#knowledge
What is wiretapping?
wiretapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.
@geekcode
What is wiretapping?
wiretapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.
@geekcode
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
https://github.com/saeidshirazi/awesome-android-security
@geekcode
https://github.com/saeidshirazi/awesome-android-security
@geekcode
GitHub
GitHub - saeidshirazi/awesome-android-security: A curated list of Android Security materials and resources For Pentesters and Bug…
A curated list of Android Security materials and resources For Pentesters and Bug Hunters - saeidshirazi/awesome-android-security
The cool service explainshell.com provides a convenient interface for finding help information for any command in Linux. It is enough just to drive the appropriate command with all the arguments into the search box -
https://explainshell.com
@geekcode
https://explainshell.com
@geekcode
How do Hackers Hide Themselves?
1) Using a proper VPN or VPS.
2) Route the traffic through TOR network.
3) Use a proxy service.
4) Buy an 'RDP' session to attack.
5) Use infected machines of other victims to run attack.
6) Destroying and corrupting any logs.
For query/promotion : @geekcodevipbot
@geekcode
1) Using a proper VPN or VPS.
2) Route the traffic through TOR network.
3) Use a proxy service.
4) Buy an '
5) Use infected machines of other victims to run attack.
6) Destroying and corrupting any logs.
For query/promotion : @geekcodevipbot
@geekcode
How to bypass root detection and SSL pinning on Android and iOS using Frida and Objection
https://securitycafe.ro/2022/02/01/root-detection-and-ssl-pinning-bypass/
@geekcode
https://securitycafe.ro/2022/02/01/root-detection-and-ssl-pinning-bypass/
@geekcode
Security Café
Root detection and SSL pinning bypass
There are multiple methods to circumvent the client-side security that blocks the usage of the tested application in an unsafe environment such as Rooted or Jailbroken devices. Next, I will give yo…