Freelearningtech
726 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
https://youtu.be/l8kzvvTasKQ


learn cryptography in depth
https://youtu.be/KmrPSjyCvGs


New video why Phishing is too dangerous attack

Share and support

Don't forget to subscribe
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q


Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q Subscribe this channel tommorow i will tell you how to learn Cyber security in free How i learn everything in free i will tell you because i know everyone don't afford course price's ❤️❤️ Enjoy and Share…»
https://youtu.be/vN8TWtfPZrI



*If you want to learn Cyber security in free then watch this video*

*How to learn cyber security in free*

*How i learn cyber security*

*How to learn cyber security from Google and YouTube*

*How to learn Cyber security from github and movies*

*How to learn cyber security from people's and groups*

*How to find leaked courses*
Freelearningtech pinned «https://youtu.be/vN8TWtfPZrI *If you want to learn Cyber security in free then watch this video* *How to learn cyber security in free* *How i learn cyber security* *How to learn cyber security from Google and YouTube* *How to learn Cyber security from…»
CHMOD, CHGRP, CHOWN

Today i write an post about those three commands, maybe you heard already about it.

You can list files by using the command »ls« and adding the parameter »-l«.

ls -l Course/
insgesamt 0
drwxr-sr-x 1 root mrblackx 546 29. Nov 15:58 'Hacking'

As you can see here i list he directory "Course" now let's go deeper:
drwxr-sr-x

d
= directory
r = Read
w = Write
x = eXecute
- = Permission not set.

There are 3 places for one group/user
The first place would be for yourself for the owner (do echo $USER so see your current username). Your current username is the owner.

The second place has the group xyz(depends on the group which exists). You can list group by groups command.

The third place has other permissions.

In our case (
drwxr-sr-x
)
The owner has r(read), w(write) and x(execute) permissions, the group has r(read), -(not write permission) and s(setgid/setuid which is the same as x(execute permission)) and others has r(read), -(not write permission) and x(execute).

If the first character is a - instead of a d(directory) then it's a file. There are different first characters:
- = Regular File
d = Directory
l = Symbolic Link


You maybe saw the command "chmod 755 *", those numbers has the same effect such as chmod a=rwx *.

◾️Character 1: as we said before it indicates if this is a file (–) or a directory (d).
◾️2-4: permissions for the user owner (in this case rwx)
◾️5-7: permissions for the group owner (in this case rwx)
◾️8-10: permissions for others (any user who is not the user owner or is not part of the group owner – in this case r-x)

I hope you understand characters:
d r w x r - x r - -
1 2 3 4 5 6 7 8 9 10
(without the spaces i used spaces for better overview)

The octal number comes from the sum of the following numbers:

◾️4 for the read permission
◾️2 for the write permission
◾️1 for the execute permission

Source of this little table : codefather.tech/blog/chmod-755-command/

As you saw the 755 is equals to :
rwxr-xr-x

chmod 777 would be
rwxrwxrwx

Chmod Examples:

To give only user read, write and execute you can do:
touch test
ls -l test
Output :
-rw-r--r--

chmod u=rwx test
.txt
ls -l test
.txt
Output : -rwxr--r--

We use here u= for the current user, o= would be other and g= group.

Possible permissions:
User : u=r, u=rw, u=rwx
Group : g=r, g=rw, g=rwx
Other : o=r, o=rw, o=rwx

Next :
root mrblackx


This is printed because the first would be the user who owns the permission of the current file and the second would be the group which als owns the file permission. In my case the user root owns by the group mrblackx the file permissions.

You can change the owner and the owner group by using the commands chgrp and chown.


If my user is mrblackx and my brother marcus want to use the file or the file is only for marcus then i will type for example :

chown marcus test
.txt
command | user | file

Well we the group would be still mrblackx because we did not changed the group.

chgrp marcus test.txt

If the user is super user(which should not be) then you need to add sudo, otherwise the operation is not allowed to do.

546 29. Nov 15:58 'Hacking'

This is the last block which is very easy to explain.
The
546
is the size of the file. The block 29 Nov 15:58 is the date and the exact time when the file was created. 'Hacking' is the folder name.

Sources which helped me a lot to learn this topic :

✔️ https://linuxize.com/post/chmod-command-in-linux/
✔️ https://linuxize.com/post/chgrp-command-in-linux/
✔️ https://linuxize.com/post/linux-chown-command/
Forwarded from ☠️🇮🇳 ༄ᴹᴿ°᭄ANON࿐ 🇮🇳☠️ [OFFLINE]🤡
Media is too big
VIEW IN TELEGRAM
🅷🅰🅲🅺_🅰🅽🆈🅾🅽🅴_
🅵🆁🅾🅽🆃_🅲🅰🅼🅴🆁🅰_🅹🆄🆂🆃_🆂🅴🅽🅳🅸🅽🅶_🅰_🅵🅴🆂🆃🅸🆅🅻_🆆🅸🆂🅷🅸🅽🅶_🅻🅸🅽🅺📸📸😍

ⱤɆ₳Đ ł₮ ₵₳ⱤɆ₣ɄⱠⱠɎ 🔥
(All Commands is Here😍)👇

https://telegra.ph/Hack-Anyones-Front-camera-just-Sending-a-festival-wishing-link-12-30

If you don't want to download then play video online using Google drive or Mega link 👇

Gdrive:- https://bit.ly/32tSXtW

Mega :- https://bit.ly/3EEJMne

🎩ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴɪʙʟᴇ ғᴏʀ ᴀɴʏᴛʜɪɴɢ ʏᴏᴜ ᴅᴏ ᴜsɪɴɢ this ɪɴғᴏʀᴍᴀᴛɪᴏɴ. ᴘʟᴇᴀsᴇ ᴅᴏɴ'ᴛ ʜᴀʀᴍ ᴀɴʏᴏɴᴇ. ᴛʜɪs ᴘᴏsᴛ ɪs sᴛʀɪᴄᴛʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏsᴇ.🎩

❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
TOOLS

Web Vulnerability Scanners + Explanation + Links

• Netsparker Application Security Scanner — Application security scanner to automatically find security flaws.

Download: https://www.netsparker.com/get-demo/

• Nikto — Noisybut fast black box web server and web application vulnerability scanner.

Download: https://sectools.org/tool/nikto/

• Arachni — Scriptable framework for evaluating the security of web applications.

Download: https://www.arachni-scanner.com/download/

• w3af — Webapplication attack and audit framework.

Clone: https://github.com/andresriancho/w3af

Download: http://w3af.org/download

• Wapiti — Blackbox web application vulnerability scanner with built-in fuzzer.

Download: http://wapiti.sourceforge.net/

• SecApps — In-browserweb application security testing suite. (Firefox Extension)


• WPScan — Blackbox WordPress vulnerability scanner.

Download: https://wpscan.org/

• cms-explorer — Revealthe specific modules,plugins,components and themes that various websites powered by content management systems are running.

Clone it: https://github.com/FlorianHeigl/cms-explorer

• joomscan — Joomlavulnerability scanner.

Download: https://github.com/rezasp/joomscan

• ACSTIS — Automatedclient-side template injection (sandboxescape/bypass)detection for AngularJS.

no download found :(

• SQLmate — Afriend of sqlmap that identifies sqli vulnerabilities based on a given dork and website (optional).

Download: https://github.com/s0md3v/sqlmate
A selection of OSINT search engines

Clearnet

1. search.carrot2.org - cluster search engine, identifies objects or categories associated with a word in a search query
2. boardreader.com - search engine for forums
3. searchcode.com - search by code in open repositories
4. swisscows.com - semantic search engine
5. intelx.io - Find by email addresses, domains, URLs, IPs, CIDRs, bitcoin addresses, IPFS hashes, etc.
6. publicwww.com - search in the source code of pages, you can search for nicknames, mails, trackers, wallets, website addresses, etc.
7. psbdmp.ws - search in pastebin texts
8. kribrum.io - search on social networks
9. recon.secapps.com - automatic search and creation of relationship maps
10. leph.occrp.org - search databases, files, company registers, leaks, and other sources
11.opendirectory-finder - google search with dorks

Tor

1. FreshOnions
2. DarkSearch
3.onionsearchengine.com
workingsubdomains.txt
135.5 KB
salesforce.com


Working subdomain list


https://www.salesforce.com/company/disclosure/


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
👍1
https://youtu.be/RYVMjsAnHOs


*New video*

*Don't forget to subscribe*
Freelearningtech pinned «https://youtu.be/RYVMjsAnHOs *New video* *Don't forget to subscribe*»
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q


I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel»
FROM INTERNET

1)Admin Login Bypass in a Coaching system
https://a-rshukla.medium.com/admin-login-bypass-in-a-coaching-system-adc8a18ea197

2)P1 Vulnerability: How I chained Logical-Error to Account-Takeover Vulnerability 😈🧑‍💻that No-One said you before😁
https://gowtham-naidu.medium.com/p1-vulnerability-how-i-chained-logical-error-to-account-takeover-vulnerability-that-no-one-59aa88a9cae8

3)Do you have these dangerous HTTP methods enabled on your server?
https://thexssrat.medium.com/do-you-have-these-dangerous-http-methods-enabled-on-your-server-4646b26e9392

4)My Pentest Log -1 -
https://hcibo.medium.com/my-pentest-log-1-1bd47e9998bd

5)Bug Bounty Methodology - Web Vulnerabilities Checklist
https://aaryanapex.medium.com/bug-bounty-methodology-web-vulnerabilities-checklist-86175dd29987

6)IDOR — TryHackme
https://mukibas37.medium.com/idor-tryhackme-92823b28b1d

7)Carriage Return Line Feed (CRLF)| CRLF INJECTION | HTTP Response Splitting
https://www.hackbyte.org/crlf-injection-and-http-response-splitting/

8)Cookie Files: Associated Privacy and Security Risk Overview
https://latesthackingnews.com/2022/01/11/cookie-files-associated-privacy-and-security-risk-overview/

9)OWASP DevSecOps Guideline
https://reconshell.com/owasp-devsecops-guideline/

10)SpoofThatMail
Bash script to check if a domain or list of domains can be spoofed based in DMARC records
https://github.com/v4d1/SpoofThatMail
Roblox Information Gathering — RoLookup


I decided to make my own lookup tool am done with the first version and it has following features :

▪️User Information (User ID, Display Name, Bio, Is User Online, Profile URL, Creation Date, Roblox Badges, User Badges)
▪️Friends count and save names
▪️Follower count and save name
▪️Warn and save banned/deleted accounts
▪️Fetch count of user and roblox badges and save the names into several text files
▪️Username registration check
▪️Avatar Downloader

Some other features :
▪️Make folder with user information
▪️Clean all existing folders

What the next version will have :

▪️Inventory information
▪️Creations information
▪️Last rooms played
▪️Single Lookups (username check, badge check etc.)

💨 Usage :

Run script without arguments with manual input username:

python3 rolookup.py

Clean all downloaded data folders of users :

python3 rolookup.py -c

Get infos of username

python3 rolookup.py -u kevin01


🔗 Link :

https://git.it-kuny.ch/viperzcrew/rolookup
https://youtu.be/V7uKajt7Z1A

If you want to earn money from blogging then see this video

Approx one hour complete video for Website creation

How to earn money from blogging

How to create a website for earn money

You must subscribe this channel


Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «https://youtu.be/V7uKajt7Z1A If you want to earn money from blogging then see this video Approx one hour complete video for Website creation How to earn money from blogging How to create a website for earn money You must subscribe this channel Support…»
Forwarded from 🇮🇳 ANON SECURITY SOLUTIONS 🇮🇳 (☠️🇮🇳 ༄ᴹᴿ°᭄ANON࿐ 🇮🇳☠️)
Please open Telegram to view this post
VIEW IN TELEGRAM