Get Mystery Box with random crypto!

Exploithacker Learn hacking

Logo of telegram channel exploithacker — Exploithacker Learn hacking E
Logo of telegram channel exploithacker — Exploithacker Learn hacking
Channel address: @exploithacker
Categories: Apps
Language: English
Subscribers: 686
Description from channel

🔰 Ᏼᴇsᴛ Ꮋᴀᴄᴋɪɴɢ Ꮯʜᴀɴɴᴇʟ ㄖɴ Ꭲᴇʟᴇɢʀᴀᴍ 🔰
🌀 Ꮯʀᴀᴄᴋɪɴɢ
🌀 Ꭰᴀɪʟʏ Ꮆɪᴠᴇᴀᴡᴀʏs
🌀 Ꮋᴀᴄᴋɪɴɢ
🌀 Ꮲʀᴇᴍɪᴜᴍ ᗩᴄᴄᴏᴜɴᴛs
🌀 Ꮲᴀɪᴅ Տᴛᴜғғ
🌀 Ꮲʀᴇᴍɪᴜᴍ ᗰᴏᴅs & ᗩᴘᴘs
♾ Ꭰɪsᴄᴜssɪᴏɴ : @Exploit_Hacker_Group
💸 Ғᴏʀ Ꮲᴀɪᴅ ᑭʀᴏᴍᴏᴛɪᴏɴ ϴʀ Ꭼɴϙᴜɪʀʏ
Ꮯᴏɴᴛᴀᴄᴛ 》 @exploit_promo_bot

Ratings & Reviews

1.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

0

2 stars

2

1 stars

1


The latest Messages 24

2021-10-13 19:15:32 Private Paid Channel Link -

https://t.me/joinchat/YVPC8S0-nes5MWYx
https://t.me/joinchat/YVPC8S0-nes5MWYx
1.6K viewsAѕнιѕн, 16:15
Open / Comment
2021-10-13 18:09:46 Books / Manuals

Warning :
I haven't read them all so do not consider I am recommending as I liked them. They just seem to provide useful resources.

• Penetration Testing: A Hands-On Introduction to Hacking (2014)
• Kali Linux Revealed - PDF (2017)
• Blue Team Field Manual (BTFM) (2017)
• Cybersecurity - Attack and Defense Strategies (2018)
• NMAP Network Scanning : Official Discovery (2009)
• Social Engineering : The Art of Human Hacking (2010)
• Incognito Toolkit: Tools, Apps, and Creative Methods for Remaining Anonymous (2013)

@exploithacker
2.4K viewsAѕнιѕн, edited  15:09
Open / Comment
2021-10-13 07:15:15 Some vocabulary

Infosec
: Information security, which is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Infosec can also be a person who practices ethical security. Wikipedia

Opsec: Operations security, which is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. Wikipedia

Black/grey/white hat hacker: Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if they're a black, grey or white hat hacker. A black hat is just someone malicious that does not wait permission to break into a system or application. A white hat is usually a security researcher who practice ethical hacking. A grey hat is just in the middle of these two kind of hackers, they might want to be malicious if it can be benefit (data breach, money, whistleblowing ...).

Red team: According to Wikipedia, a red team or the red team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. It is particularly effective in organizations with strong cultures and fixed ways of approaching problems. The United States intelligence community (military and civilian) has red teams that explore alternative futures and write articles as if they were foreign world leaders. Little formal doctrine or publications about Red Teaming in the military exist. In infosec exercises, Red teamers are playing the role of attackers. Wikipedia

Blue team: A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation. As a result, blue teams were developed to design defensive measures against red team activities. In infosec exercises, Blue teamers are playing the role of defenders. Wikipedia

Penetration tester: An ethical hacker who practices security, tests applications and systems to prevent intrusions or find vulnerabilities.

Security researcher: Someone who practices pen testing and browses the web to find phishing/fake websites, infected servers, bugs or vulnerabilities. They can work for a company as a security consultant and are most likely a Blue teamer.

Reverse engineering: Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object. Similar to scientific research, the only difference being that scientific research is about a natural phenomenon. Wikipedia

Social engineering: In the context of information security, it refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught on among computer and information security professionals. Wikipedia

Threat analyst: A threat hunter, also called a cybersecurity threat analyst, is a security professional or managed service provider (MSP) that proactively uses manual or machine-assisted techniques to detect security incidents that may elude the grasp of automated systems.

@exploithacker
5.0K views Kick buttoski , edited  04:15
Open / Comment
2021-10-11 12:14:05 Docker Images for Penetration Testing & Security

• docker pull kalilinux/kali-linux-docker official Kali Linux
• docker pull owasp/zap2docker-stable - official OWASP ZAP
• docker pull wpscanteam/wpscan - official WPScan
• docker pull metasploitframework/metasploit-framework - Official Metasploit
• docker pull citizenstig/dvwa - Damn Vulnerable Web Application (DVWA)
• docker pull wpscanteam/vulnerablewordpress - Vulnerable WordPress Installation
• docker pull hmlio/vaas-cve-2014-6271 - Vulnerability as a service: Shellshock
• docker pull hmlio/vaas-cve-2014-0160 - Vulnerability as a service: Heartbleed
• docker pull opendns/security-ninjas - Security Ninjas
• docker pull noncetonic/archlinux-pentest-lxde - Arch Linux Penetration Tester
• docker pull diogomonica/docker-bench-security - Docker Bench for Security
• docker pull ismisepaul/securityshepherd - OWASP Security Shepherd
• docker pull danmx/docker-owasp-webgoat - OWASP WebGoat Project docker image
• docker pull vulnerables/web-owasp-nodegoat - OWASP NodeGoat
• docker pull citizenstig/nowasp - OWASP Mutillidae II Web Pen-Test Practice Application
• docker pull bkimminich/juice-shop - OWASP Juice Shop
• docker pull phocean/msf - Docker Metasploit

Make sure you installed docker in your pc

@exploithacker
8.1K viewsAѕнιѕн, edited  09:14
Open / Comment
2021-10-11 06:49:06 Execution logging and tracing

• Wireshark - A free and open-source packet analyzer
• tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
• mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
• Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
• usbmon - USB capture for Linux.
• USBPcap - USB capture for Windows.
• dynStruct - structures recovery via dynamic instrumentation.
• drltrace - shared library calls tracing.

@exploithacker
7.7K viewsAѕнιѕн, edited  03:49
Open / Comment