Freelearningtech
726 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
China has suspended its partnership with Alibaba Cloud Services — whose researcher discovered the critical Log4j vulnerability — because the company did not first report this flaw to the government as required by the country's new law.

Read: https://thehackernews.com/2021/12/china-suspends-deal-with-alibaba-for.html
Forwarded from CYBERMONKEYOFFICIAL
📚BEST BOOKS COLLECTION RELATED TO PROGRAMMING , HACKING ,PENETRATION TESTING , CYBERSECURITY
ALL UPLOADED LINK GIVEN BELOW

👉TAKE A LOOK

https://t.me/backupcybermonkeyofficials

📚BOOKS LIST-
📕Hands on web scrapping with python
📕Learning CPP by creating games
📕Android studio development essentials
📕Approaching almost any machine learning
📕C for beginners
📕Comptia cyber security
📕Guidebook
📕Trisha knowledge systems GATE
📕Web-based projects
📕Gate CSE
📕Algorithms  notes for professional
📕Machine learning automation
📕Coding python
📕Python webscrapping
📕Python automation cook book
📕Deep learning with applications
📕IOT Development
📕Django 3
📕Sql cheatsheet
📕Logo set collection
📕Seo checklist
📕Traffic secrets Russell Brunson
📕How to prepare for data interpretation
📕SSC Civil
📕Python for devops
📕IOT Devices pentest
📕Facebook marketing mania
📕Affiate marketing and success
📕Hacking wireless networks
📕The art of intrusion
📕Machine learning with spark
📕Webapplication hackers handbook
📕Crypto dictionary
📕Industrial cybersecurity efficiency
📕Hardware hacking book
🔰 Complete Ethical Hacking Bootcamp 2021: Zero to Mastery

26 Hours 📦 232 Lessons

Learn Ethical Hacking + Penetration Testing from scratch and master the most modern ethical hacking tools and best practices for 2021! You will practice real techniques used by black hat hackers, then learn to defend against them.

Taught by: Andrei Neagoie & Aleksa Tamburkovski

Download Full Course-
https://t.me/ethicalhackingbootcamp
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐TESLA DISABLES GAMES ON MOVING CAR SEEMS AFTER US PROBES 5.8 LAKH CARS

🌐MICROSOFT INFORMS CUSTOMERS ABOUT SECURITY BUGS IN AZURE CLOUD

🌐DUCK DUCK GO WORKING ON PRIVACY-FOCUSED DESKTOP BROWSER

🌐EROS NOW PARTNERS GLOBAL NETWORKS INFOCOM TO EXPAND REACH IN INDIA

🌐BGMI DEVICE BAN FEATURE: KRAFTON BRINGS DEVICE BAN FEATURES

🌐CISA, FBI, AND NSA PUBLISH JOINT ADVISORY AND SCANNER FOR LOG4J VULNERABILITIES

🌐POPULAR WORDPRESS PLATFORM FLYWHEEL VULNERABLE TO SUBDOMAIN TAKEOVER, RESEARCHER CLAIMS

🌐FOXCONN'S INDIA UNIT BAHARAT FIH WHICH MAKES XIAOMI PHONES FILES FOR RS 5000 CR INDIAN IPO

🌐SUBMARINE CABLE FAULT SLOWS INTERNET SPEED IN PAKISTAN

🌐CHINA REGULATOR SUSPENDS CYBER SECURITY DEAL WITH ALIBABA DEAL

🌐CISCO SAYS WORKING WITH JIO, AIRTEL, VI TO IMPROVE 5G READY NETWORK EFFICIENCIES

🌐HUAWEI WATCH D WITH BLOOD PRESSURE, ECG MONITORING LAUNCHED

DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐CHINESE CHAMBERS IN INDIA URGE TO CENTER TO CHANGE TAX PROBE PRACTICE AFTER IT SEARCHES

🌐RUSSIA FINES GOOGLE , META RECORD $125 MN OVER BANNED CONTENT
MICROSOFT INFORMS

🌐CUSTOMERS ABOUT SECURITY BUG IN AZURE CLOUD
MICROCHIP THAT STORES

🌐COVID-19 VACCINE PASS UNDER USERS SKIN MADE BY SWEDISH FIRM
FORMER SPACE X

🌐ENGINEERS TO LAUNCH ROBOT RESTAURANT THAT MAKES PIZZA IN 45 SEC

🌐GOOGLE FINED 98MILLION BY RUSSIA FOR FAILING TO DELETE BANNED CONTENT

🌐59 FILES ACCESSED DURING MITSUBISHI HACK PROBLEMATIC :JAPAN GOVT

🌐TORRENT FILES OF SPIDERMAN INFECTED WITH CRYPTO MINING MALWARE

🌐TESLA UPDATE ALLOWS DRIVERS TO TURN THEIR CARS INTO MEGAPHONES

DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Freelearningtech pinned Deleted message
Cybercrime Attack Types

Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode:

Hacking:

It is an act of gaining unauthorized access to a computer system or network.

Denial Of Service Attack:

In this cyberattack, the cyber-criminal uses the bandwidth of the victim’s network or fills their e-mail box with spammy mail. Here, the intention is to disrupt their regular services.

Software Piracy:

Theft of software by illegally copying genuine programs or counterfeiting. It also includes the distribution of products intended to pass for the original.

Phishing:

Pishing is a technique of extracting confidential information from the bank/financial institutional account holders by illegal ways.

Spoofing:

It is an act of getting one computer system or a network to pretend to have the identity of another computer. It is mostly used to get access to exclusive privileges enjoyed by that network or computer.
Cyber Crime Tools

There are many types of Digital forensic tools

Kali Linux:

Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a specially designed program for digital forensics and penetration testing.

Ophcrack:

This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It offers a secure GUI system and allows you to runs on multiple platforms.

EnCase:

This software allows an investigator to image and examine data from hard disks and removable disks.

SafeBack:

SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these images to some other hard disks.

Data dumper:

This is a command-line computer forensic tool. It is freely available for the UNIX Operating system, which can make exact copies of disks suitable for digital forensic analysis.

Md5sum:

A tool to check helps you to check data is copied to another storage successfully or not.
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐PM MODI LAUNCHES BLOCKCHAIN BASED DIGITAL DEGREES AT IIT KANPUR CONVOCATION

🌐AMAZON FIXES ERROR THAT LED ALEXA TO TELL 10-YR-OLD TO TRY LETHAL OUTLET CHALLENGE

🌐APPLE TO LAUNCH IPHONES WITHOUT SIM CARD SLOT BY SEPTEMBER 2022

🌐FERRARI TO MAKE EXCLUSIVE DIGITAL CONTENT FOR FANS WITH SWISS FIRM

🌐LAWSUIT CLAIMING LINKEDIN OVERCHARGED ADVERTISERS DISMISSED IN US

🌐RELIANCE JIO PLANNING TO RAISE UP TO RS 8000 CRORE VIA BONDS

🌐PLI SCHEME A GAME CHANGER IN ATTRACTING GLOBAL FIRMS TO SET UP SHOP IN INDIA: FINANCE MINISTER NIRMALA SITHARAMAN

🌐ITALY TO USE TIM-LED PROJECT AS BLUEPRINT IN NATIONAL CLOUD TENDER

🌐BHARTI-BACKED ONEWEB LAUNCHES 36 MORE SATELLITES TO BRING IN-ORBIT CONSTELLATION TO 394 SATELLITES

🌐KARNATAKA CID PROBE REVEALS HACKER USED HOTEL IP ADDRESS TO STEAL RS 11.5 CR FROM GOVT PORTAL

🌐APPLE PATCHED A MACOS GATEKEEPER BYPASS VULNERABILITY

🌐1.9 MILLION PEOPLE DATA IS UP FOR SALE AFTER HACK OF VIETNAMESE CRYPTO TRADING APP ONUS

🌐T-MOBILE CYBERATTACK:CUSTOMER INFO EXPOSED IN NEW MOBILE DATA BREACH

🌐OFFICIAL DATA OF MINISTRY OF FINANCE GETS HACKED IN A RECENT PHISHING ATTACK

🌐MON HEALTH PHISHING ATTACK , ACCOUNT TAKEOVER IMPACATS DATA OF 398K PATIENTS

🌐POLYGON BUIDL IT BECOMES INDIA'S EXCLUSIVE AND LARGEST WEB3 HACKATHON WITH 186 PROJECTS


DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
https://youtu.be/f00EnuMz8fk

*Start making YouTube videos again*


*Don't forget to subscribe*

*Like and Share our video*


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
https://youtu.be/l8kzvvTasKQ


learn cryptography in depth
https://youtu.be/KmrPSjyCvGs


New video why Phishing is too dangerous attack

Share and support

Don't forget to subscribe
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q


Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's ❤️❤️ Enjoy and Share…»
https://youtu.be/vN8TWtfPZrI



*If you want to learn Cyber security in free then watch this video*

*How to learn cyber security in free*

*How i learn cyber security*

*How to learn cyber security from Google and YouTube*

*How to learn Cyber security from github and movies*

*How to learn cyber security from people's and groups*

*How to find leaked courses*
Freelearningtech pinned «https://youtu.be/vN8TWtfPZrI *If you want to learn Cyber security in free then watch this video* *How to learn cyber security in free* *How i learn cyber security* *How to learn cyber security from Google and YouTube* *How to learn Cyber security from…»
CHMOD, CHGRP, CHOWN

Today i write an post about those three commands, maybe you heard already about it.

You can list files by using the command »ls« and adding the parameter »-l«.

ls -l Course/
insgesamt 0
drwxr-sr-x 1 root mrblackx 546 29. Nov 15:58 'Hacking'

As you can see here i list he directory "Course" now let's go deeper:
drwxr-sr-x

d
= directory
r = Read
w = Write
x = eXecute
- = Permission not set.

There are 3 places for one group/user
The first place would be for yourself for the owner (do echo $USER so see your current username). Your current username is the owner.

The second place has the group xyz(depends on the group which exists). You can list group by groups command.

The third place has other permissions.

In our case (
drwxr-sr-x
)
The owner has r(read), w(write) and x(execute) permissions, the group has r(read), -(not write permission) and s(setgid/setuid which is the same as x(execute permission)) and others has r(read), -(not write permission) and x(execute).

If the first character is a - instead of a d(directory) then it's a file. There are different first characters:
- = Regular File
d = Directory
l = Symbolic Link


You maybe saw the command "chmod 755 *", those numbers has the same effect such as chmod a=rwx *.

◾️Character 1: as we said before it indicates if this is a file (–) or a directory (d).
◾️2-4: permissions for the user owner (in this case rwx)
◾️5-7: permissions for the group owner (in this case rwx)
◾️8-10: permissions for others (any user who is not the user owner or is not part of the group owner – in this case r-x)

I hope you understand characters:
d r w x r - x r - -
1 2 3 4 5 6 7 8 9 10
(without the spaces i used spaces for better overview)

The octal number comes from the sum of the following numbers:

◾️4 for the read permission
◾️2 for the write permission
◾️1 for the execute permission

Source of this little table : codefather.tech/blog/chmod-755-command/

As you saw the 755 is equals to :
rwxr-xr-x

chmod 777 would be
rwxrwxrwx

Chmod Examples:

To give only user read, write and execute you can do:
touch test
ls -l test
Output :
-rw-r--r--

chmod u=rwx test
.txt
ls -l test
.txt
Output : -rwxr--r--

We use here u= for the current user, o= would be other and g= group.

Possible permissions:
User : u=r, u=rw, u=rwx
Group : g=r, g=rw, g=rwx
Other : o=r, o=rw, o=rwx

Next :
root mrblackx


This is printed because the first would be the user who owns the permission of the current file and the second would be the group which als owns the file permission. In my case the user root owns by the group mrblackx the file permissions.

You can change the owner and the owner group by using the commands chgrp and chown.


If my user is mrblackx and my brother marcus want to use the file or the file is only for marcus then i will type for example :

chown marcus test
.txt
command | user | file

Well we the group would be still mrblackx because we did not changed the group.

chgrp marcus test.txt

If the user is super user(which should not be) then you need to add sudo, otherwise the operation is not allowed to do.

546 29. Nov 15:58 'Hacking'

This is the last block which is very easy to explain.
The
546
is the size of the file. The block 29 Nov 15:58 is the date and the exact time when the file was created. 'Hacking' is the folder name.

Sources which helped me a lot to learn this topic :

✔️ https://linuxize.com/post/chmod-command-in-linux/
✔️ https://linuxize.com/post/chgrp-command-in-linux/
✔️ https://linuxize.com/post/linux-chown-command/
Forwarded from ☠️🇮🇳 ༄ᴹᴿ°᭄ANON࿐ 🇮🇳☠️ [OFFLINE]🤡
Media is too big
VIEW IN TELEGRAM
🅷🅰🅲🅺_🅰🅽🆈🅾🅽🅴_
🅵🆁🅾🅽🆃_🅲🅰🅼🅴🆁🅰_🅹🆄🆂🆃_🆂🅴🅽🅳🅸🅽🅶_🅰_🅵🅴🆂🆃🅸🆅🅻_🆆🅸🆂🅷🅸🅽🅶_🅻🅸🅽🅺📸📸😍

ⱤɆ₳Đ ł₮ ₵₳ⱤɆ₣ɄⱠⱠɎ 🔥
(All Commands is Here😍)👇

https://telegra.ph/Hack-Anyones-Front-camera-just-Sending-a-festival-wishing-link-12-30

If you don't want to download then play video online using Google drive or Mega link 👇

Gdrive:- https://bit.ly/32tSXtW

Mega :- https://bit.ly/3EEJMne

🎩ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴɪʙʟᴇ ғᴏʀ ᴀɴʏᴛʜɪɴɢ ʏᴏᴜ ᴅᴏ ᴜsɪɴɢ this ɪɴғᴏʀᴍᴀᴛɪᴏɴ. ᴘʟᴇᴀsᴇ ᴅᴏɴ'ᴛ ʜᴀʀᴍ ᴀɴʏᴏɴᴇ. ᴛʜɪs ᴘᴏsᴛ ɪs sᴛʀɪᴄᴛʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇ.🎩

❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️