Get Mystery Box with random crypto!

𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐞𝐫𝐬™️

Logo of telegram channel ethicalhaking — 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐞𝐫𝐬™️ 𝐄
Logo of telegram channel ethicalhaking — 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐞𝐫𝐬™️
Channel address: @ethicalhaking
Categories: Technologies
Language: English
Subscribers: 1.06K
Description from channel

🔥AK ETHICAL HACKING🔥
🌐ᴋɴᴏᴡʟᴇᴅɢᴇ ɪꜱ ʟɪᴋᴇ ᴜɴᴅᴇʀᴡᴇᴀʀ. ɪᴛ ɪꜱ ᴜꜱᴇꜰᴜʟ ᴛᴏ ʜᴀᴠᴇ ɪᴛ, ʙᴜᴛ ɴᴏᴛ ɴᴇᴄᴇꜱꜱᴀʀʏ ᴛᴏ ꜱʜᴏᴡ ɪᴛ ᴏꜰꜰ.ʟɪꜰᴇ ᴡᴏᴜʟᴅ ʙᴇ ꜱᴏ ᴍᴜᴄʜ ᴇᴀꜱɪᴇʀ ɪꜰ ᴡᴇ ᴏɴʟʏ ʜᴀᴅ ᴛʜᴇ ꜱᴏᴜʀᴄᴇ ᴄᴏᴅᴇ.ᴛʜᴇ ᴏɴʟʏ ᴘʀᴏʙʟᴇᴍ ᴡɪᴛʜ ᴛʀᴏᴜʙʟᴇꜱʜᴏᴏᴛɪɴɢ ɪꜱ ᴛʜᴀᴛ ꜱᴏᴍᴇᴛɪᴍᴇꜱ ᴛʀᴏᴜʙʟᴇ ꜱʜᴏᴏᴛꜱ ʙᴀᴄᴋ. 🌐

Ratings & Reviews

2.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

1

2 stars

1

1 stars

1


The latest Messages 7

2022-01-13 05:10:30 RECON METHODOLOGIES PART 1

As a penetration tester or a bug bounty hunter, often you're given a single domain when you start a security assessment. You’ll have to execute extensive recon to find interesting assets like servers, web applications, domains that belong to the target organisation so that you can increase your chances of finding vulnerabilities

POST LINK:
https://bit.ly/3nmlcBY
68 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 02:10
Open / Comment
2022-01-10 11:48:19 All Rubber Ducky and HID Devices 2021

USB Rubber ducky is an HID device that looks similar to a USB Pen drive. It may be used to inject keystroke into a system, used to hack a system, steal victims essential and credential data can inject payload to the victim’s computers. The main important thing about USB Rubber ducky is that it cannot be detected by any Anti-Virus or Firewall as it acts as an HID device.
A Rubber Ducky USB stick, once plugged into a computer, looks like a normal keyboard. Following a correct and simple programming, it is able to inject a keystroke sequence as if it were a normal user typing through it.

Guide By @ITS_ME_KALI
https://telegra.ph/USB-DUCKY-GUIDE-BY-IMK-09-23

Course
https://bit.ly/3hXuoKo

Regards=https://www.linkedin.com/groups/9103530
107 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:48
Open / Comment
2022-01-09 11:50:19 1)Name of user's avatar
2)Where does he live(state/city)
3)Where did he go for trip (exact location)
4)His email address
5)Usual password (hidden somewhere)

Send answers @Meet_sehgal
89 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:50
Open / Comment
2022-01-09 07:52:58 Today's CTF....

https://send.cm/d/7dtp

Methods Used :

Extension Spoofing
Encoding / Decoding
Simple CTF..

*** Password : @TheKr4tos

Submit Flag To : @TheKr4tos


Join @hackingtoolshub
@CIDHUB
146 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 04:52
Open / Comment
2022-01-07 11:09:13 All about ETHICAL HACKING

What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data, for finding Vulnerabilities to protect it from threats.

Injection attacks.

Changes in security settings.

Exposure of sensitive data.

Breach in authentication protocols.

Components used in the system or network that may be used as access points.

Course
https://drive.google.com/drive/folders/1ndC0M1jH7knFppSO5uP1jDhGMPbYvcDW?usp=sharing

Credit : @Dark_Hacker_001

For More : @CIDHUB
12 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:09
Open / Comment
2022-01-05 14:53:33 Cyber Harassment Safety Guide By IMK

Have you ever thought your how your personal data become public and how hackers do that .
Its very simple, your stupidity behind it .
Let's understand what are the common factors through which someone attack on you .
...... bio.cool/itsmekali ......
Missing Double Authentication .
Clicking on unknown links.
Downloading unknown files and pdfs without scanning them through antivirus or virustotal.com
Making unencrypted backup of your files on cloud.
Trusting unknown person may be he or she just messaged you for getting your personal details, stay away from these catphishers .
Saving or sharing your unclad photos on social media apps .
Using mods or cracked softwares.

