CyberSecurity & AI Experts – Telegram
CyberSecurity & AI Experts
40.4K subscribers
313 photos
378 files
296 links
🔰 Ethical Hacking and Cyber Security Official Telegram Channel
🔰 Free content to learn Hacking & AI

For promotions: @coderfun
Download Telegram
🔴 Password cracking techniques

💠There are a number of techniques that can be used to crack passwords. We will learn about the most commonly used ones below;
🔹 Dictionary attack – This method involves the use of a wordlist to compare against user passwords.
🔹 Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.
🔹 Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
🔹 Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
🔹 Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
👍51
Cyber Security Risks In 2022
👍2
Finding the Wi-Fi password.

In Windows, go to the "Network and Sharing Center" menu. Right-click the Wi-Fi network connection icon → "Wireless Network Properties". Click on the "Show Characters" field to show the Wi-Fi network password.

In macOS, all passwords are stored in the Keychain app. Use Spotlight to find "Keychain Access. Open the app and find the Wi-Fi network name in the list of saved credentials. Double-click it, and then click in the field to see the password (this will require entering the OS password).
👍4
❇️ How to Block Ads on Android Using Private DNS


🔹Step 1: First, open your Android app drawer and tap on Settings.

🔹Step 2: Under the Settings tab, you must select Network & Internet or Wireless & Networks.

🔹Step 3: Under the Network & Internet Settings, select Private DNS.

🔹Step 4: Now, you need to select the option Configure Private DNS.

🔹Step 5: Under the hostname, type in 'dns.adguard.com'

🔹Step 6: Save the settings and open the Google Chrome browser.

🔹Step 7: On the URL bar, enter "Chrome://flags" and hit Enter.

🔹Step 8: Now search for ‘DNS’ and disable the Async DNS option.

🔹Step 9: Now enter "chrome://net-internals" in the URL bar and hit enter.

🔹Step 10: Select the DNS tab and tap on the Clear Cache option.

That’s it! You are done! Now restart your chrome browser to apply the changes. This won't block all ads but most of the ads will be blocked.

Keep supporting us ❤️,
👍5
Change the way you learn Linux through these 5 websites!

🚨Linux Handbook
🚨Linux Journey
🚨It's FOSS
🚨Linuxize
🚨FOSS Linux
👍41
Hands On Hacking.pdf
12.2 MB
Hands on Hacking
Matthew Hickey, 2020
👍2
🌀ᴀs ᴀɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ, ʏᴏᴜ ᴡɪʟʟ ɴᴇᴇᴅ ᴛᴏ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴠᴀʀɪᴏᴜs ʜᴀᴄᴋɪɴɢ ᴛᴇᴄʜɴɪϙᴜᴇs sᴜᴄʜ ᴀs −

▫️ᴘᴀssᴡᴏʀᴅ ɢᴜᴇssɪɴɢ ᴀɴᴅ ᴄʀᴀᴄᴋɪɴɢ

▫️sᴇssɪᴏɴ ʜɪᴊᴀᴄᴋɪɴɢ

▫️sᴇssɪᴏɴ sᴘᴏᴏғɪɴɢ

▫️ɴᴇᴛᴡᴏʀᴋ ᴛʀᴀғғɪᴄ sɴɪғғɪɴɢ

▫️ᴅᴇɴɪᴀʟ ᴏғ sᴇʀᴠɪᴄᴇ ᴀᴛᴛᴀᴄᴋs

▫️ᴇxᴘʟᴏɪᴛɪɴɢ ʙᴜғғᴇʀ ᴏᴠᴇʀғʟᴏᴡ ᴠᴜʟɴᴇʀᴀʙɪʟɪᴛɪᴇs

▫️sϙʟ ɪɴᴊᴇᴄᴛɪᴏɴ

🧾 ɪɴ ᴛʜɪs ᴄʜᴀᴘᴛᴇʀ, ᴡᴇ ᴡɪʟʟ ᴅɪsᴄᴜss sᴏᴍᴇ ᴏғ ᴛʜᴇ sᴋɪʟʟs ᴛʜᴀᴛ ʏᴏᴜ ᴡᴏᴜʟᴅ ʀᴇϙᴜɪʀᴇ ᴛᴏ ʙᴇᴄᴏᴍᴇ ᴀɴ ᴇxᴘᴇʀᴛ ɪɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋɪɴɢ.

🎊 ʙᴀsɪᴄ sᴋɪʟʟs 🎊

🌀ᴄᴏᴍᴘᴜᴛᴇʀ ʜᴀᴄᴋɪɴɢ ɪs ᴀ sᴄɪᴇɴᴄᴇ ᴀs ᴡᴇʟʟ ᴀs ᴀɴ ᴀʀᴛ. ʟɪᴋᴇ ᴀɴʏ ᴏᴛʜᴇʀ ᴇxᴘᴇʀᴛɪsᴇ, ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ᴘᴜᴛ ᴀ ʟᴏᴛ ᴏғ ᴇғғᴏʀᴛ ɪɴ ᴏʀᴅᴇʀ ᴛᴏ ᴀᴄϙᴜɪʀᴇ ᴋɴᴏᴡʟᴇᴅɢᴇ ᴀɴᴅ ʙᴇᴄᴏᴍᴇ ᴀɴ ᴇxᴘᴇʀᴛ ʜᴀᴄᴋᴇʀ. ᴏɴᴄᴇ ʏᴏᴜ ᴀʀᴇ ᴏɴ ᴛʜᴇ ᴛʀᴀᴄᴋ, ʏᴏᴜ ᴡᴏᴜʟᴅ ɴᴇᴇᴅ ᴍᴏʀᴇ ᴇғғᴏʀᴛ ᴛᴏ ᴋᴇᴇᴘ ᴜᴘ-ᴛᴏ-ᴅᴀᴛᴇ ᴡɪᴛʜ ʟᴀᴛᴇsᴛ ᴛᴇᴄʜɴᴏʟᴏɢɪᴇs, ɴᴇᴡ ᴠᴜʟɴᴇʀᴀʙɪʟɪᴛɪᴇs ᴀɴᴅ ᴇxᴘʟᴏɪᴛᴀᴛɪᴏɴ ᴛᴇᴄʜɴɪϙᴜᴇs.

🌀ᴀɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ ᴍᴜsᴛ ʙᴇ ᴀ ᴄᴏᴍᴘᴜᴛᴇʀ sʏsᴛᴇᴍs ᴇxᴘᴇʀᴛ ᴀɴᴅ ɴᴇᴇᴅs ᴛᴏ ʜᴀᴠᴇ ᴠᴇʀʏ sᴛʀᴏɴɢ ᴘʀᴏɢʀᴀᴍᴍɪɴɢ ᴀɴᴅ ᴄᴏᴍᴘᴜᴛᴇʀ ɴᴇᴛᴡᴏʀᴋɪɴɢ sᴋɪʟʟs.

🌀ᴀɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ ɴᴇᴇᴅs ᴛᴏ ʜᴀᴠᴇ ᴀ ʟᴏᴛ ᴏғ ᴘᴀᴛɪᴇɴᴄᴇ, ᴘᴇʀsɪsᴛᴇɴᴄᴇ, ᴀɴᴅ ᴘᴇʀsᴇᴠᴇʀᴀɴᴄᴇ ᴛᴏ ᴛʀʏ ᴀɢᴀɪɴ ᴀɴᴅ ᴀɢᴀɪɴ ᴀɴᴅ ᴡᴀɪᴛ ғᴏʀ ᴛʜᴇ ʀᴇϙᴜɪʀᴇᴅ ʀᴇsᴜʟᴛ.

🌀ᴀᴅᴅɪᴛɪᴏɴᴀʟʟʏ, ᴀɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ sʜᴏᴜʟᴅ ʙᴇ sᴍᴀʀᴛ ᴇɴᴏᴜɢʜ ᴛᴏ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴛʜᴇ sɪᴛᴜᴀᴛɪᴏɴ ᴀɴᴅ ᴏᴛʜᴇʀ ᴜsᴇʀs’ ᴍɪɴᴅ-sᴇᴛ ɪɴ ᴏʀᴅᴇʀ ᴛᴏ ᴀᴘᴘʟʏ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴇxᴘʟᴏɪᴛs. ᴀ ɢᴏᴏᴅ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ ʜᴀs ɢʀᴇᴀᴛ ᴘʀᴏʙʟᴇᴍ-sᴏʟᴠɪɴɢ sᴋɪʟʟs ᴛᴏᴏ.

🧾 ᴄᴏᴜʀsᴇs & ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴs 🧾

🌀ᴛʜɪs ᴛᴜᴛᴏʀɪᴀʟ ᴘʀᴏᴠɪᴅᴇs ᴛʜᴇ ʙᴀsɪᴄ ɢᴜɪᴅᴇʟɪɴᴇs ᴛᴏ ʙᴇᴄᴏᴍᴇ ᴀ sᴜᴄᴄᴇssғᴜʟ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ. ɪғ ʏᴏᴜ ᴡᴀɴᴛ ᴛᴏ ᴇxᴄᴇʟ ɪɴ ᴛʜɪs ғɪᴇʟᴅ, ᴛʜᴇɴ ʏᴏᴜ ᴍɪɢʜᴛ ᴄʜᴏᴏsᴇ ᴛᴏ ᴘᴜʀsᴜᴇ ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ᴄᴏᴜʀsᴇs ᴀɴᴅ ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴs −

🌀ᴏʙᴛᴀɪɴ ᴀ ʙᴀᴄʜᴇʟᴏʀ’s ᴅᴇɢʀᴇᴇ ɪɴ ᴄᴏᴍᴘᴜᴛᴇʀ sᴄɪᴇɴᴄᴇ ᴏʀ ᴀ+ ᴄᴇʀᴛɪғɪᴄᴀᴛᴇ ᴛᴏ ɢᴀɪɴ ᴀɴ ᴜɴᴅᴇʀsᴛᴀɴᴅɪɴɢ ᴏғ ᴛʜᴇ ᴍᴏsᴛ ᴄᴏᴍᴍᴏɴ ʜᴀʀᴅᴡᴀʀᴇ ᴀɴᴅ sᴏғᴛᴡᴀʀᴇ ᴛᴇᴄʜɴᴏʟᴏɢɪᴇs.

🌀ɢᴇᴛ ɪɴᴛᴏ ᴀ ᴘʀᴏɢʀᴀᴍᴍᴇʀ’s ʀᴏʟᴇ ғᴏʀ ᴀ ғᴇᴡ ʏᴇᴀʀs ᴀɴᴅ ᴛʜᴇɴ sᴡɪᴛᴄʜ ᴛᴏ ɢᴇᴛ ᴀ ᴛᴇᴄʜ sᴜᴘᴘᴏʀᴛ ᴘᴏsɪᴛɪᴏɴ.

🌀ᴘʀᴏᴄᴇᴇᴅ ᴛᴏ ɢᴇᴛ ɴᴇᴛᴡᴏʀᴋ ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴs ʟɪᴋᴇ ɴᴇᴛᴡᴏʀᴋ+ ᴏʀ ᴄᴄɴᴀ ᴀɴᴅ ᴛʜᴇɴ sᴇᴄᴜʀɪᴛʏ ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴs ʟɪᴋᴇ sᴇᴄᴜʀɪᴛʏ+, ᴄɪssᴘ, ᴏʀ ᴛɪᴄsᴀ.

🌀ɪᴛ ɪs ʀᴇᴄᴏᴍᴍᴇɴᴅᴇᴅ ᴛʜᴀᴛ ʏᴏᴜ ɢᴇᴛ sᴏᴍᴇ ᴡᴏʀᴋ ᴇxᴘᴇʀɪᴇɴᴄᴇ ᴀs ᴀ ɴᴇᴛᴡᴏʀᴋ ᴇɴɢɪɴᴇᴇʀ ᴀɴᴅ sʏsᴛᴇᴍ ᴀᴅᴍɪɴɪsᴛʀᴀᴛᴏʀ ᴛᴏ ᴜɴᴅᴇʀsᴛᴀɴᴅ ɴᴇᴛᴡᴏʀᴋs ᴀɴᴅ sʏsᴛᴇᴍs ɪɴsɪᴅᴇ ᴏᴜᴛ.

🌀ᴋᴇᴇᴘ ɢᴏɪɴɢ ᴛʜʀᴏᴜɢʜ ᴠᴀʀɪᴏᴜs ʙᴏᴏᴋs, ᴛᴜᴛᴏʀɪᴀʟs ᴀɴᴅ ᴘᴀᴘᴇʀs ᴛᴏ ᴜɴᴅᴇʀsᴛᴀɴᴅ ᴠᴀʀɪᴏᴜs ᴄᴏᴍᴘᴜᴛᴇʀ sᴇᴄᴜʀɪᴛʏ ᴀsᴘᴇᴄᴛs ᴀɴᴅ ᴛᴀᴋᴇ ᴛʜᴇᴍ ᴀs ᴀ ᴄʜᴀʟʟᴇɴɢᴇ ᴛᴏ sᴇᴄᴜʀᴇ ʏᴏᴜʀ ɴᴇᴛᴡᴏʀᴋ ᴀɴᴅ ᴄᴏᴍᴘᴜᴛᴇʀ sʏsᴛᴇᴍs ᴀs ɴᴇᴛᴡᴏʀᴋ sᴇᴄᴜʀɪᴛʏ ᴇɴɢɪɴᴇᴇʀ.

🌀sᴛᴜᴅʏ ᴄᴏᴜʀsᴇs ᴡʜɪᴄʜ ᴄᴏᴠᴇʀ ᴄʀᴇᴀᴛɪɴɢ ᴛʀᴏᴊᴀɴ ʜᴏʀsᴇs, ʙᴀᴄᴋᴅᴏᴏʀs, ᴠɪʀᴜsᴇs, ᴀɴᴅ ᴡᴏʀᴍs, ᴅᴇɴɪᴀʟ ᴏғ sᴇʀᴠɪᴄᴇ (ᴅᴏs) ᴀᴛᴛᴀᴄᴋs, sϙʟ ɪɴᴊᴇᴄᴛɪᴏɴ, ʙᴜғғᴇʀ ᴏᴠᴇʀғʟᴏᴡ, sᴇssɪᴏɴ ʜɪᴊᴀᴄᴋɪɴɢ, ᴀɴᴅ sʏsᴛᴇᴍ ʜᴀᴄᴋɪɴɢ.

🌀ᴍᴀsᴛᴇʀ ᴛʜᴇ ᴀʀᴛ ᴏғ ᴘᴇɴᴇᴛʀᴀᴛɪᴏɴ ᴛᴇsᴛɪɴɢ, ғᴏᴏᴛᴘʀɪɴᴛɪɴɢ ᴀɴᴅ ʀᴇᴄᴏɴɴᴀɪssᴀɴᴄᴇ, ᴀɴᴅ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ.

🌀ғɪɴᴀʟʟʏ ɢᴏ ғᴏʀ ᴀ ᴄᴇʀᴛɪғɪᴇᴅ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ (ᴄᴇʜ) ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴ.

🌀ɢɪᴀᴄ (ɢʟᴏʙᴀʟ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴀssᴜʀᴀɴᴄᴇ ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴ) ᴀɴᴅ ᴏғғᴇɴsɪᴠᴇ sᴇᴄᴜʀɪᴛʏ ᴄᴇʀᴛɪғɪᴇᴅ ᴘʀᴏғᴇssɪᴏɴᴀʟ (ᴏsᴄᴘ) ᴀʀᴇ ᴀᴅᴅɪᴛɪᴏɴᴀʟ ɪᴛ sᴇᴄᴜʀɪᴛʏ ᴄᴇʀᴛɪғɪᴄᴀᴛɪᴏɴs ᴡʜɪᴄʜ ᴡɪʟʟ ᴀᴅᴅ ᴀ ʟᴏᴛ ᴏғ ᴠᴀʟᴜᴇ ᴛᴏ ʏᴏᴜʀ ᴘʀᴏғɪʟᴇ.

ғɪɴᴀʟ ɴᴏᴛᴇ

🌀ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ sᴛᴀʏ ᴀs ᴀ ᴡʜɪᴛᴇ ʜᴀᴛ ʜᴀᴄᴋᴇʀ ᴡʜɪᴄʜ ᴍᴇᴀɴs ʏᴏᴜ ɴᴇᴇᴅ ᴛᴏ ᴡᴏʀᴋ ᴡɪᴛʜɪɴ ɢɪᴠᴇɴ ʙᴏᴜɴᴅᴀʀɪᴇs. ɴᴇᴠᴇʀ ɪɴᴛʀᴜᴅᴇ ᴏʀ ᴀᴛᴛᴀᴄᴋ ᴀɴʏ ᴄᴏᴍᴘᴜᴛᴇʀ ᴏʀ ɴᴇᴛᴡᴏʀᴋ ᴡɪᴛʜᴏᴜᴛ ᴀ ʀᴇϙᴜɪʀᴇᴅ ᴘᴇʀᴍɪssɪᴏɴ ғʀᴏᴍ ᴛʜᴇ ᴀᴜᴛʜᴏʀɪᴛɪᴇs.

🌀ᴀs ᴀ ғɪɴᴀʟ ɴᴏᴛᴇ, ɪᴛ ɪs ʜɪɢʜʟʏ ʀᴇᴄᴏᴍᴍᴇɴᴅᴇᴅ ᴛʜᴀᴛ ʏᴏᴜ ʀᴇғʀᴀɪɴ ғʀᴏᴍ ᴇɴɢᴀɢɪɴɢ ʏᴏᴜʀsᴇʟғ ɪɴ ʙʟᴀᴄᴋ ʜᴀᴛ ʜᴀᴄᴋɪɴɢ ᴡʜɪᴄʜ ᴍᴀʏ sᴘᴏɪʟ ʏᴏᴜʀ ᴇɴᴛɪʀᴇ ᴄᴀʀᴇᴇʀ.
👍5
♨️ How to Recover Deleted Photos/Videos From Android♨️


To recover deleted photos from Android, one needs to use photo recovery apps. So, let’s check out the detailed guide on how to recover any photos or videos from an Android smartphone in 2020.

🛑 Steps to Recover Deleted Photos From Android

🔹 Step 1: First of all, you need to download and install software Wondershare Dr. Fone. Now install this software on your computer. After that enable USB debugging on your Android.

🔹 Step 2: Now connect your Android device to your computer with your USB Cable. Please make sure that your mobile should be charged up to 30%. Make sure you have enabled USB debugging in your smartphone.

❗️Note : Now it will ask you to analyze and scan your device. You simply need to click “Next” to perform the scan, it will ask you for your permission on your connected phone simply allow all permissions.

🔹 Step 3: Now you will be asked to select your preferred file type to scan. So if you want to scan for your images/Videos simply select Gallery and click “Next”

🔹 Step 4: Now you will be given the two options, one is to scan for deleted files and the other one is for scanning all files. You need to select the option of “Scan for deleted files”. You can perform the scan in two modes Standard and Advanced. Advanced mode is for those who need to scan deeply.

🔹 Step 5: Once the scan is completed, you will have the complete preview over your deleted pictures/videos, you can recover each and every one of them simply click on “Recover” to get all those deleted files.

Thats it ! You're Done. I hope you will find it useful.

Share and support us❤️
👍42🔥2