Here's how an attacker can get your mobile phone number using Facebook, PayPal & G-Mail.
https://null-byte.wonderhowto.com/how-to/find-anyones-private-phone-number-using-facebook-0181071/
https://null-byte.wonderhowto.com/how-to/find-anyones-private-phone-number-using-facebook-0181071/
Forwarded from Telegram Geeks
Leaked WhitePaper - Telegram Open Network (TON).pdf
10.9 MB
Here is the leaked white paper of Telegram Open Network (TON)
#ton #blockchain #ico #gram
ℹ️ @geeksChannel
#ton #blockchain #ico #gram
ℹ️ @geeksChannel
Telegram Geeks
Leaked WhitePaper - Telegram Open Network (TON).pdf
Telegram's cryptowallet, and more leaks...
Iranian ISPs applied some restrictions on VPN networks.
if you can modify your client config file on PC, create a ssh tunnel on port 8080 (or whatever you want) and add the following lines at the end of your config file:
socks-proxy-retry
socks-proxy 127.0.0.1 8080
if you can modify your client config file on PC, create a ssh tunnel on port 8080 (or whatever you want) and add the following lines at the end of your config file:
socks-proxy-retry
socks-proxy 127.0.0.1 8080
Tech Byte™ pinned «Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage? 👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price…»
DiskDigger v1.18 Portable
Key included.
Undeletes and recovers lost files from your hard drive, memory cards, USB flash drives. Supports most types of media that your computer can read
Key included.
Undeletes and recovers lost files from your hard drive, memory cards, USB flash drives. Supports most types of media that your computer can read
Here's a nice example of a c++ code using
GNU GCC/Code::Blocks for parsing switch
parameters the proper way, meaning for
example, a user can change the order of
them, without the code messing up. By using
some logic, it connects the proper value to the
desired switches:
https://github.com/stephanvandekerkhof/cpp-
switch-parameter-parser-example
Have a nice Friday!
GNU GCC/Code::Blocks for parsing switch
parameters the proper way, meaning for
example, a user can change the order of
them, without the code messing up. By using
some logic, it connects the proper value to the
desired switches:
https://github.com/stephanvandekerkhof/cpp-
switch-parameter-parser-example
Have a nice Friday!
Tools You can Use to Hack on Android
Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools you can use to hack devices and systems on Android:
Prerequisite:
Before we start, you're gonna need some gear:
1. Assuming you've installed Termux, type and run the commands
Now that you're up-to-date, let's begin.
Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools you can use to hack devices and systems on Android:
Prerequisite:
Before we start, you're gonna need some gear:
1. Assuming you've installed Termux, type and run the commands
apt-get update followed by apt-get upgrade > This will update all packages installed on your device to the latest version.Now that you're up-to-date, let's begin.
Tech Byte™
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
1. AhMyth Android RAT
The Remote Access Tool that can be used to remotely take complete control of another Android device.
Install it entering this command on the terminal:
This will only work if you already have the package "git" installed, if you don't, install it using
The Remote Access Tool that can be used to remotely take complete control of another Android device.
Install it entering this command on the terminal:
git clone https://github.com/AhMyth/AhMyth-Android-RAT.gitThis will only work if you already have the package "git" installed, if you don't, install it using
pkg install git or apt-get install git, then try again.
Tech Byte™
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
2. Weeman
This tool can be used to create phishing (fake login) pages of websites. When you send the link to the fake page to your victim, and their enter their login credentials, their login and password will be sent to you.
Install "python" or "python2" first:
Now install weeman by cloning the github repository:
This tool can be used to create phishing (fake login) pages of websites. When you send the link to the fake page to your victim, and their enter their login credentials, their login and password will be sent to you.
Install "python" or "python2" first:
pkg install python or pkg install python2, you can use apt-get as well, it works just as good as pkgNow install weeman by cloning the github repository:
git clone https://github.com/evait-security/weeman
Tech Byte™
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
3. Metasploit
Remember when we hacked Facebook using Kali, and we used metasploit? Well, it's the same here, except this has been ported to Android.
Installing metasploit is a bit trickier than most packages, it requires a whole new tutorial of itself, but we'll use the easy method, cloning the git repo, metasploit is a big archive so you need at least 4GB free space and a fast, stable internet connection:
• Clone the github repo >
• Get into the directory
• Give the required permissions for "install.sh"
• Install it
• After the installation, run metasploit
Remember when we hacked Facebook using Kali, and we used metasploit? Well, it's the same here, except this has been ported to Android.
Installing metasploit is a bit trickier than most packages, it requires a whole new tutorial of itself, but we'll use the easy method, cloning the git repo, metasploit is a big archive so you need at least 4GB free space and a fast, stable internet connection:
• Clone the github repo >
git clone https://github.com/verluchie/termux-metasploit• Get into the directory
cd termux-metasploit• Give the required permissions for "install.sh"
chmod 777 install.sh• Install it
sh install.sh• After the installation, run metasploit
msfconsole
Tech Byte™
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
4. Hydra
This is a network login cracker and password bruteforcer. Supports multiple protocols and custom wordlists.
This is a network login cracker and password bruteforcer. Supports multiple protocols and custom wordlists.
pkg install hydra
Tech Byte™
Tools You can Use to Hack on Android Kali, the best hacking OS, is based on Linux, luckily for us, so is Android. With the Termux terminal emulator, you can install and use most tools and packages supported on Kali. I've picked out some of the best tools…
5. Nmap
Utility for network discovery and security auditing.
Utility for network discovery and security auditing.
pkg install nmapThese are my top 5 picks. There are others too, but these work best. I'll provide in-depth tutorials for each one of these tools soon.
Contact me in case you have questions or know a package that you think deserves to be on this list.
Contact me in case you have questions or know a package that you think deserves to be on this list.
💢 WhatsApp Group Chats Can Easily Be Infiltrated
ℹ️A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.
Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.
The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service.
In other words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.
However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.
Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.
As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.
That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.
As explained in the newly published RUB paper, titled "More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema," since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat.
What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.
According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member.
"The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads.
"Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces."
WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure.
"We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson told Wired.
"The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted."
But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.
Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrat
ℹ️A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.
Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.
The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service.
In other words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.
However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.
Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.
As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.
That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.
As explained in the newly published RUB paper, titled "More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema," since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat.
What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.
According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member.
"The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads.
"Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces."
WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure.
"We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson told Wired.
"The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted."
But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.
Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrat
Forwarded from RL channels
Have a Telegram channel📢, group💬 or bot🤖 you want to get more followers👥 to? Or maybe it's your brand new YouTube channel, Instagram or Twitter fanpage?
👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price and make sure you reach that target you set. Gather loads of views, visits, likes, follows or subs depending on your advert.
💰I accept payments via PayPal, Bitcoin, Etherium or M-Pesa💵
Simply contact me on Telegram or on any of my social media handles for pricing and advertising.
Special NEW YEAR deal for regular clients: Get upto 25% off an advertising package!!
- @romL3N #RLad
👍I got you covered, I'll advertise your products on my Telegram platforms for a very affordable price and make sure you reach that target you set. Gather loads of views, visits, likes, follows or subs depending on your advert.
💰I accept payments via PayPal, Bitcoin, Etherium or M-Pesa💵
Simply contact me on Telegram or on any of my social media handles for pricing and advertising.
Special NEW YEAR deal for regular clients: Get upto 25% off an advertising package!!
- @romL3N #RLad
How to set socks in Mozilla Firefox
Run firefox Go to Options Advanced
setting Network
Now the screen will pop up various options
like : 1. No proxy; 2.Auto Detect; 3.Use system
proxy; 4. Manual proxy configuration.
You mark 4. Manual proxy configuration. Now
type in socks host IP you have, example Socks
Host: 141.0.8.24 Port: 1080
Press ok and restart firefox. Now you are
connected to secure socks5..
When you buy SOCKS always match with card
holder address.
Ex. If CC holder from Delhi,India then u also
buy socks with same address. Atleast
matching State, Country
Run firefox Go to Options Advanced
setting Network
Now the screen will pop up various options
like : 1. No proxy; 2.Auto Detect; 3.Use system
proxy; 4. Manual proxy configuration.
You mark 4. Manual proxy configuration. Now
type in socks host IP you have, example Socks
Host: 141.0.8.24 Port: 1080
Press ok and restart firefox. Now you are
connected to secure socks5..
When you buy SOCKS always match with card
holder address.
Ex. If CC holder from Delhi,India then u also
buy socks with same address. Atleast
matching State, Country