7 subscribers
34 photos
6 videos
29 files
29 links
Backup
Download Telegram
Forwarded from BLACK HAT KINGDOM
πŸ‘¨β€πŸ’»BlueSmack Attack - Bluetooth HackingπŸ‘¨β€πŸ’»

⚑What is bluesmack Attack?

Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters
.

⚑Procedure For The Attack

The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.


⚑How to Avoid Such Attack

Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
πŸ”°HACKER'S DICTIONARYπŸ”°

Are you new to the realm of hacking?

Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.

Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*

βž–ABBREVITIONSβž–

DDoS = Distributed Denial of Service

DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.

FTP =File Transfer Protocol. Used for transferring files over an FTP server.

FUD = Fully Undetectable

Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.

HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

IRC = Internet Relay Chat. Transmiting text messages in real time between online users.

JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.

Malware =Malicious Software

UNix = Unix based operating system, usually refered to here when refering to DoS'ing.

POP3 =This is the most popular protocol for picking up e-mail from a server.

R.A.T = Remote Administration Tool

SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)

SE = Social Engineering

SKID =Script Kid/Script Kiddie

SMTP =A TCP/IP protocol used in sending and receiving e-mail.

SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."

SSH =Secure Shell, used to connect to Virtual Private Servers.

TCP = Transmission Control Protocol, creates connections and exchanges packets of data.

UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.

VPN =Virtual Private Network

VPS =Virtual Private Server

XSS (CSS) = Cross Site Scripting

βž–WORDSβž–

Algorithm = A series of steps specifying which actions to take in which order.

ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.

Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.

Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.

Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)

Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.

Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.

Cracker = A specific type of hacker who decrypts passwords or breaks software

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
Start Using Wireshark to Hack like a Pro.zip
531.4 MB
πŸ”°Start Using Wireshark to Hack like a ProπŸ”°#Wireshark

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
Reverse_Engineering_Course_–_The_Hacks_Behind_Cracking_By_DedSec.rar
1.2 GB
⬛DEDSEC Reverse Engineering Course – The Hacks Behind cracking⬛

Credits - Unknown

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
SQL Injection.zip
932.9 MB
πŸ“‚ File Name: SQL Injection.zip

πŸ’Ύ File Size: 932.93 MiB

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from Vincent T
So let’s warm up with our very first question

Q1: Can you tell us about the market pie you are trying to conquer, your competitors and your SWOT analysis for your offerings? What sectors that your team are disrupting now ?
Forwarded from Vincent T
So let move to Q2 : Security, scalability, and data privacy are three aspects that are very important. I would like to know How the team Tokocrypto resolves if there is an unfortunate security problem? Will there be a security fund to protect user assets?
Forwarded from Vincent T
So adding to it,

Q3: What security system does Tokocrypto have to prevent counterfeiting and attempted fraud? What is the security mechanism of Tokocrypto to ensure user assets do not become the target of hackers?
Forwarded from Vincent T
Thank you for your question. Moving on a little bit, yield farming and lending are currently one of the hottest topics among crypto space,

Q4: Do Tokocrypto have financial investment tools such as Lending, Yield farming ? Do you have a plan to develop it? And will the exchange's profits be divided among TKO token holders?
Forwarded from Yildirim β–ͺ️
1st Question by @k_pejuang

What is the ultimate vision that TapSwap is trying to achieve within the cryptocurrencies market? Obviously the whole space will experience huge growth in the upcoming years, but what role would you like TapSwap play in this?
Forwarded from Yildirim β–ͺ️
Question no 2 by @Selva08519571

DeFi is one of the hottest and most sought-after topics in the blockchain space right now. Can you share your opinion on DeFi with us? Do you think DeFi will disrupt the current financial system? What is TapSwap's approach to the DeFi sector?
Forwarded from Yildirim β–ͺ️
Question no 3 by @blackrose11221

I Love STAKING,farming & will always be interested in the Staking where investors get passive income from, so What are the Staking Pool pairs at tapswapdex? What makes your Staking ecosystem more attractive to investors & connoisseurs of the Staking ecosystem like me?
Forwarded from Yildirim β–ͺ️
Question no 4 by @TACHOMARIAKA

What partnerships have been announced so far, and who is still in development? I've always been a huge supporter of TAPSWAP, and I'm happy to see that the project is on the right track and gaining a lot of interest and momentum.
Forwarded from Yildirim β–ͺ️
And now for closing the second part of this AMA Session we have the last question, which has been submitted by @jijaheed

it's easy to make a project but it's really hard to make this valuable? So what's your strategy to make the $TAPS project more valuable and what's your long term plan?
Forwarded from Deleted Account
What is the $TapSwap utility in the ecosystem? Where it will be used and why would the demand for $TapSwap increase? Please tell us about your 2021 roadmap and beyond.
What is the $BUNI utility in the ecosystem? Where it will be used and why would the demand for $BUNI increase? Please tell us about your 2021 roadmap and beyond.
xdefi bundle
What is the $Mensa utility in the ecosystem? Where it will be used and why would the demand for $Mensa increase? Please tell us about your 2021 roadmap and beyond.
Forwarded from Jolly
Question1: Normally, new project will be focus on one chain but Tokenplay builds on both Binance smart chain and Polygon chain. What is your objective for the multi-chain platform? and do you have any plan for the next network to expand other networks like solana, Polkadot?
Forwarded from Jolly
Lets move on question 2:
Tokenplay has just conduct whitelist before play Super Slither game, we received many positive feedback from community on the new version. Maybe users are quite expecting about this game