kid cyber – Telegram
kid cyber
64 subscribers
94 photos
19 videos
1 file
69 links
Kidus Mulugeta
3rd year software Engineering student in AASTU
cybersecurity enthusiat
Learn , build and share journey
Download Telegram
been inconsistent for the last few days .....i will post what i learned like i did before
4
kid cyber
https://github.com/KidM13/port-scanner
I did this 2 months ago and since it is basic port scanner needs some modification will post once it's done
🔥4
This media is not supported in your browser
VIEW IN TELEGRAM
🔥5
here it is to handle multiple clients
i used thread here
#dev
🔥3👍1
kid cyber
here it is to handle multiple clients i used thread here #dev
order isn’t guaranteed when you’re handling multiple clients. sure u noticed client 2 got reply first before client one this happens b/c Threads don’t run in strict order (1, 2, 3), the operating system decides which thread gets CPU time first.
👍2
Forwarded from The Hacker News
🚨 Hackers are hijacking Google search ads to trick devs into downloading malware disguised as GitHub tools.

The payload? A 128MB file that hides from sandboxes unless your GPU passes its “check.” Info theft & remote access are the endgame.

Details ↓ https://thehackernews.com/2025/09/gpugate-malware-uses-google-ads-and.html
Forwarded from 4-3-3 ስፖርት በኢትዮጵያ
ታላቁ የኢትዮጵያ ህዳሴ ግድብ ተመረቀ!😍😍

እንኳን ደስ አለን! ኢትዮጵያውያን!! 🇪🇹🇪🇹🇪🇹

@SPORT_433ET @SPORT_433ET
😍4
👍2
covering reflected xss...a lot to dig
2
it has been three month since i started this channel and my cybersecurity journey
i hesitated many times to start a channel feeling i have to dig a lot inorder to share something but i understood noone started after being perfect but you will get improved through the journey and yeah good to share the journey , getting help from seniors in the field and building community. still just starting but we will grow through time |GOD HELPS|
happy new year !!!
5
If you don't spend enough time getting to know ur self , you will end up absorbing everyone else's definition of u
#newyear
💯2
kid cyber
just found this website to practice xss https://xss-game.appspot.com/
here it all starts !!
same origin policy: it stops one website reading or writing data to and from another website
the policy essentially checks for 3 different things in the origin: protocol, host and port
only if the three are the same for two different origin then the browser allows cross read and write
Get ready for Ethiopia CyberShield Showdown Week, featuring bootcamps, red-team exploits, incident response simulations, and a high-stakes Capture the Flag (CTF). Join us to learn, compete, and connect with a chance to win prizes, merch, and recognition.

📅 Event Details

🔹 Online Bootcamp: Sept 17 to 18 | 8:00 PM to 10:00 PM
🔹 In-Person CTF: Sept 19 to 21 | 9:00 AM to 5:00 PM
📍 Capstone, ALX Tech Lideta Hub, Lideta

🔗 Register now: https://luma.com/jyu7twze

#ALXEthiopia #CyberShieldShowdown #CTF2025 #Cybersecurity #ALXAfrica #dohardthings #lifeatalx #yekolotemari
2
kid cyber
here it all starts !! same origin policy: it stops one website reading or writing data to and from another website the policy essentially checks for 3 different things in the origin: protocol, host and port only if the three are the same for two different…
💡 Same-Origin Policy (SOP)
It prevents one website from reading/writing data to another site unless protocol, host, and port all match.
🔒 But what about attacks like XSS?
Cross-Site Scripting (XSS) is a web vulnerability where attackers inject malicious noscripts into trusted websites to run in the victim’s browser.
Types of XSS:
Stored XSS → Malicious noscript is permanently saved on the target server (e.g., in a database, comment section).
Reflected XSS → Script comes from a crafted link or request and reflects back in the response.
DOM-based XSS → The attack happens fully on the client side due to unsafe JavaScript handling in the DOM.
👉 In short: XSS abuses the trust a site has with your browser.