Cybercrime Attack Types
Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode:
Hacking:
It is an act of gaining unauthorized access to a computer system or network.
Denial Of Service Attack:
In this cyberattack, the cyber-criminal uses the bandwidth of the victim’s network or fills their e-mail box with spammy mail. Here, the intention is to disrupt their regular services.
Software Piracy:
Theft of software by illegally copying genuine programs or counterfeiting. It also includes the distribution of products intended to pass for the original.
Phishing:
Pishing is a technique of extracting confidential information from the bank/financial institutional account holders by illegal ways.
Spoofing:
It is an act of getting one computer system or a network to pretend to have the identity of another computer. It is mostly used to get access to exclusive privileges enjoyed by that network or computer.
Cybercrime can attack in various ways. Here, is some most common cybercrime attack mode:
Hacking:
It is an act of gaining unauthorized access to a computer system or network.
Denial Of Service Attack:
In this cyberattack, the cyber-criminal uses the bandwidth of the victim’s network or fills their e-mail box with spammy mail. Here, the intention is to disrupt their regular services.
Software Piracy:
Theft of software by illegally copying genuine programs or counterfeiting. It also includes the distribution of products intended to pass for the original.
Phishing:
Pishing is a technique of extracting confidential information from the bank/financial institutional account holders by illegal ways.
Spoofing:
It is an act of getting one computer system or a network to pretend to have the identity of another computer. It is mostly used to get access to exclusive privileges enjoyed by that network or computer.
Cyber Crime Tools
There are many types of Digital forensic tools
Kali Linux:
Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a specially designed program for digital forensics and penetration testing.
Ophcrack:
This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It offers a secure GUI system and allows you to runs on multiple platforms.
EnCase:
This software allows an investigator to image and examine data from hard disks and removable disks.
SafeBack:
SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these images to some other hard disks.
Data dumper:
This is a command-line computer forensic tool. It is freely available for the UNIX Operating system, which can make exact copies of disks suitable for digital forensic analysis.
Md5sum:
A tool to check helps you to check data is copied to another storage successfully or not.
There are many types of Digital forensic tools
Kali Linux:
Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a specially designed program for digital forensics and penetration testing.
Ophcrack:
This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It offers a secure GUI system and allows you to runs on multiple platforms.
EnCase:
This software allows an investigator to image and examine data from hard disks and removable disks.
SafeBack:
SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these images to some other hard disks.
Data dumper:
This is a command-line computer forensic tool. It is freely available for the UNIX Operating system, which can make exact copies of disks suitable for digital forensic analysis.
Md5sum:
A tool to check helps you to check data is copied to another storage successfully or not.
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐PM MODI LAUNCHES BLOCKCHAIN BASED DIGITAL DEGREES AT IIT KANPUR CONVOCATION
🌐AMAZON FIXES ERROR THAT LED ALEXA TO TELL 10-YR-OLD TO TRY LETHAL OUTLET CHALLENGE
🌐APPLE TO LAUNCH IPHONES WITHOUT SIM CARD SLOT BY SEPTEMBER 2022
🌐FERRARI TO MAKE EXCLUSIVE DIGITAL CONTENT FOR FANS WITH SWISS FIRM
🌐LAWSUIT CLAIMING LINKEDIN OVERCHARGED ADVERTISERS DISMISSED IN US
🌐RELIANCE JIO PLANNING TO RAISE UP TO RS 8000 CRORE VIA BONDS
🌐PLI SCHEME A GAME CHANGER IN ATTRACTING GLOBAL FIRMS TO SET UP SHOP IN INDIA: FINANCE MINISTER NIRMALA SITHARAMAN
🌐ITALY TO USE TIM-LED PROJECT AS BLUEPRINT IN NATIONAL CLOUD TENDER
🌐BHARTI-BACKED ONEWEB LAUNCHES 36 MORE SATELLITES TO BRING IN-ORBIT CONSTELLATION TO 394 SATELLITES
🌐KARNATAKA CID PROBE REVEALS HACKER USED HOTEL IP ADDRESS TO STEAL RS 11.5 CR FROM GOVT PORTAL
🌐APPLE PATCHED A MACOS GATEKEEPER BYPASS VULNERABILITY
🌐1.9 MILLION PEOPLE DATA IS UP FOR SALE AFTER HACK OF VIETNAMESE CRYPTO TRADING APP ONUS
🌐T-MOBILE CYBERATTACK:CUSTOMER INFO EXPOSED IN NEW MOBILE DATA BREACH
🌐OFFICIAL DATA OF MINISTRY OF FINANCE GETS HACKED IN A RECENT PHISHING ATTACK
🌐MON HEALTH PHISHING ATTACK , ACCOUNT TAKEOVER IMPACATS DATA OF 398K PATIENTS
🌐POLYGON BUIDL IT BECOMES INDIA'S EXCLUSIVE AND LARGEST WEB3 HACKATHON WITH 186 PROJECTS
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐PM MODI LAUNCHES BLOCKCHAIN BASED DIGITAL DEGREES AT IIT KANPUR CONVOCATION
🌐AMAZON FIXES ERROR THAT LED ALEXA TO TELL 10-YR-OLD TO TRY LETHAL OUTLET CHALLENGE
🌐APPLE TO LAUNCH IPHONES WITHOUT SIM CARD SLOT BY SEPTEMBER 2022
🌐FERRARI TO MAKE EXCLUSIVE DIGITAL CONTENT FOR FANS WITH SWISS FIRM
🌐LAWSUIT CLAIMING LINKEDIN OVERCHARGED ADVERTISERS DISMISSED IN US
🌐RELIANCE JIO PLANNING TO RAISE UP TO RS 8000 CRORE VIA BONDS
🌐PLI SCHEME A GAME CHANGER IN ATTRACTING GLOBAL FIRMS TO SET UP SHOP IN INDIA: FINANCE MINISTER NIRMALA SITHARAMAN
🌐ITALY TO USE TIM-LED PROJECT AS BLUEPRINT IN NATIONAL CLOUD TENDER
🌐BHARTI-BACKED ONEWEB LAUNCHES 36 MORE SATELLITES TO BRING IN-ORBIT CONSTELLATION TO 394 SATELLITES
🌐KARNATAKA CID PROBE REVEALS HACKER USED HOTEL IP ADDRESS TO STEAL RS 11.5 CR FROM GOVT PORTAL
🌐APPLE PATCHED A MACOS GATEKEEPER BYPASS VULNERABILITY
🌐1.9 MILLION PEOPLE DATA IS UP FOR SALE AFTER HACK OF VIETNAMESE CRYPTO TRADING APP ONUS
🌐T-MOBILE CYBERATTACK:CUSTOMER INFO EXPOSED IN NEW MOBILE DATA BREACH
🌐OFFICIAL DATA OF MINISTRY OF FINANCE GETS HACKED IN A RECENT PHISHING ATTACK
🌐MON HEALTH PHISHING ATTACK , ACCOUNT TAKEOVER IMPACATS DATA OF 398K PATIENTS
🌐POLYGON BUIDL IT BECOMES INDIA'S EXCLUSIVE AND LARGEST WEB3 HACKATHON WITH 186 PROJECTS
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
https://youtu.be/f00EnuMz8fk
*Start making YouTube videos again*
*Don't forget to subscribe*
*Like and Share our video*
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
*Start making YouTube videos again*
*Don't forget to subscribe*
*Like and Share our video*
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
https://youtu.be/KmrPSjyCvGs
New video why Phishing is too dangerous attack
Share and support
Don't forget to subscribe
New video why Phishing is too dangerous attack
Share and support
Don't forget to subscribe
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q
Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's ❤️❤️ Enjoy and Share…»
https://youtu.be/vN8TWtfPZrI
*If you want to learn Cyber security in free then watch this video*
*How to learn cyber security in free*
*How i learn cyber security*
*How to learn cyber security from Google and YouTube*
*How to learn Cyber security from github and movies*
*How to learn cyber security from people's and groups*
*How to find leaked courses*
*If you want to learn Cyber security in free then watch this video*
*How to learn cyber security in free*
*How i learn cyber security*
*How to learn cyber security from Google and YouTube*
*How to learn Cyber security from github and movies*
*How to learn cyber security from people's and groups*
*How to find leaked courses*
Freelearningtech pinned «https://youtu.be/vN8TWtfPZrI *If you want to learn Cyber security in free then watch this video* *How to learn cyber security in free* *How i learn cyber security* *How to learn cyber security from Google and YouTube* *How to learn Cyber security from…»
➕ CHMOD, CHGRP, CHOWN ➕
Today i write an post about those three commands, maybe you heard already about it.
You can list files by using the command »ls« and adding the parameter »-l«.
ls -l Course/
insgesamt 0
drwxr-sr-x 1 root mrblackx 546 29. Nov 15:58 'Hacking'
As you can see here i list he directory "Course" now let's go deeper:
drwxr-sr-x
d
= directory
r = Read
w = Write
x = eXecute
- = Permission not set.
There are 3 places for one group/user
The first place would be for yourself for the owner (do echo $USER so see your current username). Your current username is the owner.
The second place has the group xyz(depends on the group which exists). You can list group by groups command.
The third place has other permissions.
In our case (
drwxr-sr-x
)
The owner has r(read), w(write) and x(execute) permissions, the group has r(read), -(not write permission) and s(setgid/setuid which is the same as x(execute permission)) and others has r(read), -(not write permission) and x(execute).
If the first character is a - instead of a d(directory) then it's a file. There are different first characters:
- = Regular File
d = Directory
l = Symbolic Link
You maybe saw the command "chmod 755 *", those numbers has the same effect such as chmod a=rwx *.
◾️Character 1: as we said before it indicates if this is a file (–) or a directory (d).
◾️2-4: permissions for the user owner (in this case rwx)
◾️5-7: permissions for the group owner (in this case rwx)
◾️8-10: permissions for others (any user who is not the user owner or is not part of the group owner – in this case r-x)
I hope you understand characters:
d r w x r - x r - -
1 2 3 4 5 6 7 8 9 10
(without the spaces i used spaces for better overview)
The octal number comes from the sum of the following numbers:
◾️4 for the read permission
◾️2 for the write permission
◾️1 for the execute permission
Source of this little table : codefather.tech/blog/chmod-755-command/
As you saw the 755 is equals to :
rwxr-xr-x
chmod 777 would be
rwxrwxrwx
Chmod Examples:
To give only user read, write and execute you can do:
touch test
ls -l test
Output :
-rw-r--r--
chmod u=rwx test
.txt
ls -l test
.txt
Output : -rwxr--r--
We use here u= for the current user, o= would be other and g= group.
Possible permissions:
User : u=r, u=rw, u=rwx
Group : g=r, g=rw, g=rwx
Other : o=r, o=rw, o=rwx
Next :
root mrblackx
This is printed because the first would be the user who owns the permission of the current file and the second would be the group which als owns the file permission. In my case the user root owns by the group mrblackx the file permissions.
You can change the owner and the owner group by using the commands chgrp and chown.
If my user is mrblackx and my brother marcus want to use the file or the file is only for marcus then i will type for example :
chown marcus test
.txt
command | user | file
Well we the group would be still mrblackx because we did not changed the group.
chgrp marcus test.txt
If the user is super user(which should not be) then you need to add sudo, otherwise the operation is not allowed to do.
546 29. Nov 15:58 'Hacking'
This is the last block which is very easy to explain.
The
546
is the size of the file. The block 29 Nov 15:58 is the date and the exact time when the file was created. 'Hacking' is the folder name.
Sources which helped me a lot to learn this topic :
✔️ https://linuxize.com/post/chmod-command-in-linux/
✔️ https://linuxize.com/post/chgrp-command-in-linux/
✔️ https://linuxize.com/post/linux-chown-command/
Today i write an post about those three commands, maybe you heard already about it.
You can list files by using the command »ls« and adding the parameter »-l«.
ls -l Course/
insgesamt 0
drwxr-sr-x 1 root mrblackx 546 29. Nov 15:58 'Hacking'
As you can see here i list he directory "Course" now let's go deeper:
drwxr-sr-x
d
= directory
r = Read
w = Write
x = eXecute
- = Permission not set.
There are 3 places for one group/user
The first place would be for yourself for the owner (do echo $USER so see your current username). Your current username is the owner.
The second place has the group xyz(depends on the group which exists). You can list group by groups command.
The third place has other permissions.
In our case (
drwxr-sr-x
)
The owner has r(read), w(write) and x(execute) permissions, the group has r(read), -(not write permission) and s(setgid/setuid which is the same as x(execute permission)) and others has r(read), -(not write permission) and x(execute).
If the first character is a - instead of a d(directory) then it's a file. There are different first characters:
- = Regular File
d = Directory
l = Symbolic Link
You maybe saw the command "chmod 755 *", those numbers has the same effect such as chmod a=rwx *.
◾️Character 1: as we said before it indicates if this is a file (–) or a directory (d).
◾️2-4: permissions for the user owner (in this case rwx)
◾️5-7: permissions for the group owner (in this case rwx)
◾️8-10: permissions for others (any user who is not the user owner or is not part of the group owner – in this case r-x)
I hope you understand characters:
d r w x r - x r - -
1 2 3 4 5 6 7 8 9 10
(without the spaces i used spaces for better overview)
The octal number comes from the sum of the following numbers:
◾️4 for the read permission
◾️2 for the write permission
◾️1 for the execute permission
Source of this little table : codefather.tech/blog/chmod-755-command/
As you saw the 755 is equals to :
rwxr-xr-x
chmod 777 would be
rwxrwxrwx
Chmod Examples:
To give only user read, write and execute you can do:
touch test
ls -l test
Output :
-rw-r--r--
chmod u=rwx test
.txt
ls -l test
.txt
Output : -rwxr--r--
We use here u= for the current user, o= would be other and g= group.
Possible permissions:
User : u=r, u=rw, u=rwx
Group : g=r, g=rw, g=rwx
Other : o=r, o=rw, o=rwx
Next :
root mrblackx
This is printed because the first would be the user who owns the permission of the current file and the second would be the group which als owns the file permission. In my case the user root owns by the group mrblackx the file permissions.
You can change the owner and the owner group by using the commands chgrp and chown.
If my user is mrblackx and my brother marcus want to use the file or the file is only for marcus then i will type for example :
chown marcus test
.txt
command | user | file
Well we the group would be still mrblackx because we did not changed the group.
chgrp marcus test.txt
If the user is super user(which should not be) then you need to add sudo, otherwise the operation is not allowed to do.
546 29. Nov 15:58 'Hacking'
This is the last block which is very easy to explain.
The
546
is the size of the file. The block 29 Nov 15:58 is the date and the exact time when the file was created. 'Hacking' is the folder name.
Sources which helped me a lot to learn this topic :
✔️ https://linuxize.com/post/chmod-command-in-linux/
✔️ https://linuxize.com/post/chgrp-command-in-linux/
✔️ https://linuxize.com/post/linux-chown-command/
CODEFATHER
Chmod 755 Command: What Does it Do? - Codefather
The chmod command allows to set permissions for files and directories in Linux. In this article you will learn the meaning of the chmod 755 command.
Forwarded from ☠️🇮🇳 ༄ᴹᴿ°᭄ANON࿐ 🇮🇳☠️ [OFFLINE]🤡
Media is too big
VIEW IN TELEGRAM
🅷🅰🅲🅺_🅰🅽🆈🅾🅽🅴_
🅵🆁🅾🅽🆃_🅲🅰🅼🅴🆁🅰_🅹🆄🆂🆃_🆂🅴🅽🅳🅸🅽🅶_🅰_🅵🅴🆂🆃🅸🆅🅻_🆆🅸🆂🅷🅸🅽🅶_🅻🅸🅽🅺📸📸😍
ⱤɆ₳Đ ł₮ ₵₳ⱤɆ₣ɄⱠⱠɎ 🔥
(All Commands is Here😍)👇
https://telegra.ph/Hack-Anyones-Front-camera-just-Sending-a-festival-wishing-link-12-30
If you don't want to download then play video online using Google drive or Mega link 👇
Gdrive:- https://bit.ly/32tSXtW
Mega :- https://bit.ly/3EEJMne
🎩ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴɪʙʟᴇ ғᴏʀ ᴀɴʏᴛʜɪɴɢ ʏᴏᴜ ᴅᴏ ᴜsɪɴɢ this ɪɴғᴏʀᴍᴀᴛɪᴏɴ. ᴘʟᴇᴀsᴇ ᴅᴏɴ'ᴛ ʜᴀʀᴍ ᴀɴʏᴏɴᴇ. ᴛʜɪs ᴘᴏsᴛ ɪs sᴛʀɪᴄᴛʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇ.🎩
❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
🅵🆁🅾🅽🆃_🅲🅰🅼🅴🆁🅰_🅹🆄🆂🆃_🆂🅴🅽🅳🅸🅽🅶_🅰_🅵🅴🆂🆃🅸🆅🅻_🆆🅸🆂🅷🅸🅽🅶_🅻🅸🅽🅺📸📸😍
ⱤɆ₳Đ ł₮ ₵₳ⱤɆ₣ɄⱠⱠɎ 🔥
(All Commands is Here😍)👇
https://telegra.ph/Hack-Anyones-Front-camera-just-Sending-a-festival-wishing-link-12-30
If you don't want to download then play video online using Google drive or Mega link 👇
Gdrive:- https://bit.ly/32tSXtW
Mega :- https://bit.ly/3EEJMne
🎩ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴɪʙʟᴇ ғᴏʀ ᴀɴʏᴛʜɪɴɢ ʏᴏᴜ ᴅᴏ ᴜsɪɴɢ this ɪɴғᴏʀᴍᴀᴛɪᴏɴ. ᴘʟᴇᴀsᴇ ᴅᴏɴ'ᴛ ʜᴀʀᴍ ᴀɴʏᴏɴᴇ. ᴛʜɪs ᴘᴏsᴛ ɪs sᴛʀɪᴄᴛʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇ.🎩
❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
➖ TOOLS ➖
Web Vulnerability Scanners + Explanation + Links
• Netsparker Application Security Scanner — Application security scanner to automatically find security flaws.
Download: https://www.netsparker.com/get-demo/
• Nikto — Noisybut fast black box web server and web application vulnerability scanner.
Download: https://sectools.org/tool/nikto/
• Arachni — Scriptable framework for evaluating the security of web applications.
Download: https://www.arachni-scanner.com/download/
• w3af — Webapplication attack and audit framework.
Clone: https://github.com/andresriancho/w3af
Download: http://w3af.org/download
• Wapiti — Blackbox web application vulnerability scanner with built-in fuzzer.
Download: http://wapiti.sourceforge.net/
• SecApps — In-browserweb application security testing suite. (Firefox Extension)
• WPScan — Blackbox WordPress vulnerability scanner.
Download: https://wpscan.org/
• cms-explorer — Revealthe specific modules,plugins,components and themes that various websites powered by content management systems are running.
Clone it: https://github.com/FlorianHeigl/cms-explorer
• joomscan — Joomlavulnerability scanner.
Download: https://github.com/rezasp/joomscan
• ACSTIS — Automatedclient-side template injection (sandboxescape/bypass)detection for AngularJS.
no download found :(
• SQLmate — Afriend of sqlmap that identifies sqli vulnerabilities based on a given dork and website (optional).
Download: https://github.com/s0md3v/sqlmate
Web Vulnerability Scanners + Explanation + Links
• Netsparker Application Security Scanner — Application security scanner to automatically find security flaws.
Download: https://www.netsparker.com/get-demo/
• Nikto — Noisybut fast black box web server and web application vulnerability scanner.
Download: https://sectools.org/tool/nikto/
• Arachni — Scriptable framework for evaluating the security of web applications.
Download: https://www.arachni-scanner.com/download/
• w3af — Webapplication attack and audit framework.
Clone: https://github.com/andresriancho/w3af
Download: http://w3af.org/download
• Wapiti — Blackbox web application vulnerability scanner with built-in fuzzer.
Download: http://wapiti.sourceforge.net/
• SecApps — In-browserweb application security testing suite. (Firefox Extension)
• WPScan — Blackbox WordPress vulnerability scanner.
Download: https://wpscan.org/
• cms-explorer — Revealthe specific modules,plugins,components and themes that various websites powered by content management systems are running.
Clone it: https://github.com/FlorianHeigl/cms-explorer
• joomscan — Joomlavulnerability scanner.
Download: https://github.com/rezasp/joomscan
• ACSTIS — Automatedclient-side template injection (sandboxescape/bypass)detection for AngularJS.
no download found :(
• SQLmate — Afriend of sqlmap that identifies sqli vulnerabilities based on a given dork and website (optional).
Download: https://github.com/s0md3v/sqlmate
Invicti
Get Demo | Invicti Web Application Security Scanner
Use this form to get a demo of the Invicti web application security scanner.
FROM INTERNET
1)How I was able to spoof any Instagram username on Instagram shop
https://medium.com/@nvmeeet/how-i-was-able-to-spoof-any-instagram-username-on-instagram-shop-b4d6abdb474a
2)Using Recon-Ng for Recon for Bug Bounty
https://medium.com/@jowin.sathianesan/using-recon-ng-for-recon-for-bug-bounty-78f9d32e795
3)Why we use Nmap?
https://medium.com/@mukundkumarjha2005/why-we-use-nmap-7cc34ab3a2a6
4)Menyelesaikan Challenge CTF #2 dan Mendapatkan IDR 10.000K
https://medium.com/@agussetyar/menyelesaikan-challenge-ctf-2-dan-mendapatkan-idr-10-000k-32b5b1eef23d
5)Implementing Django-rest API Throttling and Unauthenticated bypass
https://infosecwriteups.com/implementing-django-rest-api-throttling-and-unauthenticated-bypass-dda550b07443
6)Efficient Linux at the Command Line eBook Free Download
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
1)How I was able to spoof any Instagram username on Instagram shop
https://medium.com/@nvmeeet/how-i-was-able-to-spoof-any-instagram-username-on-instagram-shop-b4d6abdb474a
2)Using Recon-Ng for Recon for Bug Bounty
https://medium.com/@jowin.sathianesan/using-recon-ng-for-recon-for-bug-bounty-78f9d32e795
3)Why we use Nmap?
https://medium.com/@mukundkumarjha2005/why-we-use-nmap-7cc34ab3a2a6
4)Menyelesaikan Challenge CTF #2 dan Mendapatkan IDR 10.000K
https://medium.com/@agussetyar/menyelesaikan-challenge-ctf-2-dan-mendapatkan-idr-10-000k-32b5b1eef23d
5)Implementing Django-rest API Throttling and Unauthenticated bypass
https://infosecwriteups.com/implementing-django-rest-api-throttling-and-unauthenticated-bypass-dda550b07443
6)Efficient Linux at the Command Line eBook Free Download
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
Medium
How I was able to spoof any Instagram username on Instagram shop
Summary: i discovered that i can spoof any Instagram username on Instagram shop, with this bug scammers can trick people into thinking they…
A selection of OSINT search engines
Clearnet
1. search.carrot2.org - cluster search engine, identifies objects or categories associated with a word in a search query
2. boardreader.com - search engine for forums
3. searchcode.com - search by code in open repositories
4. swisscows.com - semantic search engine
5. intelx.io - Find by email addresses, domains, URLs, IPs, CIDRs, bitcoin addresses, IPFS hashes, etc.
6. publicwww.com - search in the source code of pages, you can search for nicknames, mails, trackers, wallets, website addresses, etc.
7. psbdmp.ws - search in pastebin texts
8. kribrum.io - search on social networks
9. recon.secapps.com - automatic search and creation of relationship maps
10. leph.occrp.org - search databases, files, company registers, leaks, and other sources
11.opendirectory-finder - google search with dorks
Tor
1. FreshOnions
2. DarkSearch
3.onionsearchengine.com
Clearnet
1. search.carrot2.org - cluster search engine, identifies objects or categories associated with a word in a search query
2. boardreader.com - search engine for forums
3. searchcode.com - search by code in open repositories
4. swisscows.com - semantic search engine
5. intelx.io - Find by email addresses, domains, URLs, IPs, CIDRs, bitcoin addresses, IPFS hashes, etc.
6. publicwww.com - search in the source code of pages, you can search for nicknames, mails, trackers, wallets, website addresses, etc.
7. psbdmp.ws - search in pastebin texts
8. kribrum.io - search on social networks
9. recon.secapps.com - automatic search and creation of relationship maps
10. leph.occrp.org - search databases, files, company registers, leaks, and other sources
11.opendirectory-finder - google search with dorks
Tor
1. FreshOnions
2. DarkSearch
3.onionsearchengine.com
workingsubdomains.txt
135.5 KB
salesforce.com
Working subdomain list
https://www.salesforce.com/company/disclosure/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Working subdomain list
https://www.salesforce.com/company/disclosure/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
👍1
Freelearningtech pinned «https://youtu.be/RYVMjsAnHOs *New video* *Don't forget to subscribe*»
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q
I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel
I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel»