CyberSecurity & AI Experts – Telegram
CyberSecurity & AI Experts
40.4K subscribers
315 photos
378 files
298 links
🔰 Ethical Hacking and Cyber Security Official Telegram Channel
🔰 Free content to learn Hacking & AI

For promotions: @coderfun
Download Telegram
Here's a List Of 50 Different Cybersecurity Careers

1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
👍187
wifi_hacking_notes.pdf
531.1 KB
WiFi hacking notes 📝
👍112
1. Session Does not expire after password change..
=> login with correct credentials and capture the cookie from response while login. Change password. Now try access to account with captured cookies.

2. Open redirect
=> try multiple endpoint and parameter see if it's forward u to another domain via GET.

3. No rate limit on forgot password
=> send many emails to your mail and flood your inbox via forgot password mail

4. No rate limit on sign up page
=> try to create multiple accounts using intruder.
👍81🤩1
What is Phishing, Vishing and SMShing

Phishing:-
Works by sending fake emails that look real by impersonating trustworthy sources to trick people into sharing sensitive info.

Vishing:-
is when scammers call you on the phone where attackers use voice calls to deceive victims

SMShing:-
targets through text messages, leading users to malicious sites to steal personal information,bank logs ,ccs (like in sms spamming)
👍117
👼 20 Coolest Careers in Cybersecurity 👼

Organizations are hiring individuals with a unique set of skills and capabilities, and seek those who have the abilities and knowledge to fulfill many new job roles in the cybersecurity industry. The coolest careers in cybersecurity are the most in-demand by employers. Full details here.

1. Threat Hunter
2. Red Teamer
3. Digital Forensic Analyst
4. Purple Teamer
5. Malware Analyst
6. Chief Information Security Officer (CISO)
7. Blue Teamer – All- Around Defender
8. Security Architect & Engineer
9. Incident Response Team Member
10. Cyber Security Analyst/ Engineer
11. OSINT Invest/Analyst
12. Technical Director
13. Cloud Analyst
14. Intrusion Detection / (SOC) Analyst
15. SecurityAwareness Officer
16. Vulnerability Researcher & Exploit Developer
17. ApplicationPenTester
18. ICS/OT Security Assessment Consultant
19. DevSecOpsEngineer
20. Media Exploitation Analyst
👍184
How to Apply for Jobs in European Countries or Abroad Without an Agent
👇👇
https://news.1rj.ru/str/europe_russia_jobs/4
👍2
Linux System Administrator Roadmap🐧💻

├── 🔹 Foundations
│ ├── 🔸 Basic Linux Concepts
│ │ ├── 📂 File System Hierarchy
│ │ ├── 🔑 Permissions and Ownership
│ │ ├── 🔄 Processes and Daemons
│ │ └── 🖥️ Basic Commands (ls, cd, cp, mv, rm, etc.)
│ ├── 🔸 Shell and Scripting
│ │ ├── 📝 Bash Scripting
│ │ ├── 🔧 Basic Automation
│ │ └── 🛠️ Common Shell Commands (grep, awk, sed)
│ ├── 🔸 Networking Fundamentals
│ │ ├── 🌐 TCP/IP Stack
│ │ ├── 🌍 DNS Configuration
│ │ ├── 🔌 Network Interfaces
│ │ └── 🛠️ Basic Network Troubleshooting (ping, traceroute, netstat)
│ └── 🔸 System Installation and Configuration
│ ├── 💿 Installation Methods (ISO, PXE)
│ ├── 🗂️ Disk Partitioning and File Systems
│ └── 🔒 Initial Configuration and Hardening
├── 🔹 System Administration
│ ├── 🔸 User and Group Management
│ │ ├── 👤 User Accounts
│ │ ├── 👥 Group Policies
│ │ └── 🔑 sudo Configuration
│ ├── 🔸 Package Management
│ │ ├── 📦 RPM and YUM (RHEL/CentOS)
│ │ ├── 📦 APT (Debian/Ubuntu)
│ │ └── 🔧 Compiling from Source
│ ├── 🔸 Process Management
│ │ ├── 🔄 Systemd and Init
│ │ ├── 👀 Monitoring and Controlling Processes
│ │ └── 🕒 Crontab and Scheduled Tasks
│ ├── 🔸 Filesystem Management
│ │ ├── 🗂️ Mounting and Unmounting File Systems
│ │ ├── 📁 NFS and Samba
│ │ └── 📊 Disk Quotas
│ └── 🔸 Security
│ ├── 🔥 Firewalls (iptables, firewalld)
│ ├── 🛡️ SELinux and AppArmor
│ ├── 🔒 SSH Configuration and Hardening
│ └── 📝 Auditing and Logging
├── 🔹 Networking and Services
│ ├── 🔸 Network Configuration
│ │ ├── 🌐 Static and Dynamic IP Addressing
│ │ ├── 🔌 Network Bonding and Bridging
│ │ └── 📶 VLANs
│ ├── 🔸 Web Services
│ │ ├── 🌐 Apache and Nginx
│ │ ├── 🔐 HTTPS and SSL/TLS
│ │ ├── ↔️ Reverse Proxies
│ │ └── 🛡️ Web Application Firewalls (WAF)
│ ├── 🔸 Database Management
│ │ ├── 💾 MySQL/MariaDB
│ │ ├── 💾 PostgreSQL
│ │ ├── 📂 NoSQL Databases (e.g., MongoDB)
│ │ └── 🔄 Backup and Restore
│ ├── 🔸 Email Services
│ │ ├── ✉️ Postfix and Sendmail
│ │ └── 🚫 Spam Filtering
│ └── 🔸 File and Print Services
│ ├── 📁 Samba
│ ├── 📁 NFS
│ └── 🖨️ CUPS
├── 🔹 Advanced Administration
│ ├── 🔸 Virtualization
│ │ ├── 💻 KVM and QEMU
│ │ ├── 📦 VirtualBox
│ │ └── 🔧 Libvirt
│ ├── 🔸 Containerization
│ │ ├── 🐳 Docker
│ │ ├── ☸️ Kubernetes
│ │ └── 🔧 Podman
│ ├── 🔸 Cloud Computing
│ │ ├── ☁️ AWS
│ │ ├── ☁️ Azure
│ │ ├── ☁️ OpenStack
│ │ └── ☁️ GCP (Google Cloud Platform)
│ ├── 🔸 Configuration Management
│ │ ├── 🤖 Ansible
│ │ ├── 🎭 Puppet
│ │ ├── 🍴 Chef
│ │ └── 🧂 SaltStack
│ └── 🔸 High Availability
│ ├── 🔗 Clustering (Pacemaker, Corosync)
│ ├── ⚖️ Load Balancing (HAProxy, Nginx)
│ └── 🔄 Backup and Disaster Recovery
├── 🔹 Monitoring and Performance
│ ├── 🔸 System Monitoring
│ │ ├── 🔧 Tools (Nagios, Zabbix, Prometheus, Grafana)
│ │ └── 📝 Log Management (ELK Stack, Graylog)
│ ├── 🔸 Performance Tuning
│ │ ├── 🧠 CPU and Memory Optimization
│ │ ├── 💾 Disk I/O Performance
│ │ └── 🌐 Network Performance
│ └── 🔸 Troubleshooting
│ ├── 📝 Log Analysis
│ ├── 🔍 Common Issues and Solutions
│ ├── 🚧 Performance Bottlenecks
│ └── 🔧 Kernel Tuning
├── 🔹 Scripting and Automation
│ ├── 🔸 Advanced Scripting
│ │ ├── 📜 Shell Scripting (Advanced)
│ │ ├── 🐍 Python Scripting
│ │ └── 🤖 Task Automation
│ └── 🔸 Infrastructure as Code (IaC)
│ ├── 🌍 Terraform
│ ├── ☁️ CloudFormation
│ └── 🔄 CI/CD Pipelines (Jenkins, GitLab CI)
└── 🔹 Security and Compliance
├── 🔸 Security Best Practices
│ ├── 🔒 System Hardening
│ └──🔄 Regular Updates and Patching
└── 🔍 Security Auditing Tools (e.g., Lynis, OpenVAS)
👍124🎉1
This media is not supported in your browser
VIEW IN TELEGRAM
Google is testing desktop mode for Android tablets that will let you freely resize and arrange apps on the screen as you like, just like on a PC

Currently, apps on Android tablets open in full-screen mode by default. When the new mode is enabled, each app will appear in a window with controls that let you reposition it, maximize it, or close the app.
👏4👍21
Google AI Model Faces EU Data Privacy Investigation

Ireland’s Data Protection Commission (DPC) is examining whether the tech giant performed a legally required data protection impact assessment.

The organization is examining whether this action was done before processing European Union residents’ personal data.

Such details were used in its Pathways Language Model 2, according to a press release which was published on Thursday 12th of September.

A Google spokesman provided this statement:

“We take seriously our obligations under the GDPR and will work constructively with the DPC to answer their questions.”
👍4
🔥 Top AI News from The Rundown

* Lionsgate partners with Runway for GenAI film creation.
* YouTube launches AI-powered creation tools like text-to-video.
* Microsoft's Copilot gets faster with GPT-4 integration.
* Google's NotebookLM turns your notes into podcasts with Audio Overviews.
* OpenAI's 'Strawberry' model, with advanced reasoning, is coming soon to ChatGPT.

Stay ahead of the AI curve with The Rundown!
👍111
HOW TO CREATE A STRONG PASSWORD

Password crackers can decipher passwords in a matter of days or hours, depending on how weak or strong the password is. To make a password stronger and more difficult to uncover, a plaintext password should adhere to the following rules:

- Be at least 12 characters long : The shorter a password is, the easier and faster it will be cracked.

- Combine letters and a variety of characters :  Using numbers and special characters, such as periods and commas, increases the number of possible combinations.

- Avoid reusing a password : If a password is cracked, then a person with malicious intent could use that same password to easily access other password-protected accounts the victim owns.

- Pay attention to password strength indicators : Some password-protected systems include a password strength meter, which is a scale that tells users when they have created a strong password.

- Avoid easy-to-guess phrases and common passwords : Weak passwords can be a name, a pet's name or a birthdate -- something personally identifiable. Short and easily predictable patterns, like 123456, password or qwerty, also are weak passwords.

- Use encryption : Passwords stored in a database should be encrypted.

- Take advantage of password creation tools and managers : Some smartphones will automatically create long, hard-to-guess passwords. For example, Apple iPhones will create strong website passwords for users. An iPhone stores the passwords in its password manager, iCloud Keychain and automatically fills the password into the correct field so the user doesn't have to remember the complicated password.
👍81
Hiding a number in iPhone

Few people know, but the iPhone supports the function of hiding the number without installing additional programs.

To enable number hiding you need to go to "Settings", and go to "Phone". There you will find the function "Show number". After turning off this item you can call without displaying your phone number to the interlocutor.

It is worth noting that some operators have a paid feature "Caller ID". If it is connected at interlocutor, then your number will be displayed, but there is a solution for this situation, and it is a paid function of the operator "Anti Caller ID".

