๐2
| Protocol | Port |
___________________________________________
| DHCP | UDP port 67 (servers)
UDP port 68 (clients)
____________________________________________
| ARP | none
_____________________________________________
| Telnet | TCP port 23
_____________________________________________
| SSH | TCP port 22
_____________________________________________
| POP3 | TCP/UDP port 110 (unencrypted)
TCP/UDP port 995 (encrypted, SSL/TLS)
______________________________________________
| IMAP | TCP port 143 (unencrypted)
TCP port 993 (encrypted, SSL/TLS)
______________________________________________
| SMTP | TCP/UDP Port 25 (unencrypted)
______________________________________________
| SMTPS | TCP/UDP port 587 (encrypted, TLS)
___________________________________________
| DHCP | UDP port 67 (servers)
UDP port 68 (clients)
____________________________________________
| ARP | none
_____________________________________________
| Telnet | TCP port 23
_____________________________________________
| SSH | TCP port 22
_____________________________________________
| POP3 | TCP/UDP port 110 (unencrypted)
TCP/UDP port 995 (encrypted, SSL/TLS)
______________________________________________
| IMAP | TCP port 143 (unencrypted)
TCP port 993 (encrypted, SSL/TLS)
______________________________________________
| SMTP | TCP/UDP Port 25 (unencrypted)
______________________________________________
| SMTPS | TCP/UDP port 587 (encrypted, TLS)
๐ฅ5โค3๐1๐คฉ1
Forwarded from AASTU STUDENTS UNION OFFICIAL (AASTU_OFFICIAL Addis Ababa Science and Technology University)
Dear All,
Greetings from MoE,
We are excited to inform you about the government's new initiative, "5 Million Ethiopian Coders," launched with the support of partners. This initiative aims to provide free access to ICT-related courses through the Udacity platform, known for its high-quality, in-depth courses in programming, data science, artificial intelligence, and more.
Students and teachers can take advantage of this unique opportunity to enroll in these courses at no cost, which would otherwise be significantly expensive in USD. By participating in this program, our education community can enhance their skills and become highly competitive in the global market. The ultimate goal is not just to complete the courses but to achieve certification from Udacity, which is recognized by international organizations and can greatly enhance career prospects.
To facilitate access, we have prepared step-by-step guidelines and a video tutorial on how to register on the system and enroll in the courses. Please share this valuable information widely within your community through available media channels (email, social media, website, etc.) so that students and teachers can benefit from it, especially during the summer break.
This is a tremendous opportunity for personal and professional growth, and we encourage everyone to take full advantage of it.
This is the video link we prepared, and we have also attached the PDF guidelines:
https://youtu.be/-zSmhhD5qE4
Greetings from MoE,
We are excited to inform you about the government's new initiative, "5 Million Ethiopian Coders," launched with the support of partners. This initiative aims to provide free access to ICT-related courses through the Udacity platform, known for its high-quality, in-depth courses in programming, data science, artificial intelligence, and more.
Students and teachers can take advantage of this unique opportunity to enroll in these courses at no cost, which would otherwise be significantly expensive in USD. By participating in this program, our education community can enhance their skills and become highly competitive in the global market. The ultimate goal is not just to complete the courses but to achieve certification from Udacity, which is recognized by international organizations and can greatly enhance career prospects.
To facilitate access, we have prepared step-by-step guidelines and a video tutorial on how to register on the system and enroll in the courses. Please share this valuable information widely within your community through available media channels (email, social media, website, etc.) so that students and teachers can benefit from it, especially during the summer break.
This is a tremendous opportunity for personal and professional growth, and we encourage everyone to take full advantage of it.
This is the video link we prepared, and we have also attached the PDF guidelines:
https://youtu.be/-zSmhhD5qE4
YouTube
5 million Ethiopian coders Initiative - Step By Step Guide to Register on Udacity
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
๐คฉ6๐1
Overview Guide for Cybersecurity๐ก๐
1. Basics
โโโ Networking ๐
โ โโโ OSI Model
โ โ โโโ Layers 1-7, Functions
โ โ โโโ Encapsulation/Decapsulation
โ โโโ TCP/IP Suite
โ โ โโโ IPv4/IPv6, TCP/UDP
โ โ โโโ Protocol Ports, ICMP, ARP
โ โโโ Subnetting
โ โ โโโ CIDR, VLSM, Calculations
โ โ โโโ Supernetting
โ โโโ NAT/PAT
โ โ โโโ Types, Mechanisms
โ โ โโโ NAT Traversal
โ โโโ DNS
โ โ โโโ Resolution, DNSSEC
โ โ โโโ Spoofing, Tunneling
โ โโโ VPNs
โ โ โโโ IPSec, SSL/TLS
โ โ โโโ Split Tunneling
โ โโโ Firewalls
โ โ โโโ Stateful vs Stateless
โ โ โโโ NGFW, Rule Creation
โ โโโ Load Balancers
โ โโโ Layer 4/7, Health Checks
โ โโโ Algorithms, Session Persistence
โโโ Operating Systems ๐ป
โ โโโ Windows
โ โ โโโ Registry, AD, GPO
โ โ โโโ Event Logs
โ โโโ Linux ๐ง
โ โ โโโ Filesystem, Permissions
โ โ โโโ Systemd, Log Management
โ โโโ MacOS ๐
โ โ โโโ SIP, Keychain Access
โ โ โโโ Daemons, Gatekeeper
โ โโโ Kernel Exploits ๐
โ โ โโโ Privilege Escalation, CVE
โ โ โโโ Debugging, Exploit Dev
โ โโโ Shell Scripting ๐ฅ
โ โโโ Bash, PowerShell
โ โโโ Automation, Scheduling
โโโ Programming & Scripting ๐ก
โ โโโ Python ๐
โ โ โโโ Networking, Automation
โ โ โโโ API, Pentesting
โ โ โโโ Data Analysis
โ โโโ Bash
โ โ โโโ CLI Fu, Text Manipulation
โ โ โโโ Network Config, Process Management
โ โโโ PowerShell
โ โ โโโ Cmdlets, Remoting
โ โ โโโ Execution Policies, Admin Tasks
โ โโโ C/C++ ๐พ
โ โ โโโ Memory Management, Buffer Overflows
โ โ โโโ Pointer Manipulation, Exploits
โ โโโ Assembly Language ๐
โ โโโ x86/x64, Shellcode Dev
โ โโโ Debugging, Reverse Engineering
โ โโโ Reverse Engineering ๐
โ โโโ Disassembly, Decompilation
โ โโโ Binary Patching, Malware Analysis
2. Intermediate Security Skills ๐
โโโ Threat Modeling
โ โโโ STRIDE: Spoofing, Tampering, etc.
โ โโโ DREAD: Damage, Reproducibility, etc.
โ โโโ MITRE ATT&CK: Tactics, Techniques
โโโ Penetration Testing ๐ต๏ธโโ๏ธ
โ โโโ Reconnaissance: OSINT, DNS Recon
โ โโโ Scanning: Nmap, Nessus
โ โ โโโ Port Scanning, OS Detection
โ โ โโโ Vulnerability Prioritization
โ โโโ Exploitation: Metasploit, Custom Payloads
โ โ โโโ Shellcode, ROP
โ โ โโโ Fuzzing, Mitigation Bypass
โ โโโ Post-Exploitation: Privilege Escalation
โ โ โโโ Persistence, Data Exfiltration
โ โโโ Reporting: Documentation, Recommendations
3. Advanced Topics ๐
โโโ Offensive Security
โ โโโ Exploit Development
โ โโโ Advanced Persistent Threats (APTs)
โ โโโ Red Team Operations
โโโ Security Operations Center (SOC) ๐
โ โโโ Monitoring, Incident Response
โ โโโ SIEM Configuration
โ โโโ Threat Intelligence
โโโ Digital Forensics ๐ต๏ธโโ๏ธ
โ โโโ Data Acquisition
โ โโโ Evidence Preservation
โ โโโ Analysis & Reporting
โโโ Compliance & Governance ๐
โโโ GDPR, HIPAA
โโโ Risk Management
โโโ Policy Development
Join Us ๐๐๐๐๐๐๐๐๐๐๐๐๐
Youtube: http://www.youtube.com/@BunaByte
Facebook: https://www.facebook.com/BunaByte
Discord:https://discord.gg/khatGx6qAK
1. Basics
โโโ Networking ๐
โ โโโ OSI Model
โ โ โโโ Layers 1-7, Functions
โ โ โโโ Encapsulation/Decapsulation
โ โโโ TCP/IP Suite
โ โ โโโ IPv4/IPv6, TCP/UDP
โ โ โโโ Protocol Ports, ICMP, ARP
โ โโโ Subnetting
โ โ โโโ CIDR, VLSM, Calculations
โ โ โโโ Supernetting
โ โโโ NAT/PAT
โ โ โโโ Types, Mechanisms
โ โ โโโ NAT Traversal
โ โโโ DNS
โ โ โโโ Resolution, DNSSEC
โ โ โโโ Spoofing, Tunneling
โ โโโ VPNs
โ โ โโโ IPSec, SSL/TLS
โ โ โโโ Split Tunneling
โ โโโ Firewalls
โ โ โโโ Stateful vs Stateless
โ โ โโโ NGFW, Rule Creation
โ โโโ Load Balancers
โ โโโ Layer 4/7, Health Checks
โ โโโ Algorithms, Session Persistence
โโโ Operating Systems ๐ป
โ โโโ Windows
โ โ โโโ Registry, AD, GPO
โ โ โโโ Event Logs
โ โโโ Linux ๐ง
โ โ โโโ Filesystem, Permissions
โ โ โโโ Systemd, Log Management
โ โโโ MacOS ๐
โ โ โโโ SIP, Keychain Access
โ โ โโโ Daemons, Gatekeeper
โ โโโ Kernel Exploits ๐
โ โ โโโ Privilege Escalation, CVE
โ โ โโโ Debugging, Exploit Dev
โ โโโ Shell Scripting ๐ฅ
โ โโโ Bash, PowerShell
โ โโโ Automation, Scheduling
โโโ Programming & Scripting ๐ก
โ โโโ Python ๐
โ โ โโโ Networking, Automation
โ โ โโโ API, Pentesting
โ โ โโโ Data Analysis
โ โโโ Bash
โ โ โโโ CLI Fu, Text Manipulation
โ โ โโโ Network Config, Process Management
โ โโโ PowerShell
โ โ โโโ Cmdlets, Remoting
โ โ โโโ Execution Policies, Admin Tasks
โ โโโ C/C++ ๐พ
โ โ โโโ Memory Management, Buffer Overflows
โ โ โโโ Pointer Manipulation, Exploits
โ โโโ Assembly Language ๐
โ โโโ x86/x64, Shellcode Dev
โ โโโ Debugging, Reverse Engineering
โ โโโ Reverse Engineering ๐
โ โโโ Disassembly, Decompilation
โ โโโ Binary Patching, Malware Analysis
2. Intermediate Security Skills ๐
โโโ Threat Modeling
โ โโโ STRIDE: Spoofing, Tampering, etc.
โ โโโ DREAD: Damage, Reproducibility, etc.
