GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
What is the domain transfer process?

All registries have a process to transfer domain names from one owner to another. Generally, the process for doing this is as follows:

Domain owner disables WHOIS/domain privacy so that the new registrar can verify ownership of the domain to be transferred
Domain owner disables any transfer lock protections on the domain to be transferred.
Domain owner obtains a transfer authorisation code (or EPP, or auth code, or transfer code, etc.)
This step is dependent on the registry the domain belongs to.
For Nominet-controlled domains (i.e., .uk, .co.uk, .org.uk and .me.uk for example), a user who wishes to transfer a domain from one registrar to another registrar needs to set a value on their domain which is known as an IPS tag. IPS stands for "Internet Provider Security", and it acts as a label identifying domain registrars when administering domain name registration and DNS services. It’s also known as a "registrar tag". When a domain is to be transferred from one registrar to another, the original registrar needs to update the IPS tag of the domain to reflect the tag of the new registrar.
The new owner requests a domain transfer from their new registrar.

The existing domain owner receives an email to the administrative email address on file for the domain requesting authorisation to transfer the domain. If the existing domain owner approves the transfer, the transfer proceeds.

For query : @geekserverbot

~ @geekcode ❤️
GeekCode pinned «What is the domain transfer process? All registries have a process to transfer domain names from one owner to another. Generally, the process for doing this is as follows: Domain owner disables WHOIS/domain privacy so that the new registrar can verify ownership…»
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
@cyberagents X @geekcode

For more cyber security & tech news join us
@cybergents ❤️
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
🎗️SANS CYBER ACES 🎗️

-> it is a free course by sans which is sort of a crash course in
-> os basics (windows , linux)
-> networking upto a good level
-> scripting (powershell,python,bash)

Link: https://tutorials.cyberaces.org/tutorials.html

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
NETWORK SECURITY BIBLE

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
What sherlock can do?

Social media accounts are rich sources of clues. One social media account may contain links to others which use different screen names, giving you another round of searching to include the newly discovered leads. Images from profile photos are easy to put into a reverse image search, allowing you to find other profiles using the same image whenever the target has a preferred profile photo.
Even the description text in a profile may often be copied and pasted between profiles, allowing you to search for profiles created with identical profile text or descriptions.

Installation of Sherlock:

~$ git clone https://github.com/sherlock-project/sherlock.git
~$ cd sherlock
~/sherlock$ pip3 install -r requirements.txt
~python3 sherlock.py -h

Thank you...!

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is MAC Address? Why we need to change ?

As a hacker prospective 👀


Each network card, whether it's a Wi-Fi card or a wired card, has a physical, static address, assigned by the card
manufacturer.
This is the Media Access Control (MAC) address. The MAC address is written on the card, and it's physical, so it never changes. It is used between devices, for identification and to transfer packets in the right direction. This works because each packet has a source MAC and a destination MAC, and travels from the source to the destination.
Because the MAC address is static and never changes, it can be used to trace back and identify a device. Also, since devices use MAC addresses to identify each other, we can have some networks that only allow certain MAC addresses to connect to them (by using a whitelist), or that blacklist MAC addresses so that they cannot connect to the network.
Changing your MAC address can help you to either connect to a network by being on a whitelist, or to bypass a blacklist.
The only way to change the MAC address is to change it in the RAM—so it will only be changed for the current session, and once you restart, you will have to change it again.

For query : @geekserverbot

~ @geekcode