Buna Byte Cybersecurity
841 subscribers
273 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
πŸ“Captcha Bypass

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3😁1
🩸Exploit Eternal Blue (MS17–010) for Window 7 and higher (custom payload)

πŸ“This article shows you how to exploit the MS17–010 vulnerability on Windows 7 or higher.

πŸ”—https://en.hacks.gr/2023/12/22/exploit-eternal-blue-ms17-010-for-window-7-and-higher-custom-payload/

Join🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀3πŸ₯°1
🟒This year we made a ranking with the most popular tools between January and December 2023.πŸ˜‹



The tools of this year encompass a diverse range of cybersecurity disciplines, including AI-Enhanced Penetration Testing, Advanced Vulnerability Management, Stealth Communication Techniques, Open-Source General Purpose Vulnerability Scanning, and more.πŸ€—


Without going into further details, we have prepared a useful list of the most popular tools in Kitploit 2023:πŸ˜‹

🟒 (https://www.kitploit.com/2022/12/top-20-most-popular-hacking-tools-in.html)

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1πŸ₯°1
🧰CrackMapexec | SMB & AD Enumeration Simplified!

πŸ“Have you ever found yourself staring at a Windows network, wondering how to find vulnerabilities and security holes? Don’t worry, CrackMapExec is here to save the day! It’s like having a Swiss Army knife for your penetration testing needs.

πŸ”—https://en.hacks.gr/2023/12/15/crackmapexec-smb-ad-enumeration-simplified/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀3πŸ‘1
πŸ’£ Buffer Overflow

πŸ“From memory structure and ROP to Linux and Windows 11 real examples.

πŸ”ΉPart 1 https://en.hacks.gr/2023/10/28/buffer-overflow-part-i/

πŸ”ΉPart 2 https://en.hacks.gr/2023/10/29/buffer-overflow-part-ii/

πŸ”ΉPart 3 https://en.hacks.gr/2023/11/08/buffer-overflow-part-iii/

πŸ”ΉPart 4 https://en.hacks.gr/2023/11/09/buffer-overflow-part-iv/


Join: 🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ”₯1
πŸ•ΈοΈCloakQuest3r - Uncover The True IP Address Of Websites Safeguarded By Cloudflare

πŸ“CloakQuest3r is a powerful Python tool meticulously crafted to uncover the true IP address of websites safeguarded by Cloudflare, a widely adopted web security and performance enhancement service.

πŸ“ŒFeatures

πŸ”ΉReal IP Detection: CloakQuest3r excels in the art of discovering the real IP address of web servers employing Cloudflare's services. This crucial information is paramount for conducting comprehensive penetration tests and ensuring the security of web assets.

πŸ”ΉSubdomain Scanning: Subdomain scanning is harnessed as a fundamental component in the process of finding the real IP address. It aids in the identification of the actual server responsible for hosting the website and its associated subdomains.

πŸ”ΉThreaded Scanning: To enhance efficiency and expedite the real IP detection process, CloakQuest3r utilizes threading. This feature enables scanning of a substantial list of subdomains without significantly extending the execution time.

πŸ”ΉDetailed Reporting: The tool provides comprehensive output, including the total number of subdomains scanned, the total number of subdomains found, and the time taken for the scan. Any real IP addresses unveiled during the process are also presented, facilitating in-depth analysis and penetration testing.

πŸ”—https://github.com/spyboy-productions/CloakQuest3r



Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1🀩1
πŸ’‰SQL injection to RCE

πŸ“SQL injection is a type of web application vulnerability that allows an attacker to execute arbitrary SQL commands on a vulnerable web application’s backend database. If the web application is not properly secured, an attacker can leverage a successful SQL injection attack to achieve Remote Code Execution (RCE) on the target server.

πŸ“‹In this blog, we will explore how SQL injection vulnerabilities can be exploited to achieve RCE on a vulnerable server, along with examples of payloads that can be used to exploit these vulnerabilities.

πŸ”—https://en.hacks.gr/2023/12/27/sql-injection-to-rce/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘4😱1
🧡 Complete Cybersecurity Professional Roadmap 🧡


1. Introduction to Ethical Hacking
   - Definition
   - Purpose
   - Types of Hackers
   - Legal and Ethical Considerations