โ โโโ MITRE ATT&CK: Tactics, Techniques
โโโ Penetration Testing ๐ต๏ธโโ๏ธ
โ โโโ Reconnaissance: OSINT, DNS Recon
โ โโโ Scanning: Nmap, Nessus
โ โ โโโ Port Scanning, OS Detection
โ โ โโโ Vulnerability Prioritization
โ โโโ Exploitation: Metasploit, Custom Payloads
โ โ โโโ Shellcode, ROP
โ โ โโโ Fuzzing, Mitigation Bypass
โ โโโ Post-Exploitation: Privilege Escalation
โ โ โโโ Persistence, Data Exfiltration
โ โโโ Reporting: Documentation, Recommendations
3. Advanced Topics ๐
โโโ Offensive Security
โ โโโ Exploit Development
โ โโโ Advanced Persistent Threats (APTs)
โ โโโ Red Team Operations
โโโ Security Operations Center (SOC) ๐
โ โโโ Monitoring, Incident Response
โ โโโ SIEM Configuration
โ โโโ Threat Intelligence
โโโ Digital Forensics ๐ต๏ธโโ๏ธ
โ โโโ Data Acquisition
โ โโโ Evidence Preservation
โ โโโ Analysis & Reporting
โโโ Compliance & Governance ๐
โโโ GDPR, HIPAA
โโโ Risk Management
โโโ Policy Development
Join Us ๐๐๐๐๐๐๐๐๐๐๐๐๐
Youtube: http://www.youtube.com/@BunaByte
Facebook: https://www.facebook.com/BunaByte
Discord:https://discord.gg/khatGx6qAK
โค5โก3๐2๐1
๐6๐2
๐ชฒThe best
https://malware-bit.medium.com/how-to-become-a-malware-analyst-ac8bc5ddc8f7
//Roadmap for someone who want to become Malware Analyst.https://malware-bit.medium.com/how-to-become-a-malware-analyst-ac8bc5ddc8f7
๐5๐1
Forwarded from Yekolo Temari (แจแแ แฐแแช)
Crack the Code at แณแแ Capture the Flag (CTF) Contest๐ต๏ธโโ๏ธ๐ป ๐
Ready to put your cybersecurity skills to the test? ๐ Join us for the แณแแ CTF contest, brought to you in partnership with ALX Ethiopia. ๐
This is your chance to dive into a series of challenging cybersecurity scenarios, from network hacking to web security. ๐ต๏ธโโ๏ธ๐ป
Experience the thrill of solving complex problems, competing against fellow enthusiasts, and discovering new techniques in a dynamic environment. The event will feature a range of tasks designed to push your limits and showcase your expertise. ๐
Event Details:
๐ Date: Saturday, September 7 (แณแแ 2)
โฐ Time: 1:00 PM - 6:00 PM (แจ7แก00 - 12แก00 แฐแ แต)
๐ Location: CITYPOINT ALX TECH HUB, HAYAHULET MAZORIA
๐ RSVP: bit.ly/3X7umTR
Ready to put your cybersecurity skills to the test? ๐ Join us for the แณแแ CTF contest, brought to you in partnership with ALX Ethiopia. ๐
This is your chance to dive into a series of challenging cybersecurity scenarios, from network hacking to web security. ๐ต๏ธโโ๏ธ๐ป
Experience the thrill of solving complex problems, competing against fellow enthusiasts, and discovering new techniques in a dynamic environment. The event will feature a range of tasks designed to push your limits and showcase your expertise. ๐
Event Details:
๐ Date: Saturday, September 7 (แณแแ 2)
โฐ Time: 1:00 PM - 6:00 PM (แจ7แก00 - 12แก00 แฐแ แต)
๐ Location: CITYPOINT ALX TECH HUB, HAYAHULET MAZORIA
๐ RSVP: bit.ly/3X7umTR
๐ฅ7๐คฉ2
What motivates you?
Anonymous Poll
46%
Money ๐ฐ
45%
Challenge ๐ช
15%
Revenge ๐ฟ
1%
Subversion
25%
Hacktivisim ๐ป
3%
Infamy
๐6๐2
photo_2024-09-13_22-56-33.jpg
58.5 KB
๐ Exciting News, Buna Byte Family! ๐
Weโre working on something special for youโbrand new course content, and itโs coming soon! ๐ Can't wait to share it with you all.
Also, how are you liking our fresh new look for the new year? ๐ To make things more fun, letโs have a little challenge! ๐ The first person to guess the meaning behind our logo will receive a special New Yearโs gift!
Drop your guess and donโt forget to include your Telegram username! Good luck! ๐ค
YouTube: https://www.youtube.com/@BunaByte
#BunaByte #NewYearVibes #StayTuned #Cybersecurity
Weโre working on something special for youโbrand new course content, and itโs coming soon! ๐ Can't wait to share it with you all.
Also, how are you liking our fresh new look for the new year? ๐ To make things more fun, letโs have a little challenge! ๐ The first person to guess the meaning behind our logo will receive a special New Yearโs gift!
Drop your guess and donโt forget to include your Telegram username! Good luck! ๐ค
YouTube: https://www.youtube.com/@BunaByte
#BunaByte #NewYearVibes #StayTuned #Cybersecurity
๐ฅ8๐คฉ1๐1
Hey Buna Byte family! ๐ Our first video on Networking Basics in Amharic is dropping today at 10:00 LT! ๐ฏ
Weโll be discussing what a network is and the different types of networks. Donโt miss it if you want to understand how devices connect and communicate. See you at 10! ๐ฅ
YouTube: https://www.youtube.com/@BunaByte
#BunaByte #NetworkingBasics
Weโll be discussing what a network is and the different types of networks. Donโt miss it if you want to understand how devices connect and communicate. See you at 10! ๐ฅ
YouTube: https://www.youtube.com/@BunaByte
#BunaByte #NetworkingBasics
๐ฅ9๐2๐1๐1
๐ Our first video on Networking Basics in Amharic is OUT.
https://youtu.be/H7_t_ls_PJk?si=-UWpDv2CzBeSR4Gs
https://youtu.be/H7_t_ls_PJk?si=-UWpDv2CzBeSR4Gs
YouTube
๐ขแ แแณแจ แแจแฅ แแแตแ แแ // What is a Network? // Types of Networks@geeztech
#2024 #amharic #networking
In this video, we'll explore the basics of networking and break down what a network really is. You'll learn about the four common types of networks: PAN (Personal Area Network), LAN (Local Area Network), MAN (Metropolitan Area Network)โฆ
In this video, we'll explore the basics of networking and break down what a network really is. You'll learn about the four common types of networks: PAN (Personal Area Network), LAN (Local Area Network), MAN (Metropolitan Area Network)โฆ
๐8โก3๐คฉ1
๐จ แจแณแญแ แญ แฐแ
แแแต แตแแ
แญแต แแ แแแขแซ แ แ
แญแฅ แแ! ๐จ
แจแแ แจแณแ แ แแฐ-แแณแฆแฝ แฅแตแจ แฐแแฃแซแ แแณแชแซแแฝ แจแณแญแ แญ แฐแ แแแตแ แ แตแแแ แแแฎแฝ แญแแฉแข แจแแ แ แแต แแแต แ แซแตแแแแ แแแแชแแฝ แจแฐแแแแข
แฐแฅแตแญแซแญแฅ แแตแจแ แฅแแณแตแจแฑ๐โค๏ธ
YouTube: https://www.youtube.com/@bunabyte?sub_confirmation=1
แจแแ แจแณแ แ แแฐ-แแณแฆแฝ แฅแตแจ แฐแแฃแซแ แแณแชแซแแฝ แจแณแญแ แญ แฐแ แแแตแ แ แตแแแ แแแฎแฝ แญแแฉแข แจแแ แ แแต แแแต แ แซแตแแแแ แแแแชแแฝ แจแฐแแแแข
แฐแฅแตแญแซแญแฅ แแตแจแ แฅแแณแตแจแฑ๐โค๏ธ
YouTube: https://www.youtube.com/@bunabyte?sub_confirmation=1
๐ฅ8โค3๐2๐1๐คฉ1๐1
Forwarded from Buna Byte Cybersecurity
๐ชHTTP Cookie Explained
๐นWhat?
๐นHow it works?
๐นSet-Cookie
๐นCookie
๐นPurposes
Join:๐ข@hacker_habesha๐ช๐น
๐นWhat?
๐นHow it works?
๐นSet-Cookie
๐นCookie
๐นPurposes
Join:๐ข@hacker_habesha๐ช๐น