With this function, you can call a person whose number you are in the black list, but for the operator, as well as for the police to determine your number is not difficult, so we can conclude that the anonymity of this function is given only in relation to the interlocutor.
3👍2
Top 50 Digital Forensics Tools

Network Forensic Tools
- Nmap
- Wireshark
- Xplico
- Snort
- TCPDump
- The Slueth Kit

Mobile Forensics Tools
- Elcomspoft iOS Forensic Toolkit
- Mobile Verification Toolkit
- Oxygen Forensic
- MOBILedit
- Cellebrite UFED
- MSAB XRY

Malware Analysis Tools
- Wireshark
- YARA
- Malwarebytes
- VirusTotal
- Cuckoo Sandbox
- IDA Pro

Data Recovery Tools
- Recuva
- EaseUS Data Recovery
- TestDisk
- Stellar Data Recovery
- PhotoRec
- Disk Drill

Email Forensic Tools
- MailXaminer
- MailPro+
- Xtraxtor
- Aid4Mail
- eMailTrackerPro
- Autopsy

OSINT Tools
- Maltego
- Nmap
- OSINT Framework
- Shodan
- Recon-ng
- TheHavester

Live Forensics Tools
- OS Forensics
- Encase Live
- CAINE
- F-Response
- Kali Linux Forensic Mode

Memory Forensics Tools
- Volatility
- DumpIt
- memDump
- Access data FTK Imager
- Hibernation Recon
- WindowSCOPE

Cloud Forensic Tools
- Magnet AXIOM
- MSAB XRY Cloud
- Azure CLI

➡️ Give Reactions 🤟
🤩137👍7
🖥️ How to increase virtual RAM to make your computer system fast

1. Right-click on "My Computer", then select "Properties"

2. Click on the 'Advanced' tab

3. Under 'Performance', click on 'Settings'.

4. Then click on the "Advanced" tab on the button that appears

5. Under "Virtual Memory" at the bottom, click on "Edit".

6. Click on the 'Custom Size' button

7. For the initial size (depending on your HD space), you can type in 1000-1500 (although I use 4000), and for the maximum size you can type in 2000-2500 (although I use 6000)

8. Click on "Set", then exit all windows

9. Finally, restart your computer

10. You now have a faster computer and 1-6 GB (as specified by you in step 7) of virtual RAM.

Enjoy 🤟
5👍3
Don't overwhelm to learn Git,🙌

Git is only this much👇😇


1.Core:
• git init
• git clone
• git add
• git commit
• git status
• git diff
• git checkout
• git reset
• git log
• git show
• git tag
• git push
• git pull

2.Branching:
• git branch
• git checkout -b
• git merge
• git rebase
• git branch --set-upstream-to
• git branch --unset-upstream
• git cherry-pick

3.Merging:
• git merge
• git rebase

4.Stashing:
• git stash
• git stash pop
• git stash list
• git stash apply
• git stash drop

5.Remotes:
• git remote
• git remote add
• git remote remove
• git fetch
• git pull
• git push
• git clone --mirror

6.Configuration:
• git config
• git global config
• git reset config

7. Plumbing:
• git cat-file
• git checkout-index
• git commit-tree
• git diff-tree
• git for-each-ref
• git hash-object
• git ls-files
• git ls-remote
• git merge-tree
• git read-tree
• git rev-parse
• git show-branch
• git show-ref
• git symbolic-ref
• git tag --list
• git update-ref

8.Porcelain:
• git blame
• git bisect
• git checkout
• git commit
• git diff
• git fetch
• git grep
• git log
• git merge
• git push
• git rebase
• git reset
• git show
• git tag

9.Alias:
• git config --global alias.<alias> <command>

10.Hook:
• git config --local core.hooksPath <path>

Best Telegram channels to get free coding & data science resources
https://news.1rj.ru/str/addlist/4q2PYC0pH_VjZDk5


Free Courses with Certificate:
https://news.1rj.ru/str/free4unow_backup
👍16
🔅 Cybersecurity Attack Vectors
👍9
Many people reached out to me saying telegram may get banned in their countries. So I've decided to create WhatsApp channels based on your interests 👇👇

Free Courses with Certificate: https://whatsapp.com/channel/0029Vamhzk5JENy1Zg9KmO2g

