Buna Byte Cybersecurity
849 subscribers
269 photos
10 videos
2 files
189 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha
Download Telegram
Forwarded from AfroSec
๐ŸŽ„ Christmas Supply-Chain Nightmare Trust Wallet Extension Backdoored ๐Ÿ˜‚๐ŸŽ„

Version 2.68 of the Trust Wallet browser extension shipped with a silent backdoor that exfiltrated usersโ€™ mnemonic phrases straight to attacker-controlled servers. No phishing. No fake sites. Just a poisoned update.

b/c the extension auto-updated, the blast radius was massive
On Dec 25, attackers flipped the switch and began draining wallets.

๐Ÿ’ธ Tens of millions of dollars gone.

u better go and update the chrome extension ๐Ÿ‘€

@AfroSec
โค2
bunabyte.com is liveโค๏ธ.

Weโ€™re building this with the community.
Content, labs, and services are coming soonโ€”step by step, done right.

@bunabytecs bunabyte.com
๐Ÿ”ฅ13โค5๐ŸŽ‰1
Forwarded from Befikadu.. 0xfke
Got access to the server room. It was spotlessโ€ฆ and hotter than my future after touching production servers. Took the pic and evacuated immediately ๐Ÿ˜‚๐Ÿ”ฅ

@ishareFike
๐Ÿคฃ9๐Ÿ˜5๐Ÿ‘1
Befikadu.. 0xfke
Got access to the server room. It was spotlessโ€ฆ and hotter than my future after touching production servers. Took the pic and evacuated immediately ๐Ÿ˜‚๐Ÿ”ฅ @ishareFike
Servers are introverts they like it clean, quiet, and cold.๐Ÿ˜…

If your server room feels like a sauna, something upstream is crying.
Cooling isnโ€™t a luxury, itโ€™s infrastructure.
๐Ÿ‘4๐Ÿ’ฏ3
โš ๏ธ แˆ›แˆตแŒ แŠ•แ‰€แ‰‚แ‹ซแก แ‹จแ‰ฅแˆ”แˆซแ‹Š แˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซแ‹ŽแŠ• แ‰ แŠขแŠ•แ‰ฐแˆญแŠ”แ‰ต แˆ‹แ‹ญ แŠจแˆ›แŒ‹แˆซแ‰ต แ‹ญแ‰†แŒ แ‰ก!

แ‹จแ‰ฅแˆ”แˆซแ‹Š แˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซ (National ID) แ‹จแŠฅแˆญแˆตแ‹Ž แ‹ฒแŒ‚แ‰ณแˆ แˆ›แŠ•แАแ‰ต แˆ˜แŒˆแˆˆแŒซ แАแ‹แข แ‹ญแˆ…แŠ•แŠ• แˆ˜แˆจแŒƒ แ‰ แˆ›แˆ…แ‰ แˆซแ‹Š แˆšแ‹ฒแ‹ซ (Facebook, Telegram, WhatsApp) แ‹ˆแ‹ญแˆ แ‰ฃแˆแ‰ฐแˆจแŒ‹แŒˆแŒก แ‹ตแˆจ-แŒˆแŒพแ‰ฝ แˆ‹แ‹ญ แˆ›แŒ‹แˆซแ‰ต แˆˆแŠจแแ‰ฐแŠ› แŠ แ‹ฐแŒ‹ แ‹ซแŒ‹แˆแŒฅแ‹Žแ‰ณแˆแข

๐Ÿ“Œ แˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซแŠ• แˆ›แŒ‹แˆซแ‰ต แ‹จแˆšแ‹ซแˆตแŠจแ‰ตแˆ‹แ‰ธแ‹ แŒ‰แ‹ณแ‰ถแ‰ฝแฆ

แ‹จแˆ›แŠ•แАแ‰ต แˆตแˆญแ‰†แ‰ต (Identity Theft)แก แ‹ˆแŠ•แŒ€แˆˆแŠžแ‰ฝ แ‹จแŠฅแˆญแˆตแ‹ŽแŠ• แˆ˜แˆจแŒƒ แ‰ แˆ˜แŒ แ‰€แˆ แ‰ แŠฅแˆญแˆตแ‹Ž แˆตแˆ แ‹จแ‰ฃแŠ•แŠญ แŠ แŠซแ‹แŠ•แ‰ต แˆŠแŠจแแ‰ฑแฃ แ‰ฅแ‹ตแˆญ แˆŠแ‹ˆแˆตแ‹ฑ แ‹ˆแ‹ญแˆ แ‹จแ‰ฐแˆˆแ‹ซแ‹ฉ แŒแ‰ฅแ‹ญแ‰ถแ‰ฝแŠ• แˆŠแˆแŒฝแˆ™ แ‹ญแ‰ฝแˆ‹แˆ‰แข

แ‹จแ‹แ‹ญแŠ“แŠ•แˆต แˆ˜แŒญแ‰ แˆญแ‰ แˆญแฆ แŠจแˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซแ‹Ž แˆ‹แ‹ญ แ‹จแˆšแŒˆแŠ™ แˆ˜แˆจแŒƒแ‹Žแ‰ฝแŠ• แ‰ แˆ˜แŒ แ‰€แˆ แ‹จแ‰ฃแŠ•แŠญ แŠ แŠซแ‹แŠ•แ‰ตแ‹ŽแŠ• แ‹ˆแ‹ญแˆ แ‹จแ‹ฒแŒ‚แ‰ณแˆ แŠญแแ‹ซ แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซแ‹Žแ‰ฝแ‹ŽแŠ• แˆฐแ‰ฅแˆจแ‹ แ‰ แˆ˜แŒแ‰ฃแ‰ต แŒˆแŠ•แ‹˜แ‰ฅแ‹ŽแŠ• แˆŠแˆฐแˆญแ‰ แ‹ญแ‰ฝแˆ‹แˆ‰แข

Dark Web แŒˆแ‰ แ‹ซ แˆฝแ‹ซแŒญแฆ แ‹จแŒแˆ แˆ˜แˆจแŒƒแ‹Žแ‰ฝ แ‰ แ‹ตแ‰ฅแ‰… แ‹จแŠขแŠ•แ‰ฐแˆญแŠ”แ‰ต แ‹“แˆˆแˆ (Dark Web) แˆ‹แ‹ญ แˆˆแˆฝแ‹ซแŒญ แˆŠแ‰€แˆญแ‰ก แ‹ญแ‰ฝแˆ‹แˆ‰แข

แˆˆแ‰ฐแˆˆแ‹ซแ‹ฉ แ‹ˆแŠ•แŒ€แˆŽแ‰ฝ แ‰ฐแ‰ฃแ‰ฃแˆช แˆ˜แˆ†แŠ•แฆ แ‹จแŠฅแˆญแˆตแ‹Ž แˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซ แˆˆแˆŒแˆ‹ แˆ…แŒˆ-แ‹ˆแŒฅ แ‰ฐแŒแ‰ฃแˆญ (แˆˆแˆแˆณแˆŒ แˆˆแˆฒแˆ แŠซแˆญแ‹ต แˆตแˆ แ‹แ‹แ‹แˆญ) แ‰ขแ‹แˆแฃ แ‰ฐแŒ แ‹ซแ‰‚แАแ‰ฑ แ‹จแŠฅแˆญแˆตแ‹Ž แ‹ญแˆ†แŠ“แˆแข

โœ… แŠฅแˆซแˆตแ‹ŽแŠ• แŠฅแŠ•แ‹ดแ‰ต แ‹ญแŒ แ‰ฅแ‰
... Part 2

แˆตแˆˆ แˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ต (Cybersecurity) แ‹จแ‰ แˆˆแŒ  แˆ˜แˆจแ‹ณแ‰ต แ‹ญแˆแˆแŒ‹แˆ‰?

แŠจแŠฅแŠ› แŒ‹แˆญ แ‰ แˆ˜แˆ†แŠ• แˆ˜แˆจแŒƒแ‹ŽแŠ• แ‹ญแŒ แ‰ฅแ‰แฆ

๐ŸŒ แ‹ตแˆจ-แŒˆแŒปแ‰ฝแŠ•แฆ
bunabyte.com
๐Ÿ“ข แ‰ดแˆŒแŒแˆซแˆแฆ
t.me/bunabytecs
๐Ÿ“ง แŠขแˆœแ‹ญแˆแฆ
info@bunabyte.com

Buna Byte โ€” แˆˆแ‰ฐแˆปแˆˆ แ‹จแ‹ฒแŒ‚แ‰ณแˆ แ‹ฐแˆ…แŠ•แАแ‰ต!
๐Ÿ‘8โค2
...#Part02

โœ… แŠฅแˆซแˆตแ‹ŽแŠ• แŠฅแŠ•แ‹ดแ‰ต แ‹ญแŒ แ‰ฅแ‰?

1. แˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซแ‹ŽแŠ• แŽแ‰ถ แŠ แŠ•แˆตแ‰ฐแ‹ แŠ แ‹ญแ–แˆตแ‰ฑแฆ แ‹จแ‰ฑแŠ•แˆ แ‹ซแˆ…แˆ แ‹ฐแˆตแ‰ฐแŠ› แ‰ขแˆ†แŠ‘ แ‹ˆแ‹ญแˆ แˆˆแˆตแˆซ แ‰ขแˆแˆˆแŒแฃ แ‰ แŒแˆแŒฝ แ‹จแˆถแˆปแˆ แˆšแ‹ฒแ‹ซ แŒˆแŒพแ‰ฝ แˆ‹แ‹ญ แ‰ แแŒนแˆ แŠ แ‹ญแˆแ‰€แ‰แข

2. แ‰ แ‰ดแˆŒแŒแˆซแˆ แ‹ˆแ‹ญแˆ แ‰ แˆœแˆดแŠ•แŒ€แˆญ แŠ แ‹ญแˆ‹แŠฉแฆ แŠ แˆตแˆแˆ‹แŒŠ แˆ†แŠ– แˆฒแŒˆแŠ แŠฅแŠ•แŠณแŠ• แ‹ฐแˆ…แŠ•แАแ‰ฑ แ‰ แ‰ฐแŒ แ‰ แ‰€ แˆ˜แŠ•แŒˆแ‹ต แŠฅแŠ•แŒ‚ แ‰ แŒแˆ แ‹จแˆ˜แˆแ‹•แŠญแ‰ต แˆ˜แˆˆแ‹‹แ‹ˆแŒซแ‹Žแ‰ฝ แˆ˜แˆ‹แŠญ แŠ แ‹ฐแŒ‹ แŠ แˆˆแ‹แข

3. แ‹จแˆ›แŠ•แАแ‰ต แˆ›แˆจแŒ‹แŒˆแŒซ แˆฒแŒ แ‹จแ‰ แ‹ญแŒ แŠ•แ‰€แ‰แฆ แˆ›แŠ•แŠ›แ‹แˆ แ‹ตแˆญแŒ…แ‰ต แˆ˜แ‰ณแ‹ˆแ‰‚แ‹ซแ‹ŽแŠ• แˆฒแŒ แ‹ญแ‰… แˆˆแˆแŠ• แ‹“แˆ‹แˆ› แŠฅแŠ•แ‹ฐแˆšแ‹แˆ แŠฅแŠ“ แˆ˜แˆจแŒƒแ‹ แŠฅแŠ•แ‹ดแ‰ต แŠฅแŠ•แ‹ฐแˆšแŒ แ‰ แ‰… แŠฅแˆญแŒแŒ แŠ› แ‹ญแˆแŠ‘แข


แˆ›แˆตแ‰ณแ‹ˆแˆปแฆ แ‹จแŠฅแˆญแˆตแ‹Ž แ‹ฐแˆ…แŠ•แАแ‰ต แˆˆแŠฅแŠ› แ‰…แ‹ตแˆšแ‹ซ แ‹จแˆแŠ•แˆฐแŒ แ‹ แŒ‰แ‹ณแ‹ญ แАแ‹แข แŒฅแŠ•แ‰ƒแ‰„ แ‰ แˆ›แ‹ตแˆจแŒ แˆ›แŠ•แАแ‰ตแ‹ŽแŠ• แŠจแ‹ฒแŒ‚แ‰ณแˆ แŠ แŒญแ‰ แˆญแ‰ฃแˆชแ‹Žแ‰ฝ แ‹ญแŒ แ‰ฅแ‰แข

แˆตแˆˆ แˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ต (Cybersecurity) แ‹จแ‰ แˆˆแŒ  แˆ˜แˆจแ‹ณแ‰ต แ‹ญแˆแˆแŒ‹แˆ‰?

แŠจแŠฅแŠ› แŒ‹แˆญ แ‰ แˆ˜แˆ†แŠ• แˆ˜แˆจแŒƒแ‹ŽแŠ• แ‹ญแŒ แ‰ฅแ‰แฆ

๐ŸŒ แ‹ตแˆจ-แŒˆแŒปแ‰ฝแŠ•แฆ
bunabyte.com
๐Ÿ“ข แ‰ดแˆŒแŒแˆซแˆแฆ
t.me/bunabytecs
๐Ÿ“ง แŠขแˆœแ‹ญแˆแฆ
info@bunabyte.com

Buna Byte โ€” แˆˆแ‰ฐแˆปแˆˆ แ‹จแ‹ฒแŒ‚แ‰ณแˆ แ‹ฐแˆ…แŠ•แАแ‰ต!
๐Ÿ‘6๐Ÿซก3
I was doing some math on the #TryHackMe monthly subscription today. The official price is $16.99, which currently converts to roughly 2,640+ ETB at market rates.

For many of us in the local tech community, thatโ€™s a significant monthly investment. However, I found a more accessible bridge: @tegene is offering 1-month vouchers for 2,000 ETB.

If youโ€™ve been waiting to start a new learning path or get that "AttackBox" access, this might be the right time to save about 25% on your overhead.

Note: This isn't a sponsorshipโ€”just a heads-up for my fellow learners looking to optimize their budget.


@bunabytecs
bunabyte.com

#CyberSecurity #TryHackMe
๐Ÿ”ฅ7๐Ÿ˜3๐ŸŒ1
โ˜ƒ๏ธ๐ŸŽ„ แˆˆแˆ˜แˆ‹แ‹ แ‹จแŠญแˆญแˆตแ‰ตแŠ“ แŠฅแˆแАแ‰ต แ‰ฐแŠจแ‰ณแ‹ฎแ‰ฝ แ‰ แˆ™แˆ‰ แŠฅแŠ•แŠณแŠ• แˆˆแŒˆแŠ“ แ‰ แ‹“แˆ แ‰ แˆฐแˆ‹แˆ แŠ แ‹ฐแˆจแˆณแ‰ฝแˆ!

แˆ˜แˆแŠซแˆ แ‰ แ‹“แˆ แ‹ญแˆแŠ•แˆแŠ•. bunabyte.com

@bunabytecs
๐ŸŽ‰7โค3
Tools donโ€™t replace understanding, they just amplify it.

@bunabytecs
๐Ÿ’ฏ4๐Ÿ‘Œ2โคโ€๐Ÿ”ฅ1
We built this TryHackMe room while teaching the BBJST Buna Byte Junior Security Tester program batch 03.

Itโ€™s hands-on Linux fundamentals - not theory, not slides.

This is how we learn. This is how we teach.

๐Ÿ”— https://tryhackme.com/jr/bbjstlinux

More structured resources coming soon on bunabyte.com

@bunabytecs
๐Ÿ”ฅ9โคโ€๐Ÿ”ฅ3๐Ÿ‘Œ2๐Ÿ‘1๐Ÿ‘1
$book_name = $_GET['book_name'] ?? '';
$special_chars = array("OR", "or", "AND", "and" , "UNION", "SELECT");
$book_name = str_replace($special_chars, '', $book_name);
$sql = "SELECT * FROM books WHERE book_name = '$book_name'";
echo "<p>Generated SQL Query: $sql</p>";
$result = $conn->query($sql) or die("Error: " . $conn->error . " (Error Code: " . $conn->errno . ")");
if ($result->num_rows > 0) {
while ($row = $result->fetch_assoc()) {
...
..

What makes this code vulnerable?

bunabyte.com
โค9โšก3
Buna Byte Cybersecurity
$book_name = $_GET['book_name'] ?? ''; $special_chars = array("OR", "or", "AND", "and" , "UNION", "SELECT"); $book_name = str_replace($special_chars, '', $book_name); $sql = "SELECT * FROM books WHERE book_name = '$book_name'"; echo "<p>Generated SQL Query:โ€ฆ
Why this code is vulnerable

โ€ข User input is directly concatenated into the SQL query
โ€ข Once input enters the query string, SQL injection is already possible


Why str_replace makes it worse

โ€ข SQL is a grammar-based language, not a keyword list
โ€ข Removing words like OR, AND, UNION, SELECT does not change SQL logic


str_replace is:

- case-sensitive
- literal
- context-unaware


Attackers can bypass filters using:

- alternative operators
- comments
- encodings
- numeric logic

- functions and comparisons

๐Ÿ™…โ€โ™‚๏ธThe critical mistake

โ€ข User input is still placed inside quotes

WHERE book_name = '$book_name'


โ€ข The database still parses input as executable SQL
โ€ข Filtering inside a dangerous context does not make it safe


Additional security issues

โ€ข Echoing the SQL query leaks:

- table names
- column names
- filtering logic

โ€ข Displaying database errors gives attackers free reconnaissance



Here is the bestโ€‘practice version of that code


$book_name = $_GET['book_name'] ?? '';

$stmt = $conn->prepare(
"SELECT * FROM books WHERE book_name = ?"
);

$stmt->bind_param("s", $book_name);
$stmt->execute();

$result = $stmt->get_result();

if ($result->num_rows > 0) {
while ($row = $result->fetch_assoc()) {
// process result
}
}


โ˜•๏ธ $stmt turns user input from code into data.


bunabyte.com
@bunabytecs
๐Ÿ”ฅ8๐Ÿ‘Œ4โค1
แŠฅแŠ•แŠณแŠ• แŠ แ‹ฐแˆจแˆณแ‰ฝแˆ! แˆ˜แˆแŠซแˆ แ‹จแŒฅแˆแ‰€แ‰ต แ‰ แ‹“แˆ!

bunabyte.com
โค8๐ŸŽ‰3
Buna Byte Resources Channel, You can find book files related to ethical hacking and cybersecurity in this channel.

๐Ÿ‘‰ here: @hacker_habesha
๐Ÿ‘7๐Ÿ‘3โค2
Forwarded from Cyber Vanguard @ CTBE
Are you ready to join today and tomorrow's cybersecurity foot soldiers?

picoCTF-Africa 2026 is back! Bigger, better and upto 80 students to be awarded!

Join our picoCTF-Africa prep info session
๐Ÿ“… 24 January
โฐ 11 am Rwanda time ( convert time to your own country )
โ›“๏ธโ€๐Ÿ’ฅ  bit.ly/picoCTF2026

Registration for the CTF opens on 1 February 2026, so get ready.
Competition runs 9 - 19 March 2026

stay alert. protect your accounts. share this with a friend

https://www.instagram.com/p/DTxI73ZDAS2/?igsh=MWlzYWgwbTZ1c3UyMA==
๐Ÿ”ฅ7๐Ÿ‘3
#Buna_Qurs

The original definition of hacking, emerging in the 1950s-1960s at MITโ€™s Tech Model Railroad Club, referred to
creative, skillful, and often playful modification of technical systems to improve them or make them function in new, unconventional ways.

@bunabytecs
โค9๐Ÿ”ฅ2๐Ÿ‘1๐ŸŽ‰1
โšก๏ธ Buna Byte Academy is coming.

We are building a focused learning space for:
โ€ข Hands-on cybersecurity labs
โ€ข Expert-led training
โ€ข Structured paths for real-world skills


The waitlist is now open.

Join early to get launch updates, early access, and exclusive opportunities reserved for first members.

๐Ÿ‘‰ Join the waitlist: academy.bunabyte.com

#Cybersecurity #Learning @bunabytecs
โค9๐Ÿ”ฅ4๐Ÿคฉ2๐Ÿ‘1๐Ÿ™1