Bug Bounty
10.6K subscribers
369 photos
3 videos
46 files
426 links
Bugbounty Resources • Tips • Security Zines • Writeups • Vulnerability Update • Notes • Mindmaps • Cheatsheets • Checklists • Article / Blogs • PDFs • ebooks •
Download Telegram
All are cyber lovers
How you password take time to be hacking by use of these keywords
Bug Bounty pinned a photo
https://www.jewkoiyie.com/log4j-vulnerability-exploited/
Log4j vulnerability exploited by Iranian hackers and enabled PowerShell backdoor deployment
👍2
CYBER CRIME | CYBER KNOWLEDGE | CYBER SECURITY | HACKING | OWASP TOP 10 | VULNERABILITY

Unexpected Apple Safari browser bug allows cross-site user tracking

-- A software bug introduced in Apple Safari 15’s implementation of the IndexedDB API could be exploited by a malicious website in a web browser to track users

-- The vulnerability, called IndexedDB Leaks, was uncovered by fraud protection software company FingerprintJS

Please Take look at Article On it :- https://www.jewkoiyie.com/apple-safar-bug-cross-site/
#learn100 100 Days Campaign Begin

Day 1/100 of Learning hacking.

Hello To All The Group Members, I have Recently Post An Article on Basic Of Computer Networking Which is Necessary To Know For All The Beginner Hackers

Please Follow the Article to learn Basics of Computer Networking :-

https://www.jewkoiyie.com/basic-of-computer-networking-in-terms-of-hacking/
WHAT WILL YOU DO IF YOU FORGOT SOME COMMAND OF LINUX-DISTRO

man can can actually use to find out a perticular command if you forgot one like :-

man -k passwd

Use -k
Here we search keyword "passwd"
This will list all the command with having a discription "passwd".

apropos is another command which is same like man -k

https://t.co/uW1FqFozin
#Learn360 #Day 2
About Network Topologies :-
I have convered here about
1.Network Types
2.Network Topologies
3.Types of Network Topologies

To Read About It More Check Out my Learn360 days of series
https://www.jewkoiyie.com/learn360-network-topologies/
Bug Bounty pinned «#Learn360 #Day 2 About Network Topologies :- I have convered here about 1.Network Types 2.Network Topologies 3.Types of Network Topologies To Read About It More Check Out my Learn360 days of series https://www.jewkoiyie.com/learn360…»
What is ARP And DHCP Protocol, How It Works
Now today in this blog we are gonna talk about two important protocols ARP and DHCP.
ARP: ARP stands for Address Resolution Protocol which is used to associate device MAC address with IP address.
DHCP stands for Dynamic Host Configuration.
DHCP is configured as an IP service on network to automatically provide an available IP address to client devices.

You can check my blog for more details about Arp Protocol and DHCP protocol
https://www.jewkoiyie.com/what-is-arp-and-dhcp-protocol-how-they-work/
👍21
Bug Bounty pinned «What is ARP And DHCP Protocol, How It Works Now today in this blog we are gonna talk about two important protocols ARP and DHCP. ARP: ARP stands for Address Resolution Protocol which is used to associate device MAC address with IP address. DHCP stands for…»
Bug Bounty pinned «#Learn360 #Day 2 About Network Topologies :- I have convered here about 1.Network Types 2.Network Topologies 3.Types of Network Topologies To Read About It More Check Out my Learn360 days of series https://www.jewkoiyie.com/learn360…»
#CYBERSECURITY #LEARN360 #LEARNCYBERSECURITY
LEARN OSI MODEL AND IMPORTANCE OF OSI MODEL IN NETWORKING
If you want to Read More In Detail About it :- https://www.jewkoiyie.com/learn360-osi-model/
-> OSI stands for Open System Interconnection, which was published in 1984 by ISO (International Organization for Standardization).
-> It is a reference model that describes how information from software applications in a computer travels from one physical medium to software applications in another computer. OSI has seven layers, and each layer performs a specific network function.
It Contain 7 Layer in OSI Model :-
7. Physical Layer
6. Data Link Layer
5. Network Layer
4. Transport Layer
3. Session Layer
2. Presentation Layer
1. Application Layer
Bug Bounty pinned «#CYBERSECURITY #LEARN360 #LEARNCYBERSECURITY LEARN OSI MODEL AND IMPORTANCE OF OSI MODEL IN NETWORKING If you want to Read More In Detail About it :- https://www.jewkoiyie.com/learn360-osi-model/ -> OSI stands for Open System Interconnection, which was published…»
COMPUTER NETWORKING | LEARN360
What is TCP/IP And UDP and Why TCP/IP and UDP
TCP stands for Transmission Control Protocol which works in the transport layer of both the models. TCP protocol is used in transferring data or packet from source to destination and this protocol is connection oriented.

