Tech Byte
4.73K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
e. Perhaps an adf . ly link and he could be earning easy money. Thus the attacker is “hijacking” clicks that are not meant for the actual page, but for a page where the attacker wants you to be.
Another example, using a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led the user to believe they are typing in the password for their bank account, but are actually typing into an invisible frame controlled by the attacker. The website might function normally for the unsuspecting user, but behind the scenes their vital information will be in the hands of the attacker.
DNS CACHE POISONING
DNS Cache Poisoning involves old cache data that you might think you no longer have on your computer, but is actually “toxic”. Also known as DNS Spoofing, hackers can identify vulnerabilities in a domain name system, which allows them to divert traffic from legit servers to a fake website and/or servers. This form of attack can be programmed to spread and replicate itself from one DNS server to another DNS, “poisoning” everything in it’s path.
In fact, in 2010, a DNS poisoning attack completely compromised the Great Firewall of China (GFC- Yes, it’s a thing) temporarily and censored certain content in the United States until the problem was fixed.
SOCIAL ENGINEERING ATTACKS
A social engineering attack is not technically a “hack”. When someone first finds out what exactly it is, they are surprised that it actually works. So was I, but indeed it does work.
It happens when you divulge private information in good faith, such as a credit card number, through common online interactions such as email, chat, social media sites, or virtually any website. The problem, of course, is that you’re not getting into what you think you’re getting into.
A classic example of a social engineering attack is the popular “Microsoft tech support” scam. This is when someone from a call center pretends to be a MS tech support member who says that your computer is slow and/or infected, and can be easily fixed – at a cost, of course. Considering that most computers are indeed quite slow and hang sometimes, this scam is quite well written. Of course, it need not be about money and most often it isn’t. Telling someone the name of your first pet might actually be giving them complete access to your account. Surprised? This is actually one of the most common security questions.
SYMLINKING – AN INSIDER ATTACK
A symlink (Symbolic Link) is basically a special file that “points to” a hard link on a mounted file system. A symlinking attack occurs when a hacker positions the symlink in such a way that the user or application that access the endpoint thinks they’re accessing the right file when they’re really not.(Read that again)
If the endpoint file is an output, the consequence of the symlink attack is that it could be modified instead of the file at the intended location. Modifications to the endpoint file could include appending, overwriting, corrupting, or even changing permissions.
Meaning, the user might be doing one thing, but another is actually happening. In different variations of a symlinking attack a hacker may be able to control the changes to a file, grant themselves advanced access, insert false information, expose sensitive information or corrupt and destroy vital system databases or application files.
CROSS SITE REQUEST FORGERY ATTACKS
A Cross Site Request Forgery Attack happens when a user is logged into a session (or account) and a hacker uses this opportunity to send them a forged HTTP request to collect their cookie information.
In most cases, the cookie remains valid as long as the user or the attacker stays logged into the account. This is why websites ask you to log out of your account when you’re finished and close the window after logging out – it will expire the session immediately.
In other cases, once the user’s browser session is compromised, the hacker can generate requests to the application that will not be able to differentiate between a valid user and a hacker. Another identity theft- the hacker confuses th
e server as to who he actually is.
REMOTE CODE EXECUTION ATTACKS
The most devastating in the whole list, a Remote Code Execution attack is a result of either server side or client side security weaknesses.
Vulnerable components may include libraries, remote directories on a server that haven’t been monitored, frameworks, and other software modules that run on the basis of authenticated user access. Applications that use these components are always under attack through things like scripts, malware, and small command lines that extract information.
In this attack, the hacker is basically able to get complete access to the website’s server itself. How is that so devastating? This gives him access to every bit and byte of information stored in the database(If the request is coming from the server itself, why would it be denied? That’s what it’s build for). He may also obtain access to the website’s actual code that the browser then shows the user.Meaning, he could totally wipe out the website, mess with the links and buttons, show his own stuff – Sky’s the limit. Plus there’s usually only one way to recover – Rebuild. But this also makes for quite a complicated attack, details of which aren’t suitable to be disclosed here.
DDOS ATTACK – DISTRIBUTED DENIAL OF SERVICE ATTACK
The most popular and most widely used,the DDoS attack (Distributed Denial of Services), is where a server or a machine’s services are made unavailable to its users.
The usual agenda of a DDoS campaign is to temporarily interrupt or completely take down a successfully running system.
The most common example of a DDoS attack could be sending tons of URL requests to a website or a webpage in a very small amount of time. This causes bottlenecking at the server side because the CPU simply runs out of resources.
Denial-of-service attacks are considered violations of the Internet Architecture Board’s Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers- DDoSing is highly illegal.
my my, it will take you a long way.
RedboxTV

Use this app to stream live TV stations from anywhere in world. You only need a stable 3G or 4G internet/WiFi connection. You can stream FIFA World Cup matches for free too if you'd like.
Tech Byte
RedboxTV Use this app to stream live TV stations from anywhere in world. You only need a stable 3G or 4G internet/WiFi connection. You can stream FIFA World Cup matches for free too if you'd like.
Stream live soccer matches or watch reruns on your favorite TV stations. You'll need to download and install MX Player to play the live feed.

@techBYTE
Forwarded from RL channels
RL Comic Books

Join this channel to download digital comic books for free, and read them anywhere on your phone, tablet or PC.

▶️ CLICK HERE TO JOIN ◀️
💰🇰🇪
Safaricom subscribers will now be charged a 12% fee on every transaction. Here are the new M-Pesa transaction charges effective tomorrow.

@techByte
Tips and Tricks to make Full Use of your Android Phone

https://www.android.com/phones/tips/#featured
Forwarded from RL channels
Get Ksh 300 ($3) bonus for free when you sign up, bet and win real money, withdraw from as low as $1.

Use this link to get the bonus:
https://goo.gl/5yUnLN
Some ebooks to help with hacks and coding
Here are theBest 25 Free iOS 11.3.1 Jailbreak Tweaks

Click to View

@techBYTE
Forwarded from RL Movies
​​Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage?

👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price and make sure you reach that target you set. Gather loads of views, visits, likes, follows or subs depending on your advert.

Pricing:
$3 for a day
$6 for 3 days
$14 for a week
$35 for a month


💰I accept payments via PayPal, Bitcoin, Etherium or M-Pesa💵

Simply contact me on Telegram or on any of my social media handles for advertising and feedback.

- @romL3N #RLad
Tech Byte pinned «​​Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage? 👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price…»
Microsoft Office 2019 Preview
x64 v16.0.9

Features:
Office Word
Office Excel
Office PowerPoint
Office Access
Outlook
One Note

@techBYTE