Data Analysts: https://whatsapp.com/channel/0029VaGgzAk72WTmQFERKh02

MS Excel: https://whatsapp.com/channel/0029VaifY548qIzv0u1AHz3i

Jobs & Internship Opportunities:
https://whatsapp.com/channel/0029VaI5CV93AzNUiZ5Tt226

Web Development: https://whatsapp.com/channel/0029VaiSdWu4NVis9yNEE72z

Python Free Books & Projects: https://whatsapp.com/channel/0029VaiM08SDuMRaGKd9Wv0L

Java Resources: https://whatsapp.com/channel/0029VamdH5mHAdNMHMSBwg1s

Coding Interviews: https://whatsapp.com/channel/0029VammZijATRSlLxywEC3X

SQL: https://whatsapp.com/channel/0029VanC5rODzgT6TiTGoa1v

Power BI: https://whatsapp.com/channel/0029Vai1xKf1dAvuk6s1v22c

Programming Free Resources: https://whatsapp.com/channel/0029VahiFZQ4o7qN54LTzB17

Data Science Projects: https://whatsapp.com/channel/0029Va4QUHa6rsQjhITHK82y

Learn Data Science & Machine Learning: https://whatsapp.com/channel/0029Va8v3eo1NCrQfGMseL2D

Improve your communication skills: https://whatsapp.com/channel/0029VaiaucV4NVik7Fx6HN2n

Learn Ethical Hacking and Cybersecurity: https://whatsapp.com/channel/0029VancSnGG8l5KQYOOyL1T

Don’t worry Guys your contact number will stay hidden!

ENJOY LEARNING 👍👍
👍52
How to Beat Social Media Algorithms

Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.❗️Don’t make their data harvesting easier —skirt the algorithms whenever you can.

Don’t confirm the algorithm’s assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.

Eliminate suggested feeds when possible. Change your feeds to sort chronologically ➡️ don’t train the platform’s algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but it’s coming. TikTok - watch content from the “Following” (would show you videos only from accounts you follow).

Use platforms without your account when possible (YouTube, Reddit).

Use a burner account, with none of your real info.

#security
👍42
How to Get Started With Cybersecurity

Cybersecurity is a vital field that involves protecting individuals and their data on the internet. To start a career in cybersecurity, one must understand basic concepts, research various career paths, choose a specialized field, gain practical knowledge, and network within the community. The post provides a step-by-step guide to becoming a cybersecurity professional, including resources and additional tips to enhance learning and career progression.


🔗 https://www.freecodecamp.org/news/getting-started-in-cybersecurity
👍3
6👏2👍1
🐧 Kali Linux Cheat Sheet

1. Basic Commands:
- pwd: print working directory
- ls: list directory contents
- cd: change directory
- mkdir: creates a directory
- mv: moves a file
- cp: copies a file
- rm: removes a file
- cat: view contents of a file
- pirohackz: subscribe our telegram
- less: view contents of a file one page at a time
- more: view contents of a file one page at a time
- grep: search for text within files
- find: search for files
- chmod: change file/directory permissions
- man: view help/manual page for a command

2. Network and Security:
- ping: send ICMP echo request to host
- traceroute: show path of network hops
- pirohackz: subscribe our telegram
- netstat: show routing table and active connections
- nmap: Network Mapper (scanner)
- ifconfig: view/modify network interfaces
- tcpdump: capture network traffic
- wireshark: graphical network traffic analyzer
- arp: view arp table
- SSH: secure remote login
- WEP/WPA: wireless encryption protocols
- iptables: configure Linux firewall
- nessus: vulnerability scanner

3. System Administration:
- df: shows free/used disk space
- free: shows free/used system memory
- top: show running processes
- ps: show running processes
- uname: show system information
- uptime: show system uptime
- init: manage system run levels
- chown: change file/directory ownerships
- crontab: manage cron jobs
- pirohackz: subscribe our telegram
- useradd: add new user
- userdel: delete user
- groupadd: add new group
- groupdel: delete group

➡️ Give 100+ Reactions 🙌
👍3320