Three way Handshake :-
Three way handshake is nothing but the process of establish a connection between two devices before transmitting the data. So, now let’s see the process.

UDP Protocol :-
UDP stands for User Datagram Protocol , it is a connectionless protocol , this protocol doesn’t care whether packet is reached or not to the destination but TCP protocol does.
Read my Full Article to read about it in detail :-
https://www.jewkoiyie.com/learn360-computer-network-tcp.../
Bug Bounty pinned «COMPUTER NETWORKING | LEARN360 What is TCP/IP And UDP and Why TCP/IP and UDP TCP stands for Transmission Control Protocol which works in the transport layer of both the models. TCP protocol is used in transferring data or packet from source to destination…»
COMPUTER NETWORKING | LEARN360

Computer Networking – What is Network Security and Devices used in iT.

Network Security :-
Network security is basically used to protect our computer from Unsecure IPs or from Attacker that wants to take over our access, and In Todays world Network Security is very important for all of us. You should know what services is running on your machine so that you will get to aware from remote access shells, trojans, viruses and etc...

Firewall :-
So, Firewall is nothing but a software or you can say hardware networking device which monitors the traffic and block the suspicious or malicious traffic between internal private network and the outside internet.
Types of Firewall :-
1. Host Based Firewall.
2. Network Based Firewall.
3. Next Generation Firewall.


If you really like this post So, please go threw my full post link here:-
https://www.jewkoiyie.com/learn360-what-is-network.../
Critical Samba flaw presents code execution threat
Urgent patching of file-sharing technology urged

A newly discovered critical vulnerability in Samba could allow remote attackers to execute arbitrary code as root on affected installations.Face with monocleFace with monocleFace with monocleFace with monocle
COMPUTER NETWORKING | LEARN360
Computer Network – What is Domain Name System ( DNS ).
Domain Name Server :-

DNS stands for Domain Name System, as it is basically used to access resources from the server. As we know every devices is connected to the internet and every device has IPv4 or IPv6 address, similarly server also has IP address again n again, as IP addresses are numbers and numbers are not easy to remember, that's why Domain Name System is introduced which is readable and easy to remember for humans.

Working of DNS :-

1. When we enter any web address like example.com in our browser then our computer firsts checks its local cache if we have visited that particular website recently, if visited then fine if not then a request to the Recursive DNS Server or DNS Resolver is made.

2. ipconfig /displaydns will show you DNS details in windows.

3. The recursive server then queries a DNS root server (.).

4. If we find result at root server then process ends up here.
If we don’t get results here then root server send that particular request to the TLD server who is handing that particular TLD, in
this case it is .com.

5. The TLD server then responds with the IP address of the domain’s name server, example.com .

6. Lastly recursive DNS server sends request to the authoritative nameserver of example.com.

7. Then IP address is returned to recursive DNS server from the authoritative name server.

8. Recursive DNS Server then responds to the web browser with the IP address of the domain requested initially.

Read my full Article By Given Link :-

https://www.jewkoiyie.com/computer-network-what-is-domain-name-system-dns/