2. Networking Basics
   - TCP/IP
   - OSI Model
   - Subnetting
   - DNS
   - DHCP

3. Operating Systems
   - Linux
   - Windows
   - macOS
   - Command Line Basics

4. Cybersecurity Fundamentals
   - Encryption
   - Firewalls
   - Antivirus
   - IDS/IPS

5. Programming Languages
   - Python
   - Javascript
   - Bash Scripting
   - SQL
   - C/ C++/ Java/ Ruby

6. Scanning and Enumeration
   - Port Scanning
   - Service Enumeration
   - Vulnerability Scanning

7. Exploitation
   - Common Vulnerabilities and Exploits
   - Metasploit Framework
   - Buffer Overflows

8. Web Application Security
   - OWASP Top Ten
   - SQL Injection
   - Cross-Site Scripting (XSS)

9. Wireless Network Hacking
   - Wi-Fi Security
   - WEP, WPA, WPA2
   - Wireless Attacks

10. Social Engineering
    - Phishing
    - Spear Phishing
    - Social Engineering Toolkit (SET)

11. Sniffing and Spoofing
    - Man-in-the-Middle Attacks
    - ARP Spoofing
    - DNS Spoofing

12. Malware Analysis
    - Types of Malware
    - Sandbox Analysis
    - Signature-Based and Behavior-Based Detection

13. Incident Response and Handling
    - Incident Response Process
    - Digital Forensics
    - Chain of Custody

14. Penetration Testing
    - Types of Penetration Testing
    - Methodology
    - Reporting

15. Cryptography
    - Symmetric and Asymmetric Encryption
    - Hashing Algorithms
    - Digital Signatures

16. Mobile Hacking
    - Android and iOS Security
    - Mobile Application Security

17. Cloud Security
    - AWS, Azure, Google Cloud
    - Security Best Practices

18. IoT Security
    - Internet of Things Risks
    - Securing IoT Devices

19. Legal and Compliance
    - Computer Fraud and Abuse Act (CFAA)
    - GDPR, HIPAA, PCI DSS

20. Cybersecurity Tools
    - Nmap, Wireshark, Burp Suite
    - Snort, Nessus, Aircrack-ng

21. Career Path and Certifications
    - Certified Ethical Hacker (CEH)
    - Offensive Security Certified Professional (OSCP)
    - CISSP, CompTIA Security+

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘4πŸ‘1
FREE 45-Day Cybersecurity Internship

πŸ›‘ Program Highlights:
πŸ‘‰ Duration: 45 days of immersive learning and hands-on experience.
πŸ‘‰Focus: Dive deep into cybersecurity fundamentals and real-world applications.
πŸ‘‰Interactive Sessions: Engage in live sessions, workshops, and practical exercises.
πŸ‘‰Expert Guidance: Learn from industry professionals passionate about sharing their knowledge.
πŸ‘‰Certification: Receive a certificate upon successful completion.


This internship is an incredible opportunity to explore the dynamic field of cybersecurity, and it's completely FREE! Secure your spot now and kickstart your cybersecurity journey with SenseLearner.

πŸ”— Limited spots available! Apply now at https://forms.gle/KagLYtyiVjF8NZ5K8


#Cybersecurity #InternshipOpportunity #Senselearner #CyberSecurityInternship #InfoSec #LearnSecurity
❀3πŸ‘1πŸ₯°1
⚑️Exploiting XSS using Polyglot JPEGs+Javascript to bypass CSP

πŸ“This vulnerability allows an attacker to use a JPEG polyglot with JavaScript to hide the malicious JavaScript payload in the image successfully without corrupting the image to bypass the site’s CSP. For this exploit you will need two parameters, one to call the malicious image and the other one to upload it.

πŸ”—https://en.hacks.gr/2023/12/27/exploiting-xss-using-polyglot-jpegsjavascript-to-bypass-csp/

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ₯°1
🏹Exploiting FTP

πŸ“FTP (File Transfer Protocol) is a service or so-called protocol for transferring files between computers via the Transmission Control Protocol / Internet Protocol (TCP / IP). It is considered as an Application Layer Protocol.

πŸ”—https://en.hacks.gr/2023/12/27/exploiting-ftp/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘5πŸ₯°1
☣️ Free Labs to Train Your Pentest / CTF Skills ☣️

πŸ”Έ Academy Hackaflag -BR https://academy.hackaflag.com.br

πŸ”Έ Try Hack Me https://tryhackme.com

πŸ”Έ Attack-Defense https://attackdefense.com

πŸ”Έ alert to win https://alf.nu/alert1

πŸ”Έ CTF Komodo Security https://ctf.komodosec.com

πŸ”Έ CMD Challenge https://cmdchallenge.com

πŸ”Έ Explotation Education https://exploit.education

πŸ”Έ Google CTF https://capturetheflag.withgoogle.com

πŸ”Έ HackTheBox https://www.hackthebox.eu

πŸ”Έ Hackthis https://www.hackthis.co.uk

πŸ”Έ Hacksplaining https://www.hacksplaining.com/exercises

πŸ”Έ Hacker101 https://ctf.hacker101.com

πŸ”Έ Hacker Security https://capturetheflag.com.br

πŸ”Έ Hacking-Lab https://www.hacking-lab.com/index.html

πŸ”Έ HSTRIKE https://hstrike.com

πŸ”Έ ImmersiveLabs https://immersivelabs.com

πŸ”Έ Labs Wizard Security https://labs.wizard-security.net

πŸ”Έ NewbieContest https://www.newbiecontest.org

πŸ”Έ OverTheWire http://overthewire.org

πŸ”Έ Practical Pentest Labs https://practicalpentestlabs.com

πŸ”Έ Pentestlab https://pentesterlab.com

πŸ”Έ Penetration Testing Practice Labs http://www.amanhardikar.com/mindmaps/Practice.html

