GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
๐ŸCyber Security โค๏ธ
๐ŸHacking Resources ๐Ÿ‘จโ€๐Ÿ’ป

Providing knowledge to people's๐Ÿฅ€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...๐Ÿ™‚๐Ÿ™‚

๐Ÿ“ฐPromotion/Query - @geekcodevipbot
Download Telegram
Scope of Cyber Forensics?

Cyber Forensics courses are gaining increasing popularity among students. This is due to the rapid growth in incidents of online and mobile phone frauds.

Objectives form the basis of cyber forensics course:

๐Ÿ“ŒKnowledge of the approach and methods of cyber crime investigations
๐Ÿ“ŒUnderstanding the defensive measures of damage control in response to cyber attacks
๐Ÿ“ŒKnowledge of the proactive methods of avoiding cyber crimes
๐Ÿ“ŒRecognizing the clues to identify and prevent potential cyber attacks
๐Ÿ“ŒLearning the various types of risks involved in computerized and networking operations.

Join & share our channel
@geekcode
If you guys want cyber forensic courses checkout our resource channel

https://t.me/joinchat/RbqYHjjg67Yac19x


@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is SMB?

SMB (Server Message Block) Protocol - is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.

Servers make file systems and other resources (printers, named pipes, APIs) available to clients on the network. Client computers may have their own hard disks, but they also want access to the shared file systems and printers on the servers.

The SMB protocol is known as a response-request protocol, meaning that it transmits multiple messages between the client and server to establish a connection. Clients connect to servers using TCP/IP (actually NetBIOS over TCP/IP, NetBEUI or IPX/SPX.



@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is Telnet?

Telnet is an application protocol which allows you, with the use of a telnet client, to connect to and execute commands on a remote machine thatโ€™s hosting a telnet server.

The telnet client will establish a connection with the server. The client will then become a virtual terminal- allowing you to interact with the remote host.

Telnet sends all messages in clear text and has no specific security mechanisms. Thus, in many applications and services, Telnet has been replaced by SSH in most implementations.


~ @geekcode
Support us @geekcode โค๏ธ
This media is not supported in your browser
VIEW IN TELEGRAM
Telnet Exploit?

Telnet, being a protocol and itself insecure for the reasons we talked about earlier(https://t.me/geekcode/2347). It lacks encryption, so sends all communication over plaintext, and for the most part has poor access control. There are CVEโ€™s for Telnet client and server systems, however, so when exploiting you can check for those on:

๐Ÿ”—
https://www.cvedetails.com/
๐Ÿ”—
https://cve.mitre.org/

A CVE short for Common Vulnerabilities and Exposures is a list of publicly disclosed computer security flaws. When someone refers to a CVE, they usually mean the CVE ID number assigned to a security flaw.

However, youโ€™re far more likely to find a misconfiguration in how telnet has been configured or is operating that will allow you to exploit it.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is SSH?

#staytunned