GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
🀩🀩Telegram Monetization Update | Telegram Will Start Putting Ads🀩🀩
Telegram is the best alternative to whatsapp and its about to hit 500 Million users.


Telegram Co-founder Pavel Durov announced plans to earn revenue via premium features and ads.


Durov laid out a two plan on monetizing the service starting next year. The first part of this will be introducing premium features for business,While all existing features will continue to remain free.


Durov (co-founder) assured that the parts of the messenger that are devoted to messaging, like one-to-one chats and groups, would remain free of ads, as he believes that communication between people should not be disrupted by any sorts of advertisements.


They also ensured that private chhanels will remain ad free


Durov said - If Telegram starts earning money, the community should also benefit. For example, If we monetize large public one-to-many channels via the Ad Platform, the owners of these channels will receive free traffic in proportion to their size. Or, if Telegram introduces premium stickers with additional expressive features, the artists who make stickers of this new type will also get a part of the profit. We want millions of Telegram-based creators and small businesses to thrive, enriching the experience of all our users.


This paid feature will allow channel owners to get free traffic proportionate to their sizes. he added that if Telegram were to launch premium stickers having more expressive features, artists making these stickers would also get a cut in the profit.


This paid plans will be launched in 2021 that will be aimed at business and power use and all the features that are currently free will remain free

For proof check this post form product Manager of telegram https://t.me/durov/142

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
GeekCode
πŸ”΅ What is OWASP? ✳️ The Open Web Application Security Project (OWASP) is a non-profit organization founded in 2001, with the goal of helping website owners and security experts protect web applications from cyber attacks. πŸ”΅ The OWASP Top 10 ✳️ OWASP Top…
πŸ”΅ Exploiting the site

✳️ Once we found the bug, we can create a payload and exploit the site. Result of this will be like website/admin panel take overs, data breach (stealing sensitive info's), crashing the website etc etc.. but this is totally illegal.

πŸ”΅ Reporting bug

✳️ And the other option is, reporting the bug to the creater. We can report the bug that we found on their site. If they found our report as a valid one then they will reward us with $πŸ’°πŸ’Έ . This is what is called as "bug bounty" and its totally legal


#share & #supportus

-------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
β€‹β€‹πŸ“š Exclusive CTF Udemy Courses Free For Limited Time

1) Ethical Hacking - Capture the Flag Walkthroughs - v1

✨ Video and lab Walkthroughs for capture the Flag exercises that will help strengthen your ethical hacking skills
✨ Understanding The Hackers Methodology

Enroll Now :-
https://www.udemy.com/course/ethical-hacking-capture-the-flag-walkthroughs/?couponCode=25C7C3DFC8DC6478024A

2) Ethical Hacking - Capture the Flag Walkthroughs - v2

✨ Video and lab Walkthroughs for capture the Flag exercises that will strengthen your ethical hacking skills
✨ A Much Higher Skill Level as A Pentester Or a Hacker

Enroll Now :-
https://www.udemy.com/course/ethical-hacking-capture-the-flag-walkthroughs-v2/?couponCode=8EBF8FEDC855BBE71C2D

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
#Enroll
Basics of Cloud Computing

Learn the Basics of Cloud Computing right from the Service Models to The Future of Cloud Computing in Detail.

https://www.udemy.com/course/basics-of-cloud-computing/?couponCode=D09349981999B0149135


#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ’’TERMUX ADVANCE GUIDEπŸ’’

πŸ”°Ultimate Guide To Ethical Hacking With TermuxπŸ”°

LINKπŸ‘‡

https://play.google.com/store/apps/details?id=com.androidexample.termux


#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
IP Addressing and Subnetting - Zero to Hero

Go from zero to advanced in IP addressing in a single course!

https://www.udemy.com/course/ip-addressing-zero-to-hero/?couponCode=HAPPY2021


#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”΅ Injection Attack
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
✳️ A code injection happens when an attacker sends invalid data to the web application with the intention to make it do something that the application was not designed/programmed to do.
✳️ In simple words, an injection attack is one in which databases and other systems are vulnerable to such an extent that an attacker can inject malicious or untrusted data into the system. This occurs when untrusted data is sent to an interpreter as part of a command or query. Basically, the attacker's data tricks the interpreter into executing commands without adequate authorization.

✳️ the most common example around this security vulnerability is the SQL query consuming untrusted data. You can see one of OWASP’s examples below:

String query = β€œSELECT * FROM accounts WHERE custID = β€˜β€ + request.getParameter(β€œid”) + β€œβ€˜β€;

✳️ This query can be exploited by calling up the web page executing it with the following URL: http://example.com/app/accountView?id=’ or β€˜1’=’1 causing the return of all the rows stored on the database table.
(I will explain more about this queries and working of sql injection later)

✳️ The core of a code injection vulnerability is the lack of validation and sanitization of the data used by the web application, which means that this vulnerability can be present on almost any type of technology.
✳️ Anything that accepts parameters as input can potentially be vulnerable to a code injection attack.

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”΄ some of the Types of Injections
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
βœ… Depending on the type of database system, the programming language and other factors, there can be many different types of injections:

πŸ”Ή Code Injection
πŸ”Ή CRLF Injection
πŸ”Ή OS Command Injection
πŸ”Ή XSS
πŸ”Ή Email Header Injection
πŸ”Ή SQL Injection
Etc..

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”΅ How do you prevent code injection vulnerabilities?

βœ… Preventing code injection vulnerabilities really depends on the technology you are using on your website. For example, if you use WordPress, you could minimize code injection vulnerabilities by keeping it to a minimum of plugin and themes installed.

πŸ”Ή If you have a tailored web application and a dedicated team of developers, you need to make sure to have security requirements your developers can follow when designing and writing software. This will allow them to keep thinking about security during the lifecycle of the project.

⚠️ Here are OWASP’s technical recommendations to prevent SQL injections:
πŸ‘‰ Preventing SQL injections requires keeping data separate from commands and queries.

πŸ”ΉThe preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface or migrate to use Object Relational Mapping Tools (ORMs). Note: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
πŸ”Ή Use positive or β€œwhitelist” server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications.
πŸ”Ή For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. Note: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software.
πŸ”Ή Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
😍 AlgoExpert All courses Free 😍


β–ͺ️What is AlgoExpert?

AlgoExpert is an interview prep platform for software engineers. It's specifically geared towards those who want to work at a FAANG-level company. Featuring a robust interactive coding environment, AlgoExpert also has expansive video solutions.

SIZE : 20 GB +

Download link :
https://mega.nz/folder/qI1SEAKQ#0scBk0i_Y0dwgrlb5yehRw

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM