Get Mystery Box with random crypto!

Tech hub

Logo of telegram channel gbtechhub — Tech hub T
Logo of telegram channel gbtechhub — Tech hub
Channel address: @gbtechhub
Categories: Technologies
Language: English
Subscribers: 257
Description from channel

Chat me through my bot @Gbtechhub_adminbot

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

1

3 stars

0

2 stars

0

1 stars

1


The latest Messages

2021-03-29 13:36:31 What is a web application? What are Web Threats?

A web application (aka website) is an application based on the client-server model. The server provides the database access and the business logic. It is hosted on a web server. The client application runs on the client web browser. Web applications are usually written in languages such as Java, C#, and VB.Net, PHP, ColdFusion Markup Language, etc. the database engines used in web applications include MySQL, MS SQL Server, PostgreSQL, SQLite, etc.

Most web applications are hosted on public servers accessible via the Internet. This makes them vulnerable to attacks due to easy accessibility.


The following are common web application threats.

SQL Injection - the goal of this threat could be to bypass login algorithms, sabotage the data, etc.

Denial of Service Attacks - the goal of this threat could be to deny legitimate users access to the resource

Cross Site Scripting XSS - the goal of this threat could be to inject code that can be executed on the client side browser.

Cookie/Session Poisoning - the goal of this threat is to modify cookies/session data by an attacker to gain unauthorized access.

Form Tampering - the goal of this threat is to modify form data such as prices in e-commerce applications so that the attacker can get items at reduced prices.

Code Injection - the goal of this threat is to inject code such as PHP, Python, etc. that can be executed on the server. The code can install backdoors, reveal sensitive information, etc.

Defacement - the goal of this threat is to modify the page been displayed on a website and redirecting all page requests to a single page that contains the attacker’s message.

Share and Support

@GBTECHHUB
238 views10:36
Open / Comment
2021-03-28 18:59:38 *TO CHECK WHETHER ITS REGISTERED IN YOUR NAME*

Dial. **400*1#*
210 views15:59
Open / Comment
2021-03-28 18:59:22 If your momo account was not registered with your own ID card, but someone registered it for you with his or her ID card, make sure you'll cash all the money on the account before *2ND* *APRIL 2021 2/04/21.* Otherwise you can't cash the money again unless you use the ID card of the person who did the registration for you.
Message from MTN GHANA

Please let's adhere to this...God bless you all
@gbtechhub
205 views15:59
Open / Comment
2021-03-25 14:24:35 List of terms used in the field of hacking.

Adware − Adware is software designed to force pre-chosen ads to display on your system.

Attack − An attack is an action that is done on a system to get its access and extract sensitive data.

Back door − A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.

Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it. For example, sending HTTP, FTP or Telnet at a higher rate or calling script to create objects at a higher rate.

Botnet − A botnet, also known as zombie army, is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial of service attacks.

Brute force attack − A brute force attack is an automated and the simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords, over and over again, until it gets in.

Buffer Overflow − Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.

Clone phishing − Clone phishing is the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.

Cracker − A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.

Denial of service attack (DoS) − A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

DDoS − Distributed denial of service attack.

Exploit Kit − An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.

Exploit − Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.

Firewall − A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.

Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing email.

Logic bomb − A virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is the time bomb.

Malware − Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.

Master Program − A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.

Phishing − Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.

Phreaker − Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free longdistance phone calls or to tap phone lines.

Share and support us
206 views11:24
Open / Comment
2021-03-24 04:41:36 ​​ 4 Proven Ways To Find a Website's IP Address

This tutorial teaches you how to find the IP address of a website. You can do this by using your computer's built-in "traceroute" function, or by downloading and using a free traceroute app for your iPhone or Android.

#1 ON WINDOWS

• Open your PC and click on start menu. Search For "cmd" (Without quotes)

• Right Click on cmd and click on "Run as administration"

• Now enter a command -

ping website address -t

Ex. - ping google.com -t

• Now hit enter. You will get it.

===============================

# 2 ON MAC OS

• Open Spotlight (Click the magnifying glass-shaped icon in the top-right corner of the screen.)

• Search for Network Utility and open it. After that Click on Traceroute tab in network utility.

• Now Enter website address in input box and click on trace button You will see the IP address of website

================================

#3 ON ANDROID

• Download and install PingTools Network Utility app then open it.

• Tap ☰. It's in the upper-left corner of the screen. A pop-out menu will appear.

 • Now tap Traceroute Enter Website address and click on trace button 

=================================

#4 ON IPHONE

•Install and Open Inettools app

•Click on Traceroute then Click on adress bar and input website address (e.g. google.com) 

•Click on start. You will see the IP address of website. 

=================================

Note - Do not try to find ip address of Government sites (.gov, .gov.in, ac.in etc)

@gbtechhub
Share And Support Us
180 views01:41
Open / Comment
2021-03-21 01:27:48 Input Validation Attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.

The most common input validation attacks are as follows-


1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is well suited for conducting this type of attack.
Here’s the buffer test, calling on Perl from the command line:
$ echo –e “GET /login.php?user=\
> perl –e ‘print “a” x 500’\nHTTP/1.0\n\n” | \
nc –vv website 80
This sends a string of 500 “a” characters for the user value to the login.php file.
Buffer overflow can be tested by sending repeated requests to the application and recording the server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference alternate files on the web server. The basic form of this attack is to move outside of the web document root in order to access system files, i.e., “../../../../../../../../../boot.ini”. This type of functionality is evident from the URL and is not limited to any one programming language or web server. If the application does not limit the types of files that it is supposed to view, then files outside of the web document root are targeted, something like following-
/menu.asp?dimlDisplayer=menu.asp
/webacc?User.asp=login.htt
/SWEditServlet?station_path=Z&publication_id=2043&template=login.tem
/Getfile.asp?/scripts/Client/login.js
/includes/printable.asp?Link=customers/overview.htm

3) Cross-site Scripting (XSS) :-Cross-site scripting attacks place malicious code, usually JavaScript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc.
We have found that error pages are often subject to XSS attacks. For example, the URL for a normal application error looks like this:
http://website/inc/errors.asp?Error=Invalid%20password
This displays a custom access denied page that says, “Invalid password”. Seeing a string
on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack would be created as:
http://website/inc/errors.asp?Error=That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries as an input, which can open up a database. Online forms such as login prompts, search enquiries, guest books, feedback forms, etc. are specially targeted.

The easiest test for the presence of a SQL injection attack is to append “or+1=1” to the URL and inspect the data returned by the server.
example :- http://www.domain.com/index.asp?querystring=sports' or 1=1--

Share and Support

@gbtechhub
180 views22:27
Open / Comment
2021-03-09 12:41:30 Disguising phishing links

Hey Freaks! Gbtechhub here. Nowadays, people are smart enough. They don't fall into the phishing trap. Because the link doesn't look like the original site. For example, a phishing link might be https://ngrok.io/xxabcd but it opens pages like Gmail Login. People are trapped and a user with minimal technical knowledge will not put in credentials (Username and Password). Thus, it becomes difficult to deceive anyone.

What then is to be done? The answer is social engineering. The attacker must be proficient in social engineering. Brought to you by hackfreaks official. What is Social Engineering? In short, social engineering is “mistakes in human equipment”. The attacker plays with the mind of the victim and deceives him.

Hiding phishing links in good-looking links is a big part of social engineering. Using this method, the attacker owns the victim's trust and the victim treats the phishing link as normal. Because the top-level domain (like Google, YouTube, New York Times, etc.) is considered clean.

To make things easier, we will be using a tool that converts a phishing link into a regular web link like Google or YouTube.

Installation

git clone https://github.com/jaykali/maskphish
cd maskphish
bash maskphish.sh

Then MaskPhish will open the main menu:

Now we need to put our phishing URL here, whatever it is (with http: // or https: //).
Then we need to put in a reliable url, whatever the way of phishing the victim's mind https://google.com or https://youtube.com or http: //anything.com - yes.
Here we need to use some social engineering words separated by the letter “-”, for example, if the victim is a soccer fan, then we can use something like the best-footaball-skills mind that here we are not using any space.

Then we just type it in and we get our disguised link. We got our url started from facebook.com and the url doesn't have ngrok directly in the url.

@gbtechhub
Share and support
209 views09:41
Open / Comment
2021-03-06 16:23:01 How to hide your IP address?

Here are the ways to hide your IP address:

VPN – VPN is the safest and strongest way to mask IP addresses. It enables you to effectively hide your IP without any hassle. VPN have good security features that keep you anonymous while surfing Internet. Virtual Private Network opens the areas of the Internet that are blocked due to geo-restrictions.

Tor – Tor is a browser that keeps your online activity completely anonymous. It slows down your internet when you connect it, but your IP address will still untraceable.

Proxy – Proxy will treat like you have a different IP address. It slows down your connection but doesn't encrypt your activity. Proxy is not an ideal choice for torrenting.

Public WiFi – Public WiFi is an easy way to change your IP address. However, sometimes it vulnerable to security threats. It does not work with geo-restrictions.


Share and Support

@Gbtechhub
207 views13:23
Open / Comment
2021-03-03 10:33:56 Zero-Day Attack

A Zero-Day Attack (also referred as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of. The software developer must rush to resolve the weakness as soon as it is discovered in order to limit the threat to software users. The solution is called a Software Patch. Zero-day attacks can also be used to attack the internet of things (IOT).

A zero-day attack is a software-related attack that exploits a weakness that a vendor or developer was unaware of.

The name comes from the number of days a software developer has known about the problem.

The solution to fixing a zero-day attack is known as a software patch.

Zero-day attacks can be prevented, though not always, through antivirus software and regular system updates.

There are different markets for zero-day attacks that range from legal to illegal. They include the White Market, Grey Market, and Dark Market.

@gbtechhub
Always better
211 views07:33
Open / Comment