57.7K subscribers
785 photos
9 videos
117 files
1.55K links
🌀 Basic to Advance Courses Of
🌀 Programming All Languages
🌀 Ethical Hacking Courses
🌀 Premium Accounts Giveaways
🌀Website- bit.ly/3vWBcfP

《 Paid Adverts Contact: @SID12O
💹 𝘗𝘢𝘳𝘵 𝘖𝘧 @Anonymous_CreeWz 💹
Download Telegram
​​🔰 Some greatest hacking courses and hacking books collection 🔰

🔥Link -
bit.ly/7AYUVGE

🔺 Share and support 🔻

by @itscybertech
This media is not supported in your browser
VIEW IN TELEGRAM
​​✳️ COMMON HACKER PORTS✳️

Ⓜ️ ᴄᴏᴍᴍᴏɴ ᴘᴏʀᴛs, sᴜᴄʜ ᴀs ᴛᴄᴘ ᴘᴏʀᴛ 80 (ʜᴛᴛᴘ), ᴍᴀʏ ʙᴇ ʟᴏᴄᴋᴇᴅ ᴅᴏᴡɴ — ʙᴜᴛ ᴏᴛʜᴇʀ ᴘᴏʀᴛs ᴍᴀʏ ɢᴇᴛ ᴏᴠᴇʀʟᴏᴏᴋᴇᴅ ᴀɴᴅ ʙᴇ ᴠᴜʟɴᴇʀᴀʙʟᴇ ᴛᴏ ʜᴀᴄᴋᴇʀs. ɪɴ ʏᴏᴜʀ sᴇᴄᴜʀɪᴛʏ ᴛᴇsᴛs, ʙᴇ sᴜʀᴇ ᴛᴏ ᴄʜᴇᴄᴋ ᴛʜᴇsᴇ ᴄᴏᴍᴍᴏɴʟʏ ʜᴀᴄᴋᴇᴅ ᴛᴄᴘ ᴀɴᴅ ᴜᴅᴘ ᴘᴏʀᴛs:

⚠️ ᴛᴄᴘ ᴘᴏʀᴛ 21 — ғᴛᴘ (ғɪʟᴇ ᴛʀᴀɴsғᴇʀ ᴘʀᴏᴛᴏᴄᴏʟ)

⚠️ᴛᴄᴘ ᴘᴏʀᴛ 22 — ssʜ (sᴇᴄᴜʀᴇ sʜᴇʟʟ)

⚠️ᴛᴄᴘ ᴘᴏʀᴛ 23 — ᴛᴇʟɴᴇᴛ

⚠️ᴛᴄᴘ ᴘᴏʀᴛ 25 — sᴍᴛᴘ (sɪᴍᴘʟᴇ ᴍᴀɪʟ ᴛʀᴀɴsғᴇʀ ᴘʀᴏᴛᴏᴄᴏʟ)

⚠️ᴛᴄᴘ ᴀɴᴅ ᴜᴅᴘ ᴘᴏʀᴛ 53 — ᴅɴs (ᴅᴏᴍᴀɪɴ ɴᴀᴍᴇ sʏsᴛᴇᴍ)

⚠️ᴛᴄᴘ ᴘᴏʀᴛ 443 — ʜᴛᴛᴘ (ʜʏᴘᴇʀᴛᴇxᴛ ᴛʀᴀɴsᴘᴏʀᴛ ᴘʀᴏᴛᴏᴄᴏʟ) ᴀɴᴅ ʜᴛᴛᴘs (ʜᴛᴛᴘ ᴏᴠᴇʀ ssʟ)

⚠️ᴛᴄᴘ ᴘᴏʀᴛ 110 — ᴘᴏᴘ3 (ᴘᴏsᴛ ᴏғғɪᴄᴇ ᴘʀᴏᴛᴏᴄᴏʟ ᴠᴇʀsɪᴏɴ 3)

⚠️ᴛᴄᴘ ᴀɴᴅ ᴜᴅᴘ ᴘᴏʀᴛ 135 — ᴡɪɴᴅᴏᴡs ʀᴘᴄ

⚠️ᴛᴄᴘ ᴀɴᴅ ᴜᴅᴘ ᴘᴏʀᴛs 137–139 — ᴡɪɴᴅᴏᴡs ɴᴇᴛʙɪᴏs ᴏᴠᴇʀ ᴛᴄᴘ/ɪᴘ

⚠️ᴛᴄᴘ ᴘᴏʀᴛ 1433 ᴀɴᴅ ᴜᴅᴘ ᴘᴏʀᴛ 1434 — ᴍɪᴄʀᴏsᴏғᴛ sϙʟ sᴇʀᴠᴇʀ


🐙 @Starkthebot 🐙

🐙 Share & support this channel😘❤️
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 Tɨ†คℕຮᵗᶬ -| ραη∂αչ |-)
This media is not supported in your browser
VIEW IN TELEGRAM
Cyber Tech pinned «​​🔰 Some greatest hacking courses and hacking books collection 🔰 🔥Link - bit.ly/7AYUVGE 🔺 Share and support 🔻 by @itscybertech»
Facebook Security Alert:

Your entire information is now tracking by FB. It even track account activity and other apps like NetBanking, etc.

Are you aware of a new feature that Facebook added since the February 1st update?


Many of you probably don’t know that over the past 8 weeks Facebook has been monitoring and tracking what you do when you're offline and not on Facebook.


I suggest you to look now as you won’t believe what they see. To see what they are seeing, go to Facebook settings, scroll down to Your Facebook Information.


Privacy Violation by Facebook:
1. Go to Facebook Settings,
2. Scroll down to Your Facebook Information.
3. Click on Off-Facebook Activity. (You can see the list in Manage Your Off-Facebook Activity).
4. To shut it down go in the same settings and click on 'More Options'
5. Go into Manage Future Activity and TURN IT OFF.
6. While you are there, make sure you clear the history as well.

Credit :- DS


Share And Support Us ❗️
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 Tɨ†คℕຮᵗᶬ -| ραη∂αչ |-)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from rohit sharma
thanks dude
Forwarded from Deleted Account
Working Good Thanks
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from ☠️ Hate Hacker 💻
This media is not supported in your browser
VIEW IN TELEGRAM
⭕️How do I hack someone computer or mobile by his/her ip address?⭕️
#Stark

First of all you need to know the difference between the two types of ip address,i.e.
static ip and dynamic ip.

Most of the people doesn't have a static ip. Only some big organization or companies have static ip address. On the other hand almost every common person have dynamic ip connection. Dynamic ip means that, every time you disconnect and reconnect to the internet, your system is assigned a completely new ip address.
Whereas in static ip, it doesn't matter how many times you reconnect to the internet, your ip would be the same everytime

If you are planning to attack someone who is having a static ip connection then you can move on. But if the victim is having a dynamic ip connection then you can not guess the validity of that ip.

In this case if the victim disconnects and reconnect to the internet then you have to obtain the ip address once again. So i think you got the differences between the two types of ip address by now.

Now back to the question. Even if you have the victim's ip address, its not going to help you unless there is a backdoor in the victim's system. By backdoor, i mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in victim's system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tool. So i think you've got answer to your question.

Credit : Bensalam
Posted by : @Mr_Neophyte

♻️Share and support us♻️
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Deleted Account
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Deleted Account
🤠 SHOPCLUES.COM HITS 🤠

anupamcbr@yahoo.co.in:arnold
jawahar22@rediffmail.com:indian64
suruchi.biyani@gmail.com:sbiyani241186
rajesh.editor@gmail.com:cutiepie90
vinodbhatotia@gmail.com:password
niravdesai89@gmail.com:facelive2own
nirali.kansara94@gmail.com:sakura

😈 SEND SCREENSHOTS FAST AFTER CLAIM -

@TechCyberiumSupportBot🔥


ENJOY THEM GUYS ⭐️
Forwarded from Priyam Solanki
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM