GeekCode
793 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
Be Motivated
πŸŽ—οΈT3AM
#geekcode

@geekcode πŸ“
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
#share & #supportus

--------------> @geekcode πŸ“

Share as more as 😍
Hey, guys geekcode need geekcoder's team.

People Who can help other people's in their code workπŸ˜‡

Join our team😍

πŸŽ—οΈ
#TEAM @geekcodeπŸ“

https://t.me/joinchat/JyyvBRP9yDRWqu1mGnNfcQ

Note🚩-: Only techie people's can join this private group πŸ’™
Join us & send hii in our community ❀️ https://t.me/joinchat/JyyvBRP9yDRWqu1mGnNfcQ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
I'm happy to announce that the Burp Bounty version 1.5 in now available! This version have a lot of improvements, both at the extension level and at the profiles/rules level. https://twitter.com/BurpBounty/status/1337314879288578050

@geekcodeπŸ“
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”°Penetration TestingπŸ”°

Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix.

Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters βˆ’

>what will be the time of penetration test,

>where will be the IP source of the attack, and

>what will be the penetration fields of the system.

Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.

⭕️Types of Penetration Testing

1️⃣Black Box βˆ’ Here, the ethical hacker doesn’t have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.

2️⃣Grey Box βˆ’ It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.

3️⃣White Box βˆ’ In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.

4️⃣External Penetration Testing βˆ’ This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.

5️⃣Internal Penetration Testing βˆ’ In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.

Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead with penetration testing. The risk is calculated as follows and it is a management risk.

#supportus ❀️

@geekcodeπŸ“
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° Foundations Of Hacking & Pentesting Android Apps πŸ”°

Learn how to hack Android apps, and find vulnerabilties.

Link :- https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-sEhW9mf0YuT4uiTcc9i45w&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads

#share & #supportus

-----------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM