Social Engineering Attacks: Creating a Fake SMS Message
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
👍5
How does a Combination Lock work_Gif.gif
14.9 MB
UP-SOLVING Combination Lock
I'm gonna explaining how i solved the Combination Lock problem solving
Source
YouTube
#useful #fun
I'm gonna explaining how i solved the Combination Lock problem solving
Source
YouTube
#useful #fun
🔥2🤔1
Bypassing 403s like a PRO! ($2,100): Broken Access control
This article highlights my way of dealing with 403s and how I managed to get a P1 in minutes!
Source
403 Bypasser Burp extension
#web
This article highlights my way of dealing with 403s and how I managed to get a P1 in minutes!
Source
403 Bypasser Burp extension
#web
👍2🔥2
🔥2👍1
Forwarded from CyberSecBastion
👍4
Forwarded from CyberSecBastion
JWT Attacks_2023.pdf
2 MB
PDF - JWT Attacks (intro , attacks , Real world scenario and Mitigation)
🔥3
Forwarded from CyberSecBastion
Nuclei Vuln Scanner
Fast and customisable vulnerability scanner based on simple YAML based DSL.
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.
GitHub
#tools
Fast and customisable vulnerability scanner based on simple YAML based DSL.
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.
GitHub
#tools
👍4
A Quick Guide to Information Security Standards.pdf
1.6 MB
A Quick Guide to Information Security Standards
👍3
Azure AD Security Config Analyzer (AADSCA)
We decided to take alternative approach for chapter 6 and we are not covering possible Azure AD attack path. This time, the focus is on on proactive side, how organizations can monitor and strengthen Azure AD's security posture. For this purpose we created 'Azure AD Security Config Analyzer' aka 'AADSCA' solution.
GitHub
Official page
#windows
We decided to take alternative approach for chapter 6 and we are not covering possible Azure AD attack path. This time, the focus is on on proactive side, how organizations can monitor and strengthen Azure AD's security posture. For this purpose we created 'Azure AD Security Config Analyzer' aka 'AADSCA' solution.
GitHub
Official page
#windows
🔥3👍1