πŸ”Έ PentestIT LAB https://lab.pentestit.ru

πŸ”Έ PicoCTF https://picoctf.com

πŸ”Έ PWNABLE https://pwnable.kr/play.php

πŸ”Έ Root-Me https://www.root-me.org

πŸ”Έ Root in Jail http://ctf.rootinjail.com

πŸ”Έ Shellter https://shellterlabs.com/pt

πŸ”Έ SANS Challenger https://www.holidayhackchallenge.com

πŸ”Έ SmashTheStack http://smashthestack.org/wargames.html

πŸ”Έ Try Hack Me https://tryhackme.com

πŸ”Έ The Cryptopals Crypto Challenges https://cryptopals.com

πŸ”Έ Vulnhub https://www.vulnhub.com

πŸ”Έ W3Challs https://w3challs.com

πŸ”Έ WeChall http://www.wechall.net

πŸ”Έ Zenk-Security https://www.zenk-security.com/epreuves.php


Join🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘Œ1
πŸ”’ Support our hackers AND cybersecurity professionals channel by sharing it with a friend.😊 Unleash their digital prowess!

αŠ¨α‰°αˆ˜α‰»α‰Ή react α‹«α‹΅αˆ­αŒ‰ πŸ˜‰

And don't forget to react if you like the contents πŸ€—
πŸ’»πŸ” #HackerCommunity

https://t.me/hacker_habesha?boost

🟒@hacker_habesha
❀5πŸ‘2❀‍πŸ”₯1πŸ‘Œ1
Web Crawlers & Directory Brute Force ⚑

πŸ”ΉDirbrute
πŸ”—https://github.com/Xyntax/DirBrute

πŸ”ΉDirb
πŸ”—https://dirb.sourceforge.net/

πŸ”Ήffuf
πŸ”—https://github.com/ffuf/ffuf

πŸ”ΉDirbuster
πŸ”—https://sourceforge.net/projects/dirbuster/

πŸ”ΉDirsearch
πŸ”—https://github.com/maurosoria/dirsearch

πŸ”ΉGobuster
πŸ”—https://github.com/OJ/gobuster

πŸ”ΉWebPathBrute
πŸ”—https://github.com/7kbstorm/7kbscan-WebPathBrute

πŸ”Ήwfuzz
πŸ”—https://github.com/xmendez/wfuzz

πŸ”ΉDirmap
πŸ”—https://github.com/H4ckForJob/dirmap

πŸ”ΉYJdirscan
πŸ”—https://github.com/foryujian/yjdirscan

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3❀‍πŸ”₯1
Sql Injection πŸ’‰


πŸ”Ή Sqlmap
πŸ”—https://github.com/sqlmapproject/sqlmap

πŸ”Ή SSQLInjection
πŸ”—https://github.com/shack2/SuperSQLInjectionV1

πŸ”ΉJsql-injection
πŸ”—https://github.com/ron190/jsql-injection

πŸ”ΉNoSQLMap
πŸ”—https://github.com/codingo/NoSQLMap

πŸ”ΉSqlmate
πŸ”—https://github.com/s0md3v/sqlmate

πŸ”ΉSQLiScanner
πŸ”—https://github.com/0xbug/SQLiScanner

πŸ”Ήsql-injection-payload-list
πŸ”—https://github.com/payloadbox/sql-injection-payload-list

πŸ”ΉAdvanced-SQL-Injection-Cheatsheet
πŸ”—https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ™1
Wordlists πŸ“„


πŸ”Ή wordlists - Real-world infosec wordlists, updated regularly.
πŸ”—https://github.com/trickest/wordlists/

πŸ”Ήpsudohash - Password list generator that focuses on keywords mutated by commonly used password creation patterns.
πŸ”—https://github.com/t3l3machus/psudohash

πŸ”Ήwister - A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
πŸ”—https://github.com/cycurity/wister

πŸ”ΉRockyou - wordlists packaging for Kali Linux.
πŸ”—https://gitlab.com/kalilinux/packages/wordlists

πŸ”ΉWeakpass - For any kind of bruteforce find wordlists.
πŸ”—https://weakpass.com/


Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘Œ1
🌐Search Engines For PenTesters
πŸ‘Œ3🀩1
Cross-Site Scripting (XSS)

πŸ”ΉData Theft
πŸ”ΉSession Hijacking
πŸ”ΉPhishing
πŸ”ΉDefacement
πŸ”ΉKeylogging
πŸ”ΉRemote Code Execution
πŸ”ΉBypass Security Measures

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
⚑2πŸ™2
🩸Domain Takeover with PetitPotam Exploit

πŸ“Petitpotam is a vulnerability that allows a domain user to take over domain controllers through triggering authentications using the MS-EFSRPC protocol.

πŸ”—https://en.hacks.gr/2023/12/27/domain-takeover-with-petitpotam-exploit/

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘Œ3πŸ”₯1
🧬Networking Essentials

πŸ”–#infosec #cybersecurity #hacking #pentesting #security

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘1
πŸ› Red Team Toolkit

πŸ”΄Privilege Escalation
πŸ”΄Phishing
πŸ”΄OSINT
πŸ”΄Exfiltration

πŸ”–#infosec #cybersecurity #hacking #pentesting #security

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀‍πŸ”₯2⚑1πŸ™1