Forwarded from π₯Just hackedπ₯ (α΄α΄κ±α΄Κα΄α΄α΄α΄α΄
β’)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Freelearningtech
https://www.linkedin.com/posts/cybritexsecurity_revil-ransomware-gang-goes-underground-after-activity-6855790240699863040-7OwI
REvil, the notorious Ransomware Group
REvil, the notorious Ransomware Group
Linkedin
Cybritex Security on LinkedIn: REvil Ransomware Gang Goes Underground After Tor Sites Were Compromised
#REvil, the notorious #ransomware group responsible for a number of cyberattacks in the recent past, appears to have gone off the radar once again after...
Forwarded from Pentest With Rohit (shiv Sploit)
Forwarded from Pentest With Rohit (shiv Sploit)
Shell_Forum
LARAVEL DEBUG MODE LEAK(SENSITIVE INFO)
Please register or login to view this content.
Forwarded from Freelearningtech
https://forum.shellcrew.org/topic/62-cheat-sheet-for-requests-library-python/
Make Sign Up to Get much More Amazing and informative content Regarding Tech & CyberSec
Make Sign Up to Get much More Amazing and informative content Regarding Tech & CyberSec
Shell_Forum
Cheat Sheet for requests library (python)
Please register or login to view this content.
HTB Pentesting Labs
https://forum.shellcrew.org/topic/64-htb-pentesting-labs/?do=findComment&comment=85
CTF(Capture The Flag) - Hack the Box π©βπ»β₯οΈπ«β¨
If you are looking for opportunities to expand your horizons and learn more about digital security. Then CTF is probably the Stuff you should give it a Try & HTB(Hack the Box) is one such example. Here I'm going to Share the Top Pentesting Labs you should Venture and Aim for if You are having an higher level of Appetite.
~ With Best Regards MR.MIME βοΈπ« Happy Learning
https://forum.shellcrew.org/topic/64-htb-pentesting-labs/?do=findComment&comment=85
CTF(Capture The Flag) - Hack the Box π©βπ»β₯οΈπ«β¨
If you are looking for opportunities to expand your horizons and learn more about digital security. Then CTF is probably the Stuff you should give it a Try & HTB(Hack the Box) is one such example. Here I'm going to Share the Top Pentesting Labs you should Venture and Aim for if You are having an higher level of Appetite.
~ With Best Regards MR.MIME βοΈπ« Happy Learning
Forwarded from JUST HACKED { PAID CHANNEL 30$ }
Choose one of it for your career ?
Anonymous Poll
28%
White hat { benifits: employed , legal , safe , no security measures required , job in company}
29%
Black hat { benifits: illegal , lot of money , no job , no company , alot risk , remain anonymous}
28%
Both (can decide my own feature)
15%
Don't know anything but wanted in to cybersecurity
This media is not supported in your browser
VIEW IN TELEGRAM
Hey guys.
We have launched an amazing platform for you named *Shell_Crew*.
Here you will find amazing forum, meeting application which is self-reliant, and chatting application as well!
We have launched an amazing platform for you named *Shell_Crew*.
Here you will find amazing forum, meeting application which is self-reliant, and chatting application as well!
All this is for _Free_ and the content that will be shared on forum will be really helpful for all of you and its related to _Cybersecurity and Technology._
We hope you will like our efforts that we have made for you all. So do visit the site and enjoy the services!!!
*Server link-* shellcrew.org
*Website link-* root.shellcrew.org
*Forum link-* forum.shellcrew.org
*Meet link-* meet.shellcrew.org
*Chatbot link-* chat.shellcrew.org
Use the mentioned YouTube link and follow the instructions for getting registered successfully on our sites.
*Link-* https://youtu.be/sApHKubBmTQ
_We hope you to see you soon!π€π»_
*Do visit and signup for Free & Quality Servicesπ₯*
*_Thankyou_*
We hope you will like our efforts that we have made for you all. So do visit the site and enjoy the services!!!
*Server link-* shellcrew.org
*Website link-* root.shellcrew.org
*Forum link-* forum.shellcrew.org
*Meet link-* meet.shellcrew.org
*Chatbot link-* chat.shellcrew.org
Use the mentioned YouTube link and follow the instructions for getting registered successfully on our sites.
*Link-* https://youtu.be/sApHKubBmTQ
_We hope you to see you soon!π€π»_
*Do visit and signup for Free & Quality Servicesπ₯*
*_Thankyou_*
YouTube
Official ShellCrew Environment (Full Explaination)
Full-on explanation of how to use Shell_Crew Server/Environment and all the services associated with it. A detailed walkthrough of every service that is built and maintained by Team Shell_Crew. Hope this proves to be a boon for all those students who areβ¦
Forwarded from Freelearningtech
https://www.linkedin.com/company/cybritexsecurity
FOLLOW ββ>
CYBRITEX SECURITY
AT LINKEDIN TO GET MORE CONTENTS RELATED TECH & CYBER-SECURITY π
FOLLOW ββ>
CYBRITEX SECURITY
AT LINKEDIN TO GET MORE CONTENTS RELATED TECH & CYBER-SECURITY π
Penetration Testing Guide ( for beginners )
https://forum.shellcrew.org/topic/65-penetration-testing-guide-for-beginners/?do=findComment&comment=86
π°Penetration Testingπ°
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix.
Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters β
>what will be the time of penetration test,
>where will be the IP source of the attack, and
>what will be the penetration fields of the system.
Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.
βοΈTypes of Penetration Testing
1οΈβ£Black Box β Here, the ethical hacker doesnβt have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.
2οΈβ£Grey Box β It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.
3οΈβ£White Box β In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.
4οΈβ£External Penetration Testing β This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.
5οΈβ£Internal Penetration Testing β In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.
Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead with penetration testing. The risk is calculated as follows and it is a management risk.
βΌοΈ Share and support us βΌοΈ
https://forum.shellcrew.org/topic/65-penetration-testing-guide-for-beginners/?do=findComment&comment=86
π°Penetration Testingπ°
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix.
Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters β
>what will be the time of penetration test,
>where will be the IP source of the attack, and
>what will be the penetration fields of the system.
Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.
βοΈTypes of Penetration Testing
1οΈβ£Black Box β Here, the ethical hacker doesnβt have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.
2οΈβ£Grey Box β It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.
3οΈβ£White Box β In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.
4οΈβ£External Penetration Testing β This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.
5οΈβ£Internal Penetration Testing β In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.
Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead with penetration testing. The risk is calculated as follows and it is a management risk.
βΌοΈ Share and support us βΌοΈ
Basic Interview Questions in CyberSec Jobs(Freshers)
https://forum.shellcrew.org/topic/66-basic-interview-questions-in-cybersec-jobsfreshers/?do=findComment&comment=87
Interview questions that were asked to me last week hope this helps ppl here for interview preparations:
Started with introduction and few things from my resume.
Then asked
1)Why cybersecurity?why are you interested in this domain?
2)what part of cybersecurity your more interested in and what are you currently learnig?
3) whats web application security?give an example why is it necessary?can you give another example? How do u fix those vulnerabilities?
4)what is risk?
5)what is vulnerability?
6)what are 4 mitigations of risk?
7)as you have opted specialization in computer networs can i ask few qts from this? what is a network?
8)whats is load balancing,.?
9. Name the osi layers
10.whats datalink layer
11.whats session layer with example
12 .wats arp whats its purpose?
13.wats arp poisoning?
14.what is firewall whats its purpose?whats honey pot?where is it placed infront or behind firewall?
15.whats ids and ips how are they different?
https://forum.shellcrew.org/topic/66-basic-interview-questions-in-cybersec-jobsfreshers/?do=findComment&comment=87
Interview questions that were asked to me last week hope this helps ppl here for interview preparations:
Started with introduction and few things from my resume.
Then asked
1)Why cybersecurity?why are you interested in this domain?
2)what part of cybersecurity your more interested in and what are you currently learnig?
3) whats web application security?give an example why is it necessary?can you give another example? How do u fix those vulnerabilities?
4)what is risk?
5)what is vulnerability?
6)what are 4 mitigations of risk?
7)as you have opted specialization in computer networs can i ask few qts from this? what is a network?
8)whats is load balancing,.?
9. Name the osi layers
10.whats datalink layer
11.whats session layer with example
12 .wats arp whats its purpose?
13.wats arp poisoning?
14.what is firewall whats its purpose?whats honey pot?where is it placed infront or behind firewall?
15.whats ids and ips how are