NSEs – Telegram
NSEs
1.14K subscribers
109 photos
15 videos
58 files
178 links
Where Network meets Red Team 🎯
If you're into PenTesting, Hacking, and Cyber Shenanigans — you're home!
🧠 Learn • 🚀 Hack • 🧩 Quiz • 📚 Books • 😁 Memes
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
👍7
This media is not supported in your browser
VIEW IN TELEGRAM
👍8
This media is not supported in your browser
VIEW IN TELEGRAM
💯8
Forwarded from Code Review
اگر میخواین به Bug Bounty به عنوان یک کار تمام وقت نگاه کنین ، حتما این راهنمای فوق‌العاده‌ی Rhynorater رو بخونین.
دوتا نسخه اینجا هست که یکیش انگلیسی و اصلی هست و برای سادگی کار یه نسخه فارسی هم ترجمه کردم.
🔥12
This media is not supported in your browser
VIEW IN TELEGRAM
8
Forwarded from GO-TO CVE
🌙 شب‌های آموزشی باگ بانتی – فقط توی دیسکورد GoToCve!

🕚 هر شب از ساعت ۱۱ شب تا ۱ بامداد، همراه ما باش تو دیسکورد!

📚مباحث مختلف رو با هم پیش میریم و مهم تر از همه :

با هم می‌ریم سراغ مطالب کاربردی و مهم از OWASP Cheat Sheet Series

🧠 می‌خونیم، توضیح می‌دیم، تست می‌کنیم!

چی یاد می‌گیری؟
🔐 مباحث امنیت
🕵️‍♂️ تست نفوذ
🛠️ راهکارهای عملی

و هر چیزی که یه باگ‌بانتر واقعی باید بدونه!

کِی؟
هر شب (به جز جمعه و شنبه) – از ساعت ۱۱ تا ۱

🌐 کجا؟
توی دیسکورد گروه باگ‌بانتی:
👉 https://discord.gg/9pcB5TD9

💬 توی تلگرام هم عضو باش رفیق!
👉 https://news.1rj.ru/str/gotocvejustchat


ویژه:
📝 یه تاپیک مخصوص خلاصه‌ها و نکات هر جلسه داریم
به‌روز بمون، یاد بگیر، و با بقیه حرفه‌ای‌ها شبکه بساز!

منتظرتیم!
🚀
This media is not supported in your browser
VIEW IN TELEGRAM
🐳5
#FUN😁

CHANNEL  
GROUP
DISCORD
🤣10👍1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 EVIL TWIN ATTACK — FULL BREAKDOWN FOR BEGINNERS
🎓 Learn how fake Wi-Fi networks can silently steal your data


🔹 01 — WHAT IS AN EVIL TWIN ATTACK?

An Evil Twin Attack is a cyber attack where a hacker creates a fake Wi-Fi hotspot that mimics a legitimate one (like at a café, airport, or library).

Once a victim connects, the attacker can:

Monitor all online activity

Intercept sensitive data (passwords, messages, banking info)

Redirect to fake login pages (phishing)

🧠 It’s like putting on a disguise and listening to someone’s private conversation.


🔹 02 — HOW DOES IT WORK STEP-BY-STEP?

👤 Hacker sets up a Rogue Access Point

📶 Names it just like a real Wi-Fi (e.g., “Airport_Free_WiFi”)

📲 Victim connects without knowing

🕵️‍♂️ Hacker captures everything using packet sniffers or man-in-the-middle (MITM) tools

🔁 Hacker may redirect user to a fake website asking for login credentials

📌 It’s not just about spying — some Evil Twin attacks actively trick you into typing your credentials into fake websites.


🔹 03 — REAL-LIFE EXAMPLE

You're at Starbucks. You see two networks:

Starbucks_WiFi

Starbucks_WiFi_Free

You choose the second one. It connects, seems fine…
But it’s the hacker’s network.
They now have access to:

Your Instagram password
Your Gmail session
Possibly your bank login (if you don’t use HTTPS or a VPN)

📎 This happens fast and silently. You may never even know.



🔹 04 — TOOLS HACKERS USE

🔧 Here are tools used in real Evil Twin Attacks:

Airbase-ng: Creates fake APs

Fluxion: Combines Evil Twin + phishing attacks

Wireshark: Sniffs traffic and captures packets

Karma Attack: Auto-responds to devices looking for known networks

Bettercap: Powerful MITM tool that can hijack sessions

⚠️ These tools are open-source — free and legal to download. That’s why awareness is critical.


🔹 05 — WARNING SIGNS OF A FAKE WI-FI

Be suspicious if:

🚩 You see multiple networks with the same or similar name
🚩 The Wi-Fi asks for login before connecting to the internet
🚩 Internet works slowly or randomly disconnects
🚩 You get a browser warning about invalid certificates
🚩 You’re redirected to a weird-looking login page

🔍 If the network asks you to “log in” before browsing, be extra cautious — especially if it’s a public place.


🔹 06 — HOW TO PROTECT YOURSELF

Never access banking or personal accounts on public Wi-Fi
Use a VPN to encrypt your traffic
Turn off auto-connect to open networks
Use HTTPS Everywhere (browser extension)
Ask the staff for the official Wi-Fi name
Use 2FA — even if they get your password, they can’t log in
On phone? Use mobile data for sensitive actions

💡 Bonus Tip: On Android, disable “Wi-Fi scanning” in location settings to stop devices from auto-broadcasting known networks.


🔹 07 — DISCLAIMER

⚠️ This guide is for educational purposes only.
We do not support or promote illegal hacking.

Our goal is to raise cyber awareness and help build a safer internet


CHANNEL  
GROUP
DISCORD
👏111
This media is not supported in your browser
VIEW IN TELEGRAM
🔥8
📖 Metasploit 2nd Edition:The Penetration Tester’s Guide

CHANNEL  
GROUP
DISCORD
7
This media is not supported in your browser
VIEW IN TELEGRAM
🕊4
🕶 "Knock knock..."

Who's there?


🔐 What Is Port Knocking?

A Simple and Friendly Guide to Stealthy Network Security
🎯 The Concept in a Nutshell

Think of your server as a house. Now imagine it has no visible doors—just solid walls. No one can get in unless they know the secret knock. That’s exactly what Port Knocking does in the world of cybersecurity.

It hides your services behind closed ports and only reveals them to those who know the right "knock" pattern—a sequence of invisible signals

sent to specific ports.
🕵️‍♂️ Why It Exists

Most internet-connected services (like SSH for remote access) are always listening for connections. That also makes them visible to attackers scanning for vulnerabilities.

Port Knocking flips that idea. Instead of leaving your ports open, it keeps them closed and hidden. Only when a user sends a precise pattern of connection attempts does the system temporarily allow access.

It’s like turning your server into a secret location
that only opens up for trusted guests.

🎩 How It Works – In Simple Terms

All ports on the server are closed and hidden.

The client sends a series of connection attempts to specific ports in a defined order.

A background listener watches for that exact sequence.

If the knock is correct, the system opens a specific port (e.g. SSH) for that user’s IP.

After some time, or once the connection ends, the port is closed again.

From the outside, it looks like nothing ever happened. Unless you know the exact knock, you won’t even know a door exists.

Why People Use Port Knocking

It hides critical services from casual scans and attacks.

Adds an extra layer of protection without altering your existing applications.

Lightweight and easy to implement.

Works well alongside other security measures.

It’s not meant to replace passwords or encryption—it just adds a clever invisible layer on top.

Things to Watch Out For

The knock sequence can be captured if the network is not encrypted.

Replay attacks are possible if someone records and reuses your knock.

It depends on timing—if the network is slow or unstable, it may fail.

It’s not immune to brute-force guessing if the sequence is too simple or common.

In short: it’s smart, but it’s not bulletproof. Use it with caution and combine it with other tools.

🤔 When It Makes Sense

Port Knocking is great when you want to:

Hide services like SSH on your VPS or home server.

Prevent automated attacks or scans from detecting open ports.

Allow only specific users to access sensitive systems.

It’s especially useful for individuals, sysadmins, or developers running personal servers who want something stealthy but simple.

🧠 Final Thoughts

Port Knocking isn’t magic—but it feels like it. It adds a layer of invisibility to your network that makes it harder for attackers to even know where to begin.

It’s not a full security solution on its own, but it’s a powerful little trick to keep your server one step ahead.

Stay hidden, stay safe. 🛡


CHANNEL  
GROUP
DISCORD
🔥11👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🐳8