤️‍🔥


🌴It's being reported in China today that a White Hat Hacker at the 4th "Tianfu Cup" International Cyber Security Competiton completed the world's first public remote jailbreak of the iPhone 13 Pro and awarded US$300,000.

🌴The report noted that when a user clicked on a link carefully forged by the attacker, the Safari browser was triggered. Remote code execution vulnerabilities allowed attackers to execute attack commands remotely.

🌴After bypassing the Safari browser protection mechanism, the hacker once again used multiple vulnerabilities in the iOS15 kernel and the A15 chip to perform a combined attack, successfully bypassing multiple security protection mechanisms, and obtained the highest control of the iPhone 13 Pro, allowing the hacker to obtain photo albums, apps and even directly delete data on the device or execute other arbitrary commands. The entire cracking process only took a second to execute.


☘Start Hacking Right Now !!

☘Join Us :- @Cyber_Jokers




❤️‍🔥 ETHICAL HACKING 2021❤️‍🔥

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization's security posture.

❤️‍🔥 Modules of Ethical Hacking

🍎Footprinting and Reconnaissance

🍎Scanning

🍎Enumeration

🍎System Hacking

🍎Malware Threats

🍎Sniffing

🍎Social Engineering

🍎Denial of Service

🍎Session Hijacking

🍎Hacking Web Servers

🍎Web Application Attacks

🍎SQL Injection

🍎Hacking Wireless Networks

🍎Hacking Mobile Devices

🍎Evading Firewall/IDS and Honey Bots

🍎Cryptography

🍎Cloud Computing

❤️‍🩹Course Link❤️‍🩹
https://mega.nz/folder/HldHkSJD#jYRQtC67Ibsg36J4yOdwVA

🫐Pass=@its_me_kali

🚔Note🚔
If interested to learn open source intelligence or Doxing, then check below article.
👇👇👇👇👇👇👇👇👇👇
https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08
👆👆👆👆👆👆👆👆👆👆

🧖‍♂Regards=@CIDHUB




Doxing.zip
5.5Мб
Use In Vm Or Rdp !!!

Показано 20 последних публикаций.

1 000

подписчиков
Статистика канала