🔥 Burn Fat Fast. Discover How! 💪

RDP Tricks

Logo of telegram channel rdp_tricks — RDP Tricks R
Logo of telegram channel rdp_tricks — RDP Tricks
Channel address: @rdp_tricks
Categories: Technologies
Language: English
Subscribers: 1.94K
Description from channel

-Free RDP Tricks
-Free Hosting
-Free Domain Method
Visit Our Blog - https://androidgeekr.blogspot.com
Contact Me @Ironmangujju_robot
📢𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗕𝘆:- @ironman_cloud ☁️

Ratings & Reviews

4.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

1

2 stars

0

1 stars

0


The latest Messages 4

2021-10-23 12:15:23 Test 2021 IMK PAID CLASS

Yesterday Test Answers By @Mr_Robleis


1.) What is the difference between IP address and Mac address?

> Difference between MAC and IP address is that MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network.

2.) List out some of the common tools used by Ethical hackers?

> Nmap Hacking Tool
Burp Suite Hacking Tool
Netsparker
Acunetix
Metasploit
Aircrack-Ng
Ettercap
John The Ripper
Wireshark
Angry IP Scanner

3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?

> It Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Techniques : DNS Queries, N/W Enumeration, Network Queries, Ping Sweeps, Port Scanning.

4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

> A denial-of-service (DoS) attack aims to obstruct a network or resource by flooding a target with artificial traffic, which restricts user access to the respective service being attacked. Types : Ddos, N/W Targeted Attacks, System Targeted, Teardrop.

5.) Explain what is SQL injection?

> SQL Injection attacks (or SQLi) alter SQL queries, injecting malicious code by exploiting application vulnerabilities.

6.) Explain what is Network Sniffing?

> Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets containing sensitive information such as password, account information etc.

7.) Write Linux command to view text file?

> cat foo.txt or cat /etc/resolv.conf

8.)Explain what is Burp Suite, what are the tools it consist of?

> Burp Suite is an integrated platform for performing security testing of web applications. Tools : Target, proxy, repeater, scanner, Intruder, sequencer, decoder, comparer etc.

9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.

> When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps.

10.) Find location and open ports of this ip address 49.33.178.116

> City : Mumbai
Region : Maharashtra (MH)
Postal code : 400070
Country : India (IN)
Continent : Asia (AS)
Coordinates : 19.0748 (lat) / 72.8856 (long)

Starting Nmap 7.40 ( https://nmap.org ) at 2021-10-22 16:14 UTC
Nmap scan report for 49.33.178.116
Host is up.
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp filtered http
110/tcp filtered pop3
143/tcp filtered imap
443/tcp filtered https
3389/tcp filtered ms-wbt-server

Nmap done: 1 IP address (1 host up) scanned in 3.15 seconds

Regards>@CIDHUB**
279 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 09:15
Open / Comment
2021-10-22 16:39:37 Test 2021 IMK PAID CLASS

Topic: Ethical Hacking Basics


1.) What is the difference between IP address and Mac address?

2.) List out some of the common tools used by Ethical hackers?

3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?

4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

5.) Explain what is SQL injection?

6.) Explain what is Network Sniffing?

7.) Write Linux command to view text file?

8.)Explain what is Burp Suite, what are the tools it consist of?

9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.

10.) Find location and open ports of this ip address 49.33.178.116

Try to practice, will be upload tomorrow!!

PRATICE COURSE
https://bit.ly/3jpI2qa

Ethical Hacking Class
https://bit.ly/30Os4Q3

Regards:@CIDHUB
294 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 13:39
Open / Comment
2021-10-22 11:26:53 RDP Tricks pinned Deleted message
08:26
Open / Comment
2021-10-21 13:11:27 2021 Job Guide

Top Apps That Surely Help You In getting Future Job. For that first develop your skills from @CIDHUB then apply for a job either if you want to learn from basics and 24*7 professional guidance then check below ethical hacking article.

Apna India Job
https://bit.ly/3ngpb1P

Linkdin
https://bit.ly/3nh5hDY

GlassDoor
https://bit.ly/3aZ2ZDW

Shine Jobs
https://bit.ly/3DZll43

Indeed Jobs
https://bit.ly/3ndiVrQ

To build resume use below app:

Professional CV
https://bit.ly/3m3313G

CV Maker
https://bit.ly/2Z6kP55

Portfolio Making
https://bit.ly/3G8ovEj

Ethical Hacking
https://bit.ly/30Os4Q3

Regards=@CIDHUB
321 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 10:11
Open / Comment
2021-10-20 18:54:56 Golang Course and Guide

Go is a statically typed, compiled programming language designed at Google by Robert Griesemer, Rob Pike, and Ken Thompson. Go is syntactically similar to C, but with memory safety, garbage collection, structural typing, and CSP-style concurrency. 

Characteristics of Golang

Open-Source. The foremost characteristic of Golang programming language is that it is open-source.

Static Typing.

Concurrency Support.

Powerful Standard Library and Tool Set.

Testing Capabilities.

Garbage Collection. ...

Ease of Use.

Cross-Platform Development Opportunities.

Download link
https://golang.org

Course

Basic
https://t.me/cybertorrenthub/178

Advance
https://mega.nz/folder/0IxkGDrb#HBWbVFE_UuPj7vQD6MinKw

Full Ethical Hacking
https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08

Regards=@CIDHUB
313 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 15:54
Open / Comment
2021-10-20 09:52:06
307 views𝕚𝓻𝓞𝓃 ΜⒶⓝ ⃤ •#Gujju, 06:52
Open / Comment
2021-10-20 09:21:39 RDP Tricks pinned «#20 Windows 365 1 month method no cc => U need one outlook mail for this method login.live.com & make new outlook mail => Then after creating an outlook email you have to register for Windows 365 trial via the link Here => Fill fake name & address from…»
06:21
Open / Comment
2021-10-20 09:21:30 #20 Windows 365 1 month method no cc

=> U need one outlook mail for this method
login.live.com & make new outlook mail

=> Then after creating an outlook email you have to register for Windows 365 trial via the link Here

=> Fill fake name & address from here
https://www.fakeaddressgenerator.com

=>U need a number for OTP u can use any temp OTP or your personal number

=> Add payment method must be live cc

404942x2x7xxxxxx microsoft BIN
https://namso-gen.com

=>Wait for while and Your Windows 365 ready to use

=> Rdp specs
2 core 8 GB RAM
128 GB storage
Duration : 1 month

=> Connect workspace in RDP client to run RDP in android or iOS

=> Enjoy !!!

=> Copy with Credits { mf Leeches }

{RDP_tricks}
1.2K views𝕚𝓻𝓞𝓃 ΜⒶⓝ ⃤ •#Gujju, 06:21
Open / Comment
2021-10-18 17:50:30 ETHICAL HACKING 2021

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization's security posture.

Modules of Ethical Hacking

Footprinting and Reconnaissance

Scanning

Enumeration

System Hacking

Malware Threats

Sniffing

Social Engineering

Denial of Service

Session Hijacking

Hacking Web Servers

Web Application Attacks

SQL Injection

Hacking Wireless Networks

Hacking Mobile Devices

Evading Firewall/IDS and Honey Bots

Cryptography

Cloud Computing

Course Link
https://mega.nz/folder/HldHkSJD#jYRQtC67Ibsg36J4yOdwVA

Pass=@its_me_kali

Note
If interested to learn open source intelligence or Doxing, then check below article.

https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08


Regards=@CIDHUB
393 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 14:50
Open / Comment