Tech Byte
5.11K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
Here's how an attacker can get your mobile phone number using Facebook, PayPal & G-Mail.

https://null-byte.wonderhowto.com/how-to/find-anyones-private-phone-number-using-facebook-0181071/
Can anyone lend me a Bitcoin? If not, does anyone wanna buy my kidney? I'm O-
😁

Those crazy specs on the iMac Pro
Forwarded from Telegram Geeks
Leaked WhitePaper - Telegram Open Network (TON).pdf
10.9 MB
Here is the leaked white paper of Telegram Open Network (TON)

#ton #blockchain #ico #gram

ℹ️ @geeksChannel
Telegram Geeks
Leaked WhitePaper - Telegram Open Network (TON).pdf
Telegram's cryptowallet, and more leaks...
Iranian ISPs applied some restrictions on VPN networks.
if you can modify your client config file on PC, create a ssh tunnel on port 8080 (or whatever you want) and add the following lines at the end of your config file:
socks-proxy-retry
socks-proxy 127.0.0.1 8080
Tech Byte pinned «​​Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage? 👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price…»
DiskDigger v1.18 Portable
Key included.

Undeletes and recovers lost files from your hard drive, memory cards, USB flash drives. Supports most types of media that your computer can read
Here's a nice example of a c++ code using
GNU GCC/Code::Blocks for parsing switch
parameters the proper way, meaning for
example, a user can change the order of
them, without the code messing up. By using
some logic, it connects the proper value to the
desired switches:
https://github.com/stephanvandekerkhof/cpp-
switch-parameter-parser-example
Have a nice Friday!
Termux: The best Terminal emulator for Android. It supports additional of external packages, commands and tools. I'll tutor you on how you can use it to hack. But first, install it. (Android 5.0+)
Tools You can Use to Hack on Android

Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools you can use to hack devices and systems on Android:

Prerequisite:
Before we start, you're gonna need some gear:

1. Assuming you've installed Termux, type and run the commands apt-get update followed by apt-get upgrade > This will update all packages installed on your device to the latest version.

Now that you're up-to-date, let's begin.
Tech Byte
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
1. AhMyth Android RAT

The Remote Access Tool that can be used to remotely take complete control of another Android device.

Install it entering this command on the terminal:
git clone https://github.com/AhMyth/AhMyth-Android-RAT.git

This will only work if you already have the package "git" installed, if you don't, install it using pkg install git or apt-get install git, then try again.
Tech Byte
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
2. Weeman

This tool can be used to create phishing (fake login) pages of websites. When you send the link to the fake page to your victim, and their enter their login credentials, their login and password will be sent to you.

Install "python" or "python2" first: pkg install python or pkg install python2, you can use apt-get as well, it works just as good as pkg

Now install weeman by cloning the github repository:
git clone https://github.com/evait-security/weeman
Tech Byte
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
3. Metasploit

Remember when we hacked Facebook using Kali, and we used metasploit? Well, it's the same here, except this has been ported to Android.

Installing metasploit is a bit trickier than most packages, it requires a whole new tutorial of itself, but we'll use the easy method, cloning the git repo, metasploit is a big archive so you need at least 4GB free space and a fast, stable internet connection:

• Clone the github repo > git clone https://github.com/verluchie/termux-metasploit

• Get into the directory
cd termux-metasploit

• Give the required permissions for "install.sh"
chmod 777 install.sh

• Install it
sh install.sh

• After the installation, run metasploit
msfconsole
These are my top 5 picks. There are others too, but these work best. I'll provide in-depth tutorials for each one of these tools soon.

Contact me in case you have questions or know a package that you think deserves to be on this list.
💢 WhatsApp Group Chats Can Easily Be Infiltrated

ℹ️A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.

Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.

The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service. 


In other words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.

However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.

Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.

As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.

That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.

As explained in the newly published RUB paper, titled "More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema," since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat. 


What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.

According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member.

"The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads. 

"Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces."

WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure.

"We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson told Wired. 

"The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted."

But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.

Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrat
Forwarded from RL channels
​​Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage?

👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price and make sure you reach that target you set. Gather loads of views, visits, likes, follows or subs depending on your advert.

💰I accept payments via PayPal, Bitcoin, Etherium or M-Pesa💵

Simply contact me on Telegram or on any of my social media handles for pricing and advertising.

Special NEW YEAR deal for regular clients: Get upto 25% off an advertising package!!

- @romL3N #RLad
How to set socks in Mozilla Firefox 
Run firefox  Go to Options  Advanced
setting  Network 
Now the screen will pop up various options
like : 1. No proxy; 2.Auto Detect; 3.Use system
proxy; 4. Manual proxy configuration.
You mark 4. Manual proxy configuration. Now
type in socks host IP you have, example Socks
Host: 141.0.8.24 Port: 1080
Press ok and restart firefox. Now you are
connected to secure socks5..
When you buy SOCKS always match with card
holder address.
Ex. If CC holder from Delhi,India then u also
buy socks with same address. Atleast
matching State, Country