Freelearningtech
727 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
Forwarded from Network Slutter 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Course Dump ! (Rœt)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐UK ENGINEER IN HIS 40s 'WORLDS FIRST' PERSON TO RECEIVE FULLY 3D PRINTED EYE

🌐INDIA GOVT ASKS MUSK'S STARLINK TO STOP TAKING BOOKINGS SAYS ITS NOT A LICENSEE

🌐TATA IN TALKS TO SET UP $300 MN SEMICONDUCTOR PLANT IN INDIA

🌐EU INTERNET REGULATION TO PUSH FACEBOOK TO SANITISE METAVERSE PLATFORMS

🌐WHATSAPP WINS APPROVAL TO DOUBLE PAYMENT OFFERING TO 40 MLN USERS IN INDIA

🌐ISRAEL SLASHES LIST OF COUNTRIES THAT CAN BUY CYBER TECH

🌐TWITTER INVESTIGATING BUG THAT UNEXPECTEDLY LOGS OUT IPHONE USERS

🌐CRUCIAL TO DEFINE NORMS OF INTERNET GOVERNANCE , SAYS IT MINIsTER ASWINI VAISHNAW

🌐AIRTEL CONDUCTS FIRST 5G TRIAL ON 700 MHZ BAND IN SA MODE WiTH NOKIA

🌐INDIAN FANTASY GAMING GROUP DREAM SPORTS RAISES $840 MILLION

🌐JAMMU TO GET FREE WIFI SERVICE AT 20 MORE LOCATION UNDER SMART CITY MISSION

🌐CRYPTO HACKERS USING BABADEDA CRYPTER TO MAKE THEIR MALWARE UNDETECTABLE

🌐UK IS PLANNING TO PROTECT ITS CITIZENS FROM PASSWORD HACKERS:PASSES A CYBER LAW TO BAN UNIVERSAL DEFAULT PASSWORDS

🌐NATIONAL COMPUTER SECURITY DAY-CYBER SECURITY AWARENESS RALLY AT SALTLAKE ON 30 NOVEMBER 2021

🌐CENTCEX TO LAUNCH NO KYC CRYPTO EXCHANGE WHICH IS SAFER THAN KUCOIN BY COINQUORA

🌐PUBG:NEW STATE BUG ALLOWED IN GAME ITEMS TO BE MISTAKENLY CLAIMED , AFFECTED ACCOUNTS BLOCKED



DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from Network Slutter 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
BASIC TECHNICAL DIFFERENCES

BY @cybermonkeyofficials

Difference Between 32-Bit and 64-Bit Operating System

🖇️ Link
https://www.instagram.com/p/CLeiWA1AeKX/?utm_medium=copy_link

Difference Between Proxy and VPN

🖇️ Link
https://www.instagram.com/p/CLHKaTVghUh/?utm_medium=copy_link

Difference Between HDD and SSD

🖇️ LINK
https://www.instagram.com/p/CLwnRoXggSv/?utm_medium=copy_link

DIFFERENCE BETWEEN LINUX AND WINDOWS

🖇️ LINK
https://www.instagram.com/p/CMATSaTgeRh/?utm_medium=copy_link

DIFFERENCE BETWEEN PHISHING AND VISHING

🖇️ LINK
https://www.instagram.com/p/CMXAZY1A0--/?utm_medium=copy_link

DIFFERENCE BETWEEN REGULAR HOSTING AND BULLETPROOF HOSTING

🖇️ LINK
https://www.instagram.com/p/CMhX_a0jjUW/?utm_medium=copy_link

*lDIFFERENCE BETWEEN LINUX AND UNIX

🖇️ LINK
https://www.instagram.com/p/CMzdPXRDn1k/?utm_medium=copy_link

DIFFERENCE BETWEEN PRIVATE IP AND PUBLIC IP

🖇️ LINK
https://www.instagram.com/p/CNKidocAzvr/?utm_medium=copy_link

DIFFERENCE BETWEEN MALWARE AND RANSOMWARE

🖇️ LINK
https://www.instagram.com/p/CNc3ARFA5Di/?utm_medium=copy_link

DIFFERENCE BETWEEN MODEM AND ROUTER

🖇️ LINK
https://www.instagram.com/p/CNnK9KUgAbj/?utm_medium=copy_link

DIFFERENCE BETWEEN HTTP AND HTTPS

🖇️ LINK
https://www.instagram.com/p/CNxMIOOgAIu/?utm_medium=copy_link

DIFFERENCE BETWEEN CODING AND PROGRAMMING

🖇️ LINK
https://www.instagram.com/p/CN5BtBeAOwN/?utm_medium=copy_link

DIFFERENCE BETWEEN COOKIES AND SESSIONS

🖇️ LINK
https://www.instagram.com/p/CODH6g6APia/?utm_medium=copy_link

DIFFERENCE BETWEEN KALILINUX AND PARROT OS

🖇️ LINK
https://www.instagram.com/p/CPXk2gjjaPa/?utm_medium=copy_link

DIFFERENCE BETWEEN TCP/IP AND OSI MODEL

🖇️ LINK
https://www.instagram.com/p/CP0Vp5oAUPk/?utm_medium=copy_link

DIFFERENCE BETWEEN ARCH LINUX AND KALILINUX

🖇️ LINK
https://www.instagram.com/p/CQX65UDDDGG/?utm_medium=copy_link

DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY

🖇️ LINK
https://www.instagram.com/p/CQxuTPHj6Bn/?utm_medium=copy_link

DIFFERENCE BETWEEN DOS AND DDOS ATTACKS

🖇️ LINK
https://www.instagram.com/p/CQ8u3Wfjc82/?utm_medium=copy_link

DIFFERENCE BETWEEN UBUNTU AND PARROT OS

🖇️ LINK
https://www.instagram.com/p/CREXHYMD-x_/?utm_medium=copy_link

DIFFERENCE BETWEEN SCRIPTING AND PROGRAMMING

🖇️ LINK
https://www.instagram.com/p/CRQkhpujmA_/?utm_medium=copy_link

TELEGRAM
https://t.me/cybermonkeyofficials

FOR MORE
https://www.cybermonkeyofficial.in
Forwarded from Network Slutter 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐CHINESE COULD HACK DATA FOR FUTURE QUANTUM DECRYPTION,REPORT WARNS

🌐APPLE SAYS IT WILL NOTIFY USERS WHOSE IPHONES WERE HACKED BY SPYWARE

🌐PANASONIC CONFIRMS DATA BREACH AFTER HACKERS ACCESS INTERNAL NETWORK

🌐AUSTRALIAN LAW ENABLES STATE-AUTHORISED HACKING AND SURVEILLANCE

🌐MICROSOFT WINDOWS 10 AND 11 USERS WARNED TO URGENTLY UPDATE SOFTWARE NOW AS HACKERS EXPLOIT NEW MALWARE

🌐MUSK'S STARLINK STOPS PRE-BOOKING IN INDIA

🌐VULNERABILITY REPORTED ON CDSL VENTURES WEBSITE RESOLVED NOW :MOS FINANCE

🌐RUSSIA FINES GOOGLE 3 MILLION ROUBLES FOR NOT DELETING BANNED CONTENT

🌐RELIANCE JIO PREPARING JIO TV AND A JIO TABLET FOR THE INDIAN MARKET TO BE RELEASED IN 2022

🌐RUSSIA SAYS TWITTER MOBILE SLOWDOWN TO REMAIN UNTIL ALL BANNED CONTENT IS REMOVED

🌐JACK DORSEY STEPS DOWN AS TWITTER CEO, PARAG AGARWAL TO REPLACE HIM

🌐META'S ACQUISITION OF GIPHY SET TO BE BLOCKED BY UK REGULATOR


DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW770lVl1Xg/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficials Cybe Crime Laws in India 3 (1).pdf
41.4 KB
CYBER CRIME LAWS IN INDIA

Credits -
@cybermonkeyofficials

{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}

Observations on ITA AND ITAA
AWARENESS
JURISDICTION
EVIDENCES
NON COVERAGE OF COMPUTER CRIMES
PREVENTION OF MONEY LAUNDERING
E-RECORDS MAINTENANCE POLICY FOR BANKS
LEGISLATION IN OTHER NATIONS
CONCLUSION

Previous Notes are Uploaded in -

https://t.me/backupcybermonkeyofficials

INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐AIRTEL HOLD'S INDIA'S FIRST 5G TRIAL IN 700 MHZ BAND WITH NOKIA

🌐VIRTUAL LAND SELLS FOR 32 CRORE IN MOST EXPENSIVE 'METAVERSA' PROPERTY SALE

🌐CHINA PLANS TO BAN LOOPHOLE USED BY TECH FIRMS FOR FOREIGN IPOs

🌐OVER 9000 COMPLAINTS OF CYBERFRAUDS RECEIVED ON NATIONAL CONSUMER HELPLINE IN FY21

🌐QUALCOMM, GOOGLE CLOUD COLLABORATE TO CREATE NEXT GEN MOBILE AI

🌐DNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACKDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACK

🌐MICROSOFT EXCHANGE SERVERS HACKED TO DEPLOY BLACKBYTE RANSOMWARE

🌐THOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEBTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEB

🌐SAUDI ARABIA SHOWCASES ITS TECH AMBITIONS AS
@HACK NAMED 'LARGEST CYBERSECURITY EVENT OF 2021'

🌐DEFI HACK:$31 MILLION STOLEN FROM MonoX PLATFORM ON POLYGON AND ETHEREUM

🌐NEW CYBER CRIME POLICE STATIONS TO START FUNCTIONING IN EACH POLICE DISTRICT IN DELHI FROM 30 NOV 2021

DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficial Forensic Science (1).pdf
90.2 KB
FORENSIC SCIENCE

Credits - @cybermonkeyofficials

{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}

BALLISTICS AND FIREARMS
HOW BALLISTICS HELP IN CRIME DETECTION
IDENTIFYING A WEAPON
INVESTIGATING
SIX REMARKABLE WAYS GUNS CAN BE LINKED TO CRIME SCENE
THE FIREARM
FIREARM EVIDENCES THAT MAY BE FOUND
HOW SAMPLES ARE COLLECTED
SOURCES CARRYING FIREARM EVIDENCES
BULLETS
IDENTIFICATION AND EVALUATION
CASE STUDIES

Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials

INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
*Want to Learn/Start With Ethical Hacking...?* 🤔

_Don't Worry 😉😌_

*CYBRITEX SECURITY is Introducing....*
*_The Hacker's Path_* Training Course To Start with _Ethical Hacking & More..._
This Training Course will be provide you :-
*• Live Classes*
*• Hands on Practice*
*• Clearance of Doubts &*
*• A skill Certification*

So, What are you Waiting for...? 🤷🏻‍♂️
Don't miss this opportunity and get Enrolled Now...👇🏻

*What our Students Says ?* 😃
•> https://cybritex.com/index.php/courses/

Demo Video-- https://share.vidyard.com/watch/wpfAGEZd8Kpu2G6TT9Fd9t?

*Registration Link:-* rzp.io/l/ZFlmPE0p4G

For More Information *Contact Us* here :- https://wa.me/+919728577879

_P.S - Forward and help your friends, if you are not interested..._
Forwarded from netslutter  (Rœt)
Please open Telegram to view this post
VIEW IN TELEGRAM
FROM INTERNET

1)Easy SQLi in Amazon subsidiary using Sqlmap
https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b

2)Bypass File Upload Restrictions
How to Get a Shell on a Website using a File [Tutorial]
https://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb

3)Cross-site request forgery (CSRF)
https://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded

4)How to Exploit Public Firebase Realtime Database using REST API
https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55

5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal
https://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/

6)Awesome PostgreSQL
https://reconshell.com/awesome-postgresql/

7)Web cache poisoning bug discovered in Symfony PHP framework
https://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework

8)Artificial Intelligence
https://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf

9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)
https://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&utm_medium=email&utm_source=Revue%20newsletter

:OSCP EXAM:
1)OSCP Exam Change
https://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&utm_medium=social&utm_source=facebook&hss_channel=fbp-132187200151961
2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
https://www.youtube.com/watch?v=uvqdSGlwEkA
bounty_tips_100+.pdf
18.3 MB
All about OSCP

Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.


OSCP Buffer overflow concepts and tutorials
http://strongcourage.github.io/2020/04/19/bof.html

OSCP Cheatsheets:)
https://github.com/slyth11907/Cheatsheets

Pentest-Cheat-Sheets

This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.

Link:-https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets

Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/

All about OSCP:-
https://oscp.infosecsanyam.in/

OSCP preparation
https://github.com/rewardone/OSCPRepo

https://github.com/0x4D31/awesome-oscp#resources
https://ired.team/offensive-security-experiments/

OSCP methodology:-
https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q

https://github.com/OlivierLaflamme/Cheatsheet-God

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

https://github.com/foobarto/redteam-notebook/blob/master/README.md

https://github.com/RustyShackleford221/OSCP-Prep

https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/


Share With OSCP Learners 🙏🏻


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
🎲What Is RansomWare ? 🎲

Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key

🧸There Are Two Types Of Ransomware In Circulation :-

🌻Encrypting Ransomware

Which Incorporates Advanced Encryption Algorithms.

It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content

🃏Examples :- CryptoLocker, Locky CryptoWall And More

🌻 Locker Ransomware

Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.

⊰᯽⊱┈──╌❊╌──┈⊰᯽⊱

Top 3 Biggest Ransomware Attacks In The Histroy :-

1.WannaCry ( Encrypting Ransomware )

2 .Tesla Crypt

3. Not Petya ( Locker Ransomware)