Safety Measures
.............its_me_kali..............
Don't use face lock, use six digit pin.
Use double authentication in each and every account .
Weekly check your running services of your device in settings in developer option there's a option of running services(activities).
Never share your personal pics with strangers .
Use different username in every accounts .
Backup your files in encrypted form with password protection .
Don't share your number in social media apps except whatsapp.
If you found your personal data leaked anywhere then don't panic its your public data that you shared on web.
If any hacker demand you money for deleting your personal info or decrypting your encrypted files then never trust ,90% of them will not do that after getting money .
Never share your personal details on online advertisement of different apps and sites.

Note Never trust any carders or money doublers of telegram of any channel they all are scammers. Keep it in your mind . No carder will card product for you at cheaper price. If you like this post please share it in each and every channel and group with credits .

Cyber Fraud Awareness

Some of you suffering from cyber frauds and scamming so providing you these websites where you can file complaints for cyber frauds !!
https://www.cybercrime.gov.in/

Number=155260
www.consumercomplaintindia.com/cyber-cell
Call 084482 20668
Consumer Complaint India · File Complaint Now

https://grahakshikayatmanch.com/

https://www.consumercomplaints.info/

https://consumerchanakya.com
Call Now 8588850696

https://staysafeonline.org/stay-safe-online/identity-theft-fraud-cybercrime/reporting-cybercrime/

https://cytrain.ncrb.gov.in/

For More
https://www.linkedin.com/groups/9103530

Copy with credit
44 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 11:53
Open / Comment
2022-01-04 11:39:16 Ethical Hacking 2022

Ethical hackers are in high demand, and this demand is only increasing as the severity and cost of cyber attacks continues to surge. As you might expect, organizations that desperately need skilled and certified ethical hackers are willing to pay a premium.

Following are the skills that one must possess when he/she becomes the professional in ethical hacking:

The person must have enough experience in the field of cybersecurity

Should have the knowledge of different operating systems

Should know the sound practical knowledge of different servers i.e. Microsoft and Linux Servers, Cisco network switches, virtualization etc.

They should also know the sound working knowledge of the penetration software

They should possess strong programming and computer networking skills.

It takes time to get the required result, so a great deal of patience and persistence will be required.

One needs to stay updated about the latest technologies and be flexible to adapt to the changes.

One must also have sufficient hardware knowledge, Linux skills and Database skills.

Course Link
https://drive.google.com/drive/folders/1H5MBbk0RH976e3A2HP3Dha9-1LUznoGx?usp=sharing

Credit : @Dark_Hacker_001

For More : @CIDHUB
60 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:39
Open / Comment
2022-01-02 10:04:44 INTERNSHIPS 2022 GUIDE

What Is an Internship?

An internship is a professional learning experience that offers meaningful, practical work related to a student’s field of study or career interest. An internship gives a student the opportunity for career exploration and development, and to learn new skills. It offers the employer the opportunity to bring new ideas and energy into the workplace, develop talent and potentially build a pipeline for future full-time employees.

All About Internships
Top 150 Best Internship Programs for 2022 Are given in Article.
https://telegra.ph/All-About-Internships-01-02

Best Site To Get Internships
internships.com

For More : Bio.cool/gani
70 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 07:04
Open / Comment
2022-01-01 15:11:34
CTF SOLUTION 2022

WINNERS OF CIDHUB 2022 CTF

@PsychoJok3r666
@Meet_sehgal
@Elbeastzzz
@prodoxer
@dr_strange_xd
@TheKr4tos
@Phoenixop7
@sai4502

While performing OSINT you'll get a link bio.cool/itsmekali, from where you get my Instagram CyberCrimeInvestigator, where you find a Qr Code.
After Scanning Qr you'll get base 64 Encrypted URL, After decoding it, you have to use vpn because it contains ip logging url, and after it you'll get 15 theory based questions which you will send me in text file.
85 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 12:11
Open / Comment
2021-12-31 21:29:02
WELCOME 2022

I’m so proud of all your accomplishments this year - and I can’t wait to see what you do in the next. Let's Crack the CTF and be a part of my Team @CIDHUB

Ctf is very easy as earlier but little bit tricky, some basic concepts like encoding, extension spoofing, and hiding techniques are used! Use your brain and solve it asap!

Registration Link
Bio.cool/cidhub

Hint : Angel will help you after decrypting devil .

Note : Devil is very dangerous stay safe and secure.

Linkdin ID is compulsory to join CTF

Submit your answers in txt file at @its_me_kali 's inbox.

Without Registration you will get disqualified.

Regards : @CIDHUB
115 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 18:29
Open / Comment