GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
Have I been Pwned goes open source

Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.

https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/

@cyberagents X @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How Scareware Comes in Used?

Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.

Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the user’s device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.

Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.

For query : @geekcode

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Bug Hunting strategy 👀

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
These Codes have 5 different ranges from 1×× - 5××

1×× – Informational
2×× – Success
3×× – Redirection
4×× – Client error
5×× – Server error

Some Important HTTP STATUS CODES:

100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint

200: OK / Success
201: Created
202: Accepted
207: Multi-Status

301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect

400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons

500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
What is Social Engineering?

The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
This media is not supported in your browser
VIEW IN TELEGRAM
What is proof of concept (PoC) exploit?

A proof of concept (PoC) exploit is a non-harmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Identifying issues allows companies to patch vulnerabilities and protect itself against attacks.

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How POC exploits work?

Basically, POC exploits are done by a vendor working for the company. By simulating an actual attack, it allows the company to patch the security hole without systems or data being compromised. The code developed for the test is known as (a proof of concept code) will likely be used in the future to test the software and make sure the new security measures work.

Thanks alot @geekcode army ❤️

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM