GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Bug Hunting strategy 👀

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
These Codes have 5 different ranges from 1×× - 5××

1×× – Informational
2×× – Success
3×× – Redirection
4×× – Client error
5×× – Server error

Some Important HTTP STATUS CODES:

100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint

200: OK / Success
201: Created
202: Accepted
207: Multi-Status

301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect

400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons

500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
What is Social Engineering?

The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
This media is not supported in your browser
VIEW IN TELEGRAM
What is proof of concept (PoC) exploit?

A proof of concept (PoC) exploit is a non-harmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Identifying issues allows companies to patch vulnerabilities and protect itself against attacks.

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How POC exploits work?

Basically, POC exploits are done by a vendor working for the company. By simulating an actual attack, it allows the company to patch the security hole without systems or data being compromised. The code developed for the test is known as (a proof of concept code) will likely be used in the future to test the software and make sure the new security measures work.

Thanks alot @geekcode army ❤️

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
#CyberSecurityTALKS

How can my account details get hacked?👀

Every year, billions of login details from hundreds of websites are taken in hacker attacks. These stolen email addresses, passwords, and other account details are then exposed on the dark web or sold on the black market, where criminals pay to gain access to your sensitive data. Companies or organizations you do business with can also leak or publish their users’ sensitive information by accident.

If criminals get a hold of one of your accounts, they can potentially impersonate you, message your contacts, access your cloud storage, steal your money, and even jump to your other accounts. That’s why we take password safety so seriously.


~ @geekcode ❤️
This media is not supported in your browser
VIEW IN TELEGRAM
Password Manager Software For Hackers

Note: If you are currently using a password manager software like 1Password, LastPass, Roboform, or iCloud keychain you should pick an alternative here.

🔹Bitwarden - Cloud/Self-host
Site: https://bitwarden.com/

🔹KeePassXC - Local
Site: https://keepassxc.org/

🔹LessPass - Browser
Site: https://lesspass.com/
This media is not supported in your browser
VIEW IN TELEGRAM
#hellohackers

Try to Learn hacking by real life examples it can be very helpful for your skills❤️

~geekcode