CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from BlackEye๐Ÿฅท
โค2
A new blog on Advance Snort Introduction Detection and Prevention System

https://techofide.com/blogs/mastering-snort-an-intrusion-detection-and-prevention-system-step-by-step-guide/

Join our group for more cyber security content.

t.me/ethicalhackingtechofide
๐Ÿ‘2
MagSpoof

A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
๐Ÿ”ด How to Become a RED TEAM HACKER ๐Ÿ”ด

โคท A red team hacker is an authorized individual or group that performs simulated cyberattacks to identify vulnerabilities in an organization's systems and help improve its security.

โœ… Link:
bit.ly/RedTeamer

Share & Support โค๏ธ
WebSocket Pentration Testing

HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP. Websockets are a direct TCP connection between the client browser and the webserver.

Read Article: https://bit.ly/WebSocket_PentrationTesting

@crackcodes
This media is not supported in your browser
VIEW IN TELEGRAM
โค6โšก1
๐Ÿ”ฅNETGEAR Routers: A Playground for Hackers?
Overall, the security posture of custom binaries built by NETGEAR contained many vulnerabilities, largely due to the widespread usage of insecure C functions such as strcpy, strcat, sprintf, or from off-by-one errors. However, the majority of the binaries on the NETGEAR router were compiled with many protections in place, including stack canaries, non-executable stack (NX), position-independent code (PIE) and address layout randomization (ASLR) enabled. These protections made many of the vulnerabilities identified difficult to exploit on their own.

Content:
๐Ÿ’พ Summary
๐Ÿ’พ Advisories
๐Ÿ’พ Vulnerabilities
๐Ÿ’ฝ Telnet
๐Ÿ“€ PSV-2023-0008 โ€“ Telnet Default Account Privilege Escalation Breakout
๐Ÿ’ฝ Web Application
๐Ÿ“€ PSV-2022-???? โ€“ JSON Response Stack Data Leak
๐Ÿ’ฝ SOAP Service
๐Ÿ“€ PSV-2023-0009 โ€“ Write HTTP Response Stack Pointer Leak
๐Ÿ“€ PSV-2022-???? โ€“ SOAPAction Stack Buffer Overflow
๐Ÿ“€ PSV-2023-0010 โ€“ HTTP Body Off-By-One NULL Terminator Stack Canary Corruption
๐Ÿ“€ PSV-2023-0011 โ€“ HTTP Protocol Stack Buffer Overflow
๐Ÿ“€ PSV-2023-0012 โ€“ SOAP Parameters Stack Buffer Overflow
๐Ÿ’พ Conclusion
โšก1๐Ÿ‘1
๐Ÿ˜‰ Web Pentesting Roadmap for Success ๐Ÿ˜‰

Web pentesting is a process of finding and exploiting security vulnerabilities in web applications or websites to ensure their security. It involves gathering information about the target, identifying weaknesses, and providing recommendations for improvement.

๐Ÿš€Link:
bit.ly/Web-Pentesting-Roadmap

Share with Love๐Ÿ˜˜
๐Ÿ‘1
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Malware is a type of software that is designed to cause harm to a computer or its users. It can be used to steal personal information, damage files, or even take control of a computer.

Read Full Article

https://trickypenguin.ink/what-is-malware-and-how-to-protect-against-malware-attacks/

#malware #botnets #torjan
โค5
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ’ฅ PoC for CVE-2023-32233(tested under Ubuntu 23.04)

Once the PoC is started on a vulnerable system, it may leave that system in an unstable state with corrupted kernel memory. We strongly recommend to test the PoC on a dedicated system to avoid potential data corruptions.

Download: https://system32.ink/news-feed/p/367/
โค3
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still "easy winsโ€œ out there which can be found, if you have a good strategy when it comes to reconnaissance. 

In this Blogpost I want to explain, how I am normally performing reconnaissance during Pentests and for Bug Bounties.

Read Full Article
โคโ€๐Ÿ”ฅ3
Media is too big
VIEW IN TELEGRAM
How to save all post in private from public channel
Using bot
Post credit @its_me_dollar
@Deadlymalwarexpbot
โค1
g's hacker's ( its a bad day for me but โ€”โค๏ธ
โ€ผ๏ธHere we go again

Microsoft is scanning the inside of password-protected zip files for malware
read_more

#hacker_bano_chutiya_nhe ๐Ÿ˜ค
#fuck_Microsoft ๐Ÿ˜‚
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
โค4
This media is not supported in your browser
VIEW IN TELEGRAM
โค10โคโ€๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿš€Google Dorks: Learn to Hack Anyone's Account with Google๐Ÿš€

โœ…What you'll learn?
โ€ข Complete understanding of Google Dorks
โ€ข How to find Vulnerabilities
โ€ข How to find anyone's Username & Password
โ€ข How to do Google search like a Hacker

๐Ÿ”—Link:
http://bit.ly/GoogleDorksForHacking

Share with Love๐Ÿ˜˜
web2shell

A Python program used to automate converting webshells into reverse shells. If you regularly do CTF, HTB, or red teaming you've probably spent a good chunk of time testing payloads to convert a webshell into a reverse shell. This tool aims to simplify this process.