These Codes have 5 different ranges from 1×× - 5××⚡
1×× – Informational
2×× – Success
3×× – Redirection
4×× – Client error
5×× – Server error
Some Important HTTP STATUS CODES:
100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint
200: OK / Success
201: Created
202: Accepted
207: Multi-Status
301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect
400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons
500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout
For query : @geekserverbot
~ @geekcode
1×× – Informational
2×× – Success
3×× – Redirection
4×× – Client error
5×× – Server error
Some Important HTTP STATUS CODES:
100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint
200: OK / Success
201: Created
202: Accepted
207: Multi-Status
301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect
400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons
500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout
For query : @geekserverbot
~ @geekcode
What is Social Engineering?
The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.
For query : @geekserverbot
~ @geekcode
The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.
For query : @geekserverbot
~ @geekcode
How to exploit insecure WebResourceResponse configurations + an example vulnerability in Amazon apps
https://blog.oversecured.com/Android-Exploring-vulnerabilities-in-WebResourceResponse/
~ @geekcode
https://blog.oversecured.com/Android-Exploring-vulnerabilities-in-WebResourceResponse/
~ @geekcode
News, Techniques & Guides
Android: Exploring vulnerabilities in WebResourceResponse
When it comes to vulnerabilities in WebViews, we often overlook the incorrect implementation of
What is proof of concept (PoC) exploit?
A proof of concept (PoC) exploit is a non-harmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Identifying issues allows companies to patch vulnerabilities and protect itself against attacks.
For query : @geekserverbot
~ @geekcode
A proof of concept (PoC) exploit is a non-harmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Identifying issues allows companies to patch vulnerabilities and protect itself against attacks.
For query : @geekserverbot
~ @geekcode
How POC exploits work?
Basically, POC exploits are done by a vendor working for the company. By simulating an actual attack, it allows the company to patch the security hole without systems or data being compromised. The code developed for the test is known as (a proof of concept code) will likely be used in the future to test the software and make sure the new security measures work.
Thanks alot @geekcode army ❤️
For query : @geekserverbot
~ @geekcode
Basically, POC exploits are done by a vendor working for the company. By simulating an actual attack, it allows the company to patch the security hole without systems or data being compromised. The code developed for the test is known as (a proof of concept code) will likely be used in the future to test the software and make sure the new security measures work.
Thanks alot @geekcode army ❤️
For query : @geekserverbot
~ @geekcode
#CyberSecurityTALKS
How can my account details get hacked?👀
Every year, billions of login details from hundreds of websites are taken in hacker attacks. These stolen email addresses, passwords, and other account details are then exposed on the dark web or sold on the black market, where criminals pay to gain access to your sensitive data. Companies or organizations you do business with can also leak or publish their users’ sensitive information by accident.
If criminals get a hold of one of your accounts, they can potentially impersonate you, message your contacts, access your cloud storage, steal your money, and even jump to your other accounts. That’s why we take password safety so seriously.
~ @geekcode ❤️
How can my account details get hacked?👀
Every year, billions of login details from hundreds of websites are taken in hacker attacks. These stolen email addresses, passwords, and other account details are then exposed on the dark web or sold on the black market, where criminals pay to gain access to your sensitive data. Companies or organizations you do business with can also leak or publish their users’ sensitive information by accident.
If criminals get a hold of one of your accounts, they can potentially impersonate you, message your contacts, access your cloud storage, steal your money, and even jump to your other accounts. That’s why we take password safety so seriously.
~ @geekcode ❤️
⚡Password Manager Software For Hackers ⚡
Note: If you are currently using a password manager software like 1Password, LastPass, Roboform, or iCloud keychain you should pick an alternative here.
🔹Bitwarden - Cloud/Self-host
Site: https://bitwarden.com/
🔹KeePassXC - Local
Site: https://keepassxc.org/
🔹LessPass - Browser
Site: https://lesspass.com/
Note: If you are currently using a password manager software like 1Password, LastPass, Roboform, or iCloud keychain you should pick an alternative here.
🔹Bitwarden - Cloud/Self-host
Site: https://bitwarden.com/
🔹KeePassXC - Local
Site: https://keepassxc.org/
🔹LessPass - Browser
Site: https://lesspass.com/
#hellohackers
Try to Learn hacking by real life examples it can be very helpful for your skills❤️
~geekcode
Try to Learn hacking by real life examples it can be very helpful for your skills❤️
~geekcode
What is Keylogger?
A keylogger is a type of spyware that can be used to track and log the keys you strike on your keyboard, capturing any information typed. Keyloggers are insidious because you don’t know they’re there, watching and recording everything you type.
How its useful for bad guys(Hackers)?
The data captured by keylogger can include your personal and financial information, PIN codes and account numbers, credit card numbers, usernames, passwords, and other sensitive data — all of which can used to commit fraud or identity theft.
~ @geekcode
A keylogger is a type of spyware that can be used to track and log the keys you strike on your keyboard, capturing any information typed. Keyloggers are insidious because you don’t know they’re there, watching and recording everything you type.
How its useful for bad guys(Hackers)?
The data captured by keylogger can include your personal and financial information, PIN codes and account numbers, credit card numbers, usernames, passwords, and other sensitive data — all of which can used to commit fraud or identity theft.
~ @geekcode
How can we protect our computer from such kind of spyware & keyloggers ?
Keylogger can be difficult to detect but there is some common signs for detecting keylogger -:
🔹 Computer getting slower
🔹 Abnormal delays on starting the programs
🔹 New icons & files on desktop
🔹 Excessive Hard Drive
🔹 Network activity
🔹 Unwanted pop-ups
Thanks for asking your questions I like it when you guys ask questions❤️
~ @geekcode
Keylogger can be difficult to detect but there is some common signs for detecting keylogger -:
🔹 Computer getting slower
🔹 Abnormal delays on starting the programs
🔹 New icons & files on desktop
🔹 Excessive Hard Drive
🔹 Network activity
🔹 Unwanted pop-ups
Thanks for asking your questions I like it when you guys ask questions❤️
~ @geekcode