Buna Byte Cybersecurity
846 subscribers
272 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

๐Ÿ“ง Contact Email: info@bunabyte.com
Download Telegram
Which port does HTTPS typically use?
Anonymous Quiz
5%
21
2%
22
36%
80
56%
443
Which port is used by shh?
Anonymous Quiz
17%
20
21%
21
43%
22
19%
23
๐Ÿ‘2
| Protocol | Port |
___________________________________________
| DHCP | UDP port 67 (servers)
UDP port 68 (clients)
____________________________________________
| ARP | none
_____________________________________________
| Telnet | TCP port 23
_____________________________________________
| SSH | TCP port 22
_____________________________________________
| POP3 | TCP/UDP port 110 (unencrypted)
TCP/UDP port 995 (encrypted, SSL/TLS)
______________________________________________
| IMAP | TCP port 143 (unencrypted)
TCP port 993 (encrypted, SSL/TLS)
______________________________________________
| SMTP | TCP/UDP Port 25 (unencrypted)
______________________________________________
| SMTPS | TCP/UDP port 587 (encrypted, TLS)
๐Ÿ”ฅ5โค3๐Ÿ‘1๐Ÿคฉ1
New video coming out today that covers essential Linux networking commands that are crucial for viewing and managing network information and troubleshooting issues. All in Amharic๐Ÿ˜Š
๐Ÿ”ฅ7โค4๐Ÿ‘1๐Ÿคฉ1
Forwarded from AASTU STUDENTS UNION OFFICIAL (AASTU_OFFICIAL Addis Ababa Science and Technology University)
Dear All,

Greetings from MoE,

We are excited to inform you about the government's new initiative, "5 Million Ethiopian Coders," launched with the support of partners. This initiative aims to provide free access to ICT-related courses through the Udacity platform, known for its high-quality, in-depth courses in programming, data science, artificial intelligence, and more.

Students and teachers can take advantage of this unique opportunity to enroll in these courses at no cost, which would otherwise be significantly expensive in USD. By participating in this program, our education community can enhance their skills and become highly competitive in the global market. The ultimate goal is not just to complete the courses but to achieve certification from Udacity, which is recognized by international organizations and can greatly enhance career prospects.
To facilitate access, we have prepared step-by-step guidelines and a video tutorial on how to register on the system and enroll in the courses. Please share this valuable information widely within your community through available media channels (email, social media, website, etc.) so that students and teachers can benefit from it, especially during the summer break.
This is a tremendous opportunity for personal and professional growth, and we encourage everyone to take full advantage of it.
This is the video link we prepared, and we have also attached the PDF guidelines:
https://youtu.be/-zSmhhD5qE4
๐Ÿคฉ6๐Ÿ‘1
Overview Guide for Cybersecurity๐Ÿ›ก๐Ÿš€

1. Basics
โ”œโ”€โ”€ Networking ๐ŸŒ
โ”‚ โ”œโ”€โ”€ OSI Model
โ”‚ โ”‚ โ”œโ”€โ”€ Layers 1-7, Functions
โ”‚ โ”‚ โ”œโ”€โ”€ Encapsulation/Decapsulation
โ”‚ โ”œโ”€โ”€ TCP/IP Suite
โ”‚ โ”‚ โ”œโ”€โ”€ IPv4/IPv6, TCP/UDP
โ”‚ โ”‚ โ”œโ”€โ”€ Protocol Ports, ICMP, ARP
โ”‚ โ”œโ”€โ”€ Subnetting
โ”‚ โ”‚ โ”œโ”€โ”€ CIDR, VLSM, Calculations
โ”‚ โ”‚ โ”œโ”€โ”€ Supernetting
โ”‚ โ”œโ”€โ”€ NAT/PAT
โ”‚ โ”‚ โ”œโ”€โ”€ Types, Mechanisms
โ”‚ โ”‚ โ”œโ”€โ”€ NAT Traversal
โ”‚ โ”œโ”€โ”€ DNS
โ”‚ โ”‚ โ”œโ”€โ”€ Resolution, DNSSEC
โ”‚ โ”‚ โ”œโ”€โ”€ Spoofing, Tunneling
โ”‚ โ”œโ”€โ”€ VPNs
โ”‚ โ”‚ โ”œโ”€โ”€ IPSec, SSL/TLS
โ”‚ โ”‚ โ”œโ”€โ”€ Split Tunneling
โ”‚ โ”œโ”€โ”€ Firewalls
โ”‚ โ”‚ โ”œโ”€โ”€ Stateful vs Stateless
โ”‚ โ”‚ โ”œโ”€โ”€ NGFW, Rule Creation
โ”‚ โ”œโ”€โ”€ Load Balancers
โ”‚ โ”œโ”€โ”€ Layer 4/7, Health Checks
โ”‚ โ”œโ”€โ”€ Algorithms, Session Persistence

