#knowledge
What is wiretapping?
wiretapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.
@geekcode
What is wiretapping?
wiretapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.
@geekcode
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
https://github.com/saeidshirazi/awesome-android-security
@geekcode
https://github.com/saeidshirazi/awesome-android-security
@geekcode
GitHub
GitHub - saeidshirazi/awesome-android-security: A curated list of Android Security materials and resources For Pentesters and Bug…
A curated list of Android Security materials and resources For Pentesters and Bug Hunters - saeidshirazi/awesome-android-security
The cool service explainshell.com provides a convenient interface for finding help information for any command in Linux. It is enough just to drive the appropriate command with all the arguments into the search box -
https://explainshell.com
@geekcode
https://explainshell.com
@geekcode
How do Hackers Hide Themselves?
1) Using a proper VPN or VPS.
2) Route the traffic through TOR network.
3) Use a proxy service.
4) Buy an 'RDP' session to attack.
5) Use infected machines of other victims to run attack.
6) Destroying and corrupting any logs.
For query/promotion : @geekcodevipbot
@geekcode
1) Using a proper VPN or VPS.
2) Route the traffic through TOR network.
3) Use a proxy service.
4) Buy an '
5) Use infected machines of other victims to run attack.
6) Destroying and corrupting any logs.
For query/promotion : @geekcodevipbot
@geekcode