Ge'ez Tech® ግዕዝ ቴክ
geeztech+htb_phone.jpg
btw guys, almost 86% of web app has at least one serious vulnerability in their system. Back in days, there wasn't that much Job for hackers. They usually hunt local gigs or create RAAS (ransomware as a service) which will be sold on the dark web. Nowadays, there is a huge increase in cyber security professionals and it is expected to rise by 25% of the current market. Increase in technological advancement means also increase in security threat.
🔥5
The world's largest directory of tools and resources for startups and entrepreneurs.
https://startupstash.com/
#site #resources
https://startupstash.com/
#site #resources
Startup Stash
StartupStash is a curated directory of tools and resources to build your startup. All the startup resources you need to build a killer product.
❤2🔥2
The Wandering Soul
The_Car_Hackers_Handbook_A_Guide_for_the_Penetration_Tester_PDF.pdf
a glimpse from the book
🔥6
Mira
a nightmare
when i see this kind of things it reminds how i started my journey. here goes the story:
It was back then when i was 12 years old that my parents gave me a huawei smartphone. I didn't know what it is capable of and spent most of my day playing games. It was summer, and most of uni students were back home. Then i got the chance of spending a time with software engineering student at BDU. I wanted some apps from his phone, and sent what i thought at that time 'weird app' called "Github" accidentally. I heck knew nothing abt github nevertheless i created an account. It was back then and there was a limited access to Internet so that i needed to go to teachers' staff and local cafes. Unfortunately, it gets crowded everytime. I just said i gotta get what i came for, and that was the first time I did my first ever DoS attack. I used to filter their MAC address which uses high traffic and block them instantly. My first day in highschool i changed the networking scheme of the school and got almost suspended. I thought it was cool, and little did I know i was being very wrong.
TAKEAWAY: With every great power comes great responsibility. Think about your actions, because they have consequences. Just because you're capable of causing problem doesn't mean you gotta do it without proper authorization (new cyber-security professionals keep this in mind 😉)
#advices #thought
@Mi_Ra_Ch
It was back then when i was 12 years old that my parents gave me a huawei smartphone. I didn't know what it is capable of and spent most of my day playing games. It was summer, and most of uni students were back home. Then i got the chance of spending a time with software engineering student at BDU. I wanted some apps from his phone, and sent what i thought at that time 'weird app' called "Github" accidentally. I heck knew nothing abt github nevertheless i created an account. It was back then and there was a limited access to Internet so that i needed to go to teachers' staff and local cafes. Unfortunately, it gets crowded everytime. I just said i gotta get what i came for, and that was the first time I did my first ever DoS attack. I used to filter their MAC address which uses high traffic and block them instantly. My first day in highschool i changed the networking scheme of the school and got almost suspended. I thought it was cool, and little did I know i was being very wrong.
TAKEAWAY: With every great power comes great responsibility. Think about your actions, because they have consequences. Just because you're capable of causing problem doesn't mean you gotta do it without proper authorization (new cyber-security professionals keep this in mind 😉)
#advices #thought
@Mi_Ra_Ch
⚡10👍2
Forwarded from Ge'ez Tech® ግዕዝ ቴክ
#Tip
One of Beginners Problem is, they think we hack by tools, Nooooo way!
you hack if u understand the system and make ur brain do stuffs, rather than waiting bloodhound or Zap scan results.
The tools are just to make things quick and to check the thing in ur mind እየሮጠ.
So next time u hack, try to understand the system(like the developer), undertand the functionality of all buttons ,link, redirections, popups, endpoints....
Then u can craft ur attacks with ur amazing tools😊
HAPPY HACKING❤️
#geeztech @geeztechgroup
One of Beginners Problem is, they think we hack by tools, Nooooo way!
you hack if u understand the system and make ur brain do stuffs, rather than waiting bloodhound or Zap scan results.
The tools are just to make things quick and to check the thing in ur mind እየሮጠ.
So next time u hack, try to understand the system(like the developer), undertand the functionality of all buttons ,link, redirections, popups, endpoints....
Then u can craft ur attacks with ur amazing tools😊
HAPPY HACKING❤️
#geeztech @geeztechgroup
🔥6
found this wandering through my older posts from different channels. Good books for data analytics
#dataAnalytics #dataScience #books
@Mi_Ra_Ch
#dataAnalytics #dataScience #books
@Mi_Ra_Ch
Bug Bounty Hunting for Web Security.pdf
8.9 MB
for someone who was listening to yesterday's codenight vc, this might be a great Book for BBP
#books
@Mi_Ra_Ch
#books
@Mi_Ra_Ch
⚡9👍2
for now let us see the powerful tools when it comes to wireless attacks - Aerodump, Airplay, and Aircrack.
Aerodump is used for packet capturing and monitoring wireless networks. It scans for nearby networks, collects information about them (such as BSSID, channel, encryption type), and captures packets for further analysis. Imagine Aerodump as a special tool that helps you gather information from the air. It's like having a magical net that captures all the signals floating around in the air, like radio waves or Wi-Fi signals. With Aerodump, you can see (not directly through eyes lmao 🤣) what's happening in the air and collect data without disturbing anything.
Airplay. think of Airplay as a way to send messages or signals through the air. it is used for deauthentication attacks, which force clients to disconnect from a network. deauthenticating a client means you can capture the WPA handshake when they reconnect (imagine deauthenticating peeps who are scrolling TikTok 😂).
Aircrack is a password cracking tool that uses brute force or dictionary attacks to crack WPA/WPA2 passwords. It takes the captured handshake and tries different passwords from a wordlist until it finds the correct one. Aircrack is like a secret decoder that helps you unlock hidden codes or passwords. It's like having a super smart friend who can figure out tricky puzzles for you (remember those kids who cross-check your dumpiest questions 🙄)
Aerodump is used for packet capturing and monitoring wireless networks. It scans for nearby networks, collects information about them (such as BSSID, channel, encryption type), and captures packets for further analysis. Imagine Aerodump as a special tool that helps you gather information from the air. It's like having a magical net that captures all the signals floating around in the air, like radio waves or Wi-Fi signals. With Aerodump, you can see (not directly through eyes lmao 🤣) what's happening in the air and collect data without disturbing anything.
Airplay. think of Airplay as a way to send messages or signals through the air. it is used for deauthentication attacks, which force clients to disconnect from a network. deauthenticating a client means you can capture the WPA handshake when they reconnect (imagine deauthenticating peeps who are scrolling TikTok 😂).
Aircrack is a password cracking tool that uses brute force or dictionary attacks to crack WPA/WPA2 passwords. It takes the captured handshake and tries different passwords from a wordlist until it finds the correct one. Aircrack is like a secret decoder that helps you unlock hidden codes or passwords. It's like having a super smart friend who can figure out tricky puzzles for you (remember those kids who cross-check your dumpiest questions 🙄)