โ”œโ”€โ”€ Operating Systems ๐Ÿ’ป
โ”‚ โ”œโ”€โ”€ Windows
โ”‚ โ”‚ โ”œโ”€โ”€ Registry, AD, GPO
โ”‚ โ”‚ โ”œโ”€โ”€ Event Logs
โ”‚ โ”œโ”€โ”€ Linux ๐Ÿง
โ”‚ โ”‚ โ”œโ”€โ”€ Filesystem, Permissions
โ”‚ โ”‚ โ”œโ”€โ”€ Systemd, Log Management
โ”‚ โ”œโ”€โ”€ MacOS ๐Ÿ
โ”‚ โ”‚ โ”œโ”€โ”€ SIP, Keychain Access
โ”‚ โ”‚ โ”œโ”€โ”€ Daemons, Gatekeeper
โ”‚ โ”œโ”€โ”€ Kernel Exploits ๐Ÿ”“
โ”‚ โ”‚ โ”œโ”€โ”€ Privilege Escalation, CVE
โ”‚ โ”‚ โ”œโ”€โ”€ Debugging, Exploit Dev
โ”‚ โ”œโ”€โ”€ Shell Scripting ๐Ÿ–ฅ
โ”‚ โ”œโ”€โ”€ Bash, PowerShell
โ”‚ โ”œโ”€โ”€ Automation, Scheduling

โ”œโ”€โ”€ Programming & Scripting ๐Ÿ’ก
โ”‚ โ”œโ”€โ”€ Python ๐Ÿ
โ”‚ โ”‚ โ”œโ”€โ”€ Networking, Automation
โ”‚ โ”‚ โ”œโ”€โ”€ API, Pentesting
โ”‚ โ”‚ โ”œโ”€โ”€ Data Analysis
โ”‚ โ”œโ”€โ”€ Bash
โ”‚ โ”‚ โ”œโ”€โ”€ CLI Fu, Text Manipulation
โ”‚ โ”‚ โ”œโ”€โ”€ Network Config, Process Management
โ”‚ โ”œโ”€โ”€ PowerShell
โ”‚ โ”‚ โ”œโ”€โ”€ Cmdlets, Remoting
โ”‚ โ”‚ โ”œโ”€โ”€ Execution Policies, Admin Tasks
โ”‚ โ”œโ”€โ”€ C/C++ ๐Ÿ’พ
โ”‚ โ”‚ โ”œโ”€โ”€ Memory Management, Buffer Overflows
โ”‚ โ”‚ โ”œโ”€โ”€ Pointer Manipulation, Exploits
โ”‚ โ”œโ”€โ”€ Assembly Language ๐Ÿ› 
โ”‚ โ”œโ”€โ”€ x86/x64, Shellcode Dev
โ”‚ โ”œโ”€โ”€ Debugging, Reverse Engineering
โ”‚ โ”œโ”€โ”€ Reverse Engineering ๐Ÿ”
โ”‚ โ”œโ”€โ”€ Disassembly, Decompilation
โ”‚ โ”œโ”€โ”€ Binary Patching, Malware Analysis

2. Intermediate Security Skills ๐Ÿ”
โ”œโ”€โ”€ Threat Modeling
โ”‚ โ”œโ”€โ”€ STRIDE: Spoofing, Tampering, etc.
โ”‚ โ”œโ”€โ”€ DREAD: Damage, Reproducibility, etc.
โ”‚ โ”œโ”€โ”€ MITRE ATT&CK: Tactics, Techniques

โ”œโ”€โ”€ Penetration Testing ๐Ÿ•ต๏ธโ€โ™‚๏ธ
โ”‚ โ”œโ”€โ”€ Reconnaissance: OSINT, DNS Recon
โ”‚ โ”œโ”€โ”€ Scanning: Nmap, Nessus
โ”‚ โ”‚ โ”œโ”€โ”€ Port Scanning, OS Detection
โ”‚ โ”‚ โ”œโ”€โ”€ Vulnerability Prioritization
โ”‚ โ”œโ”€โ”€ Exploitation: Metasploit, Custom Payloads
โ”‚ โ”‚ โ”œโ”€โ”€ Shellcode, ROP
โ”‚ โ”‚ โ”œโ”€โ”€ Fuzzing, Mitigation Bypass
โ”‚ โ”œโ”€โ”€ Post-Exploitation: Privilege Escalation
โ”‚ โ”‚ โ”œโ”€โ”€ Persistence, Data Exfiltration
โ”‚ โ”œโ”€โ”€ Reporting: Documentation, Recommendations

3. Advanced Topics ๐Ÿš€
โ”œโ”€โ”€ Offensive Security
โ”‚ โ”œโ”€โ”€ Exploit Development
โ”‚ โ”œโ”€โ”€ Advanced Persistent Threats (APTs)
โ”‚ โ”œโ”€โ”€ Red Team Operations

โ”œโ”€โ”€ Security Operations Center (SOC) ๐Ÿ”
โ”‚ โ”œโ”€โ”€ Monitoring, Incident Response
โ”‚ โ”œโ”€โ”€ SIEM Configuration
โ”‚ โ”œโ”€โ”€ Threat Intelligence

โ”œโ”€โ”€ Digital Forensics ๐Ÿ•ต๏ธโ€โ™€๏ธ
โ”‚ โ”œโ”€โ”€ Data Acquisition
โ”‚ โ”œโ”€โ”€ Evidence Preservation
โ”‚ โ”œโ”€โ”€ Analysis & Reporting

โ”œโ”€โ”€ Compliance & Governance ๐Ÿ“œ
โ”œโ”€โ”€ GDPR, HIPAA
โ”œโ”€โ”€ Risk Management
โ”œโ”€โ”€ Policy Development

Join Us ๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡
Youtube: http://www.youtube.com/@BunaByte
Facebook: https://www.facebook.com/BunaByte
Discord:https://discord.gg/khatGx6qAK
โค5โšก3๐Ÿ‘2๐ŸŽ‰1
#meme ๐Ÿ˜
๐Ÿคฃ6๐Ÿ‘2๐Ÿ‘1๐Ÿ˜1
Found this AI for Ethical hackers.

Check it out ๐Ÿ™‚
๐Ÿ”— https://chat.hackerai.co/
๐Ÿ‘6๐Ÿ‘Œ2
๐ŸชฒThe best //Roadmap for someone who want to become Malware Analyst.

https://malware-bit.medium.com/how-to-become-a-malware-analyst-ac8bc5ddc8f7
๐Ÿ‘5๐Ÿ‘1
Materials Defcon and Black Hat 2024

defcon
BlackHat
๐Ÿ‘6๐Ÿ‘Œ1
#meme

I was thinking about this lately.๐Ÿ˜‚

@bunabytecs
๐Ÿคช8๐Ÿคฃ2
Crack the Code at แŒณแŒ‰แˆœ Capture the Flag (CTF) Contest๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ’ป ๐Ÿ”

Ready to put your cybersecurity skills to the test? ๐Ÿ” Join us for the แŒณแŒ‰แˆœ CTF contest, brought to you in partnership with ALX Ethiopia. ๐ŸŽ‰

This is your chance to dive into a series of challenging cybersecurity scenarios, from network hacking to web security. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ’ป

Experience the thrill of solving complex problems, competing against fellow enthusiasts, and discovering new techniques in a dynamic environment. The event will feature a range of tasks designed to push your limits and showcase your expertise. ๐Ÿš€

Event Details:

๐Ÿ“… Date: Saturday, September 7 (แŒณแŒ‰แˆœ 2)
โฐ Time: 1:00 PM - 6:00 PM (แŠจ7แก00 - 12แก00 แˆฐแŠ แ‰ต)
๐Ÿ“ Location: CITYPOINT ALX TECH HUB, HAYAHULET MAZORIA
๐Ÿ”— RSVP: bit.ly/3X7umTR
๐Ÿ”ฅ7๐Ÿคฉ2
This media is not supported in the widget
VIEW IN TELEGRAM
๐ŸŒผ๐ŸŒผ๐ŸŒผ แˆ˜แˆแŠซแˆ แŠ แ‹ฒแˆต แ‹“แˆ˜แ‰ต๐ŸŒผ๐ŸŒผ๐ŸŒผ๐ŸŒผ
๐ŸŒผ๐ŸŒผ๐ŸŒผ๐ŸŒผ๐ŸŒผ 2017 แ‹“/แˆ ๐ŸŒผ๐ŸŒผ๐ŸŒผ๐ŸŒผ๐ŸŒผ
๐Ÿ˜5๐Ÿ‘3๐Ÿ—ฟ1
Channel photo updated
photo_2024-09-13_22-56-33.jpg
58.5 KB
๐ŸŒŸ Exciting News, Buna Byte Family! ๐ŸŒŸ

Weโ€™re working on something special for youโ€”brand new course content, and itโ€™s coming soon! ๐ŸŽ‰ Can't wait to share it with you all.

Also, how are you liking our fresh new look for the new year? ๐Ÿ‘€ To make things more fun, letโ€™s have a little challenge! ๐ŸŽ The first person to guess the meaning behind our logo will receive a special New Yearโ€™s gift!

Drop your guess and donโ€™t forget to include your Telegram username! Good luck! ๐Ÿค—

YouTube: https://www.youtube.com/@BunaByte

#BunaByte #NewYearVibes #StayTuned #Cybersecurity
๐Ÿ”ฅ8๐Ÿคฉ1๐Ÿ‘Œ1
Hey Buna Byte family! ๐Ÿš€ Our first video on Networking Basics in Amharic is dropping today at 10:00 LT! ๐ŸŽฏ

Weโ€™ll be discussing what a network is and the different types of networks. Donโ€™t miss it if you want to understand how devices connect and communicate. See you at 10! ๐Ÿ”ฅ

YouTube: https://www.youtube.com/@BunaByte

#BunaByte #NetworkingBasics
๐Ÿ”ฅ9๐Ÿ‘Œ2๐Ÿ‘1๐Ÿ˜1
๐Ÿšจ แ‹จแˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ต แ‰ตแˆแˆ…แˆญแ‰ต แˆ™แˆ‰ แˆ˜แŒแ‰ขแ‹ซ แ‰ แ‰…แˆญแ‰ฅ แ‰€แŠ•! ๐Ÿšจ

แŠจแˆ˜แˆ แˆจแ‰ณแ‹Š แ…แŠ•แˆฐ-แˆ€แˆณแ‰ฆแ‰ฝ แŠฅแˆตแŠจ แ‰ฐแŒแ‰ฃแˆซแ‹Š แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝ แ‹จแˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ตแŠ• แŠ แˆตแˆแˆ‹แŒŠ แАแŒˆแˆฎแ‰ฝ แ‹ญแˆ›แˆฉแข แŠจแ‹šแˆ… แ‰ แŠแ‰ต แˆแˆแ‹ต แŠ แ‹ซแˆตแˆแˆแŒแˆ แˆˆแŒ€แˆ›แˆชแ‹Žแ‰ฝ แ‹จแ‰ฐแ‹˜แŒ‹แŒ€แข
แˆฐแ‰ฅแˆตแŠญแˆซแ‹ญแ‰ฅ แˆ›แ‹ตแˆจแŒ แŠฅแŠ•แ‹ณแ‰ตแˆจแˆฑ๐Ÿ™โค๏ธ

YouTube: https://www.youtube.com/@bunabyte?sub_confirmation=1
๐Ÿ”ฅ8โค3๐ŸŽ‰2๐Ÿ‘1๐Ÿคฉ1๐Ÿ™1