Buna Byte Cybersecurity
842 subscribers
273 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
⚑️Exploiting XSS using Polyglot JPEGs+Javascript to bypass CSP

πŸ“This vulnerability allows an attacker to use a JPEG polyglot with JavaScript to hide the malicious JavaScript payload in the image successfully without corrupting the image to bypass the site’s CSP. For this exploit you will need two parameters, one to call the malicious image and the other one to upload it.

πŸ”—https://en.hacks.gr/2023/12/27/exploiting-xss-using-polyglot-jpegsjavascript-to-bypass-csp/

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ₯°1
🏹Exploiting FTP

πŸ“FTP (File Transfer Protocol) is a service or so-called protocol for transferring files between computers via the Transmission Control Protocol / Internet Protocol (TCP / IP). It is considered as an Application Layer Protocol.

πŸ”—https://en.hacks.gr/2023/12/27/exploiting-ftp/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘5πŸ₯°1
☣️ Free Labs to Train Your Pentest / CTF Skills ☣️

πŸ”Έ Academy Hackaflag -BR https://academy.hackaflag.com.br

πŸ”Έ Try Hack Me https://tryhackme.com

πŸ”Έ Attack-Defense https://attackdefense.com

πŸ”Έ alert to win https://alf.nu/alert1

πŸ”Έ CTF Komodo Security https://ctf.komodosec.com

πŸ”Έ CMD Challenge https://cmdchallenge.com

πŸ”Έ Explotation Education https://exploit.education

πŸ”Έ Google CTF https://capturetheflag.withgoogle.com

πŸ”Έ HackTheBox https://www.hackthebox.eu

πŸ”Έ Hackthis https://www.hackthis.co.uk

πŸ”Έ Hacksplaining https://www.hacksplaining.com/exercises

πŸ”Έ Hacker101 https://ctf.hacker101.com

πŸ”Έ Hacker Security https://capturetheflag.com.br

πŸ”Έ Hacking-Lab https://www.hacking-lab.com/index.html

πŸ”Έ HSTRIKE https://hstrike.com

πŸ”Έ ImmersiveLabs https://immersivelabs.com

πŸ”Έ Labs Wizard Security https://labs.wizard-security.net

πŸ”Έ NewbieContest https://www.newbiecontest.org

πŸ”Έ OverTheWire http://overthewire.org

πŸ”Έ Practical Pentest Labs https://practicalpentestlabs.com

πŸ”Έ Pentestlab https://pentesterlab.com

πŸ”Έ Penetration Testing Practice Labs http://www.amanhardikar.com/mindmaps/Practice.html

πŸ”Έ PentestIT LAB https://lab.pentestit.ru

πŸ”Έ PicoCTF https://picoctf.com

πŸ”Έ PWNABLE https://pwnable.kr/play.php

πŸ”Έ Root-Me https://www.root-me.org

πŸ”Έ Root in Jail http://ctf.rootinjail.com

πŸ”Έ Shellter https://shellterlabs.com/pt

πŸ”Έ SANS Challenger https://www.holidayhackchallenge.com

πŸ”Έ SmashTheStack http://smashthestack.org/wargames.html

πŸ”Έ Try Hack Me https://tryhackme.com

πŸ”Έ The Cryptopals Crypto Challenges https://cryptopals.com

πŸ”Έ Vulnhub https://www.vulnhub.com

πŸ”Έ W3Challs https://w3challs.com

πŸ”Έ WeChall http://www.wechall.net

πŸ”Έ Zenk-Security https://www.zenk-security.com/epreuves.php


Join🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘Œ1
πŸ”’ Support our hackers AND cybersecurity professionals channel by sharing it with a friend.😊 Unleash their digital prowess!

αŠ¨α‰°αˆ˜α‰»α‰Ή react α‹«α‹΅αˆ­αŒ‰ πŸ˜‰

And don't forget to react if you like the contents πŸ€—
πŸ’»πŸ” #HackerCommunity

https://t.me/hacker_habesha?boost

🟒@hacker_habesha
❀5πŸ‘2❀‍πŸ”₯1πŸ‘Œ1
Web Crawlers & Directory Brute Force ⚑

πŸ”ΉDirbrute
πŸ”—https://github.com/Xyntax/DirBrute

πŸ”ΉDirb
πŸ”—https://dirb.sourceforge.net/

πŸ”Ήffuf
πŸ”—https://github.com/ffuf/ffuf

πŸ”ΉDirbuster
πŸ”—https://sourceforge.net/projects/dirbuster/

πŸ”ΉDirsearch
πŸ”—https://github.com/maurosoria/dirsearch

πŸ”ΉGobuster
πŸ”—https://github.com/OJ/gobuster

πŸ”ΉWebPathBrute
πŸ”—https://github.com/7kbstorm/7kbscan-WebPathBrute

πŸ”Ήwfuzz
πŸ”—https://github.com/xmendez/wfuzz

πŸ”ΉDirmap
πŸ”—https://github.com/H4ckForJob/dirmap

πŸ”ΉYJdirscan
πŸ”—https://github.com/foryujian/yjdirscan

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3❀‍πŸ”₯1
Sql Injection πŸ’‰


πŸ”Ή Sqlmap
πŸ”—https://github.com/sqlmapproject/sqlmap

πŸ”Ή SSQLInjection
πŸ”—https://github.com/shack2/SuperSQLInjectionV1

πŸ”ΉJsql-injection
πŸ”—https://github.com/ron190/jsql-injection

πŸ”ΉNoSQLMap
πŸ”—https://github.com/codingo/NoSQLMap

πŸ”ΉSqlmate
πŸ”—https://github.com/s0md3v/sqlmate

πŸ”ΉSQLiScanner
πŸ”—https://github.com/0xbug/SQLiScanner

πŸ”Ήsql-injection-payload-list
πŸ”—https://github.com/payloadbox/sql-injection-payload-list

πŸ”ΉAdvanced-SQL-Injection-Cheatsheet
πŸ”—https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ™1
Wordlists πŸ“„


πŸ”Ή wordlists - Real-world infosec wordlists, updated regularly.
πŸ”—https://github.com/trickest/wordlists/

πŸ”Ήpsudohash - Password list generator that focuses on keywords mutated by commonly used password creation patterns.
πŸ”—https://github.com/t3l3machus/psudohash

πŸ”Ήwister - A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.
πŸ”—https://github.com/cycurity/wister

πŸ”ΉRockyou - wordlists packaging for Kali Linux.
πŸ”—https://gitlab.com/kalilinux/packages/wordlists

πŸ”ΉWeakpass - For any kind of bruteforce find wordlists.
πŸ”—https://weakpass.com/


Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘Œ1
🌐Search Engines For PenTesters
πŸ‘Œ3🀩1
Cross-Site Scripting (XSS)

πŸ”ΉData Theft
πŸ”ΉSession Hijacking
πŸ”ΉPhishing
πŸ”ΉDefacement
πŸ”ΉKeylogging
πŸ”ΉRemote Code Execution
πŸ”ΉBypass Security Measures

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
⚑2πŸ™2
🩸Domain Takeover with PetitPotam Exploit

πŸ“Petitpotam is a vulnerability that allows a domain user to take over domain controllers through triggering authentications using the MS-EFSRPC protocol.

πŸ”—https://en.hacks.gr/2023/12/27/domain-takeover-with-petitpotam-exploit/

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘Œ3πŸ”₯1
🧬Networking Essentials

πŸ”–#infosec #cybersecurity #hacking #pentesting #security

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘1
πŸ› Red Team Toolkit

πŸ”΄Privilege Escalation
πŸ”΄Phishing
πŸ”΄OSINT
πŸ”΄Exfiltration

πŸ”–#infosec #cybersecurity #hacking #pentesting #security

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀‍πŸ”₯2⚑1πŸ™1
πŸ› Blue Team Toolkit

πŸ”΅Network Analysis
πŸ”΅EDR
πŸ”΅OS Analysis
πŸ”΅Honeypots
πŸ”΅SIEM

πŸ”–#infosec #cybersecurity #hacking #pentesting #security

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2⚑1πŸŽ‰1
βœ”οΈMetasploit Pro version 4.22 Tool βœ”οΈ

➑️Features➑️

Manual Exploitation
Anti-virus Evasion
IPS/IDS Evasion
Proxy Pivot
Post-Exploration Modules
Session Clean Up
Credentials Reuse
Social Engineering
Payload Generator
Quick Pen Testing
VPN Pivoting
Vulnerability Validation
Phishing Wizard
Web App Testing
Persistent Sessions

πŸ–±NoteπŸ–±, must use it in rdp or virtual machines .
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–

⛏ Download Here - Rar/zip Password: - zer0daylab

Download Link 1 : - https://link-target.net/886759/metasploit-pro-version-4 (Linvertise Link)


Download Link 2: - https://onotepad.com/tgArD1 (GP Link)

βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–

1- How To Download File From Linkvertise Links

Video Tutorials For Linkvertise Links

https://t.me/ZerodayExploitware/1680

Step1:- Visit Linkvertise website

Step2:- Scroll Down

Step3:- Click on the "Free Access"

2- How to Open GP Links

https://t.me/ZerodayExploitware/1484
🀩3πŸ™1πŸ‘Œ1
🐧Linux Privileges Escalation Techniques (Basic to Advanced) Series

πŸ”ΉPart 1: http://hacklido.com/blog/158
πŸ”ΉPart 2: http://hacklido.com/blog/162
πŸ”ΉPart 3: http://hacklido.com/blog/210
πŸ”ΉPart 4: http://hacklido.com/blog/224
πŸ”ΉPart 5: https://hacklido.com/blog/286


Join πŸ‘‰@hacker_habesha
❀‍πŸ”₯2πŸŽ‰1πŸ‘Œ1
This media is not supported in your browser
VIEW IN TELEGRAM
**πŸš€ Exciting News! PicoCTF-Africa Online Training Series**

Hey everyone! 🌟

Hope you're all doing well! πŸš€ I've got some exciting news - the PicoCTF-Africa online training series is kicking off on Jan 27! πŸ–₯️ It's a fantastic opportunity for university undergrads & high schoolers interested in diving into the world of cybersecurity.

πŸ”— Register here: https://forms.gle/JhgPHzCVPWEx4uPNA

πŸ“… Training starts: Jan 27

🌐 About:
πŸ–₯️Introduction to the cyber-Security concepts focusing on practical skills using a Capture The Flag (CTF) approach.
πŸ–₯️ Familiarizing with PicoCTF platform and getting ready for PicoCTF2024 competition.

πŸ“Œ Poster Attached: Check out the poster and feel free to share this amazing opportunity with your friends and peers!

πŸ“’ Kindly share with your undergrad and high school colleagues! Let's make sure everyone gets a chance to join this cybersecurity adventure.


Got questions or need more info? Drop them here, and let's get ready for an awesome learning experience together! πŸ›‘οΈβœ¨
πŸ™2πŸ‘1πŸ‘1πŸ‘Œ1
Forwarded from The Hacker News
41% attacks bypass network security.

Defense-in-Depth isn't enough. Use AI-powered Cyber Threat Intelligence (CTI) and Breach & Attack Simulation (BAS) to test defenses against real-world attacks, uncover vulnerabilities.

Read to find the key: https://thehackernews.com/2024/01/perfecting-defense-in-depth-strategy.html
❀1
❀1
πŸ“‹Cyber Security Periodic Table

πŸ”–#infosec #cybersecurity #hacking #pentesting #security

πŸ‘‰Join: @hacker_habesha
❀2πŸ”₯1πŸ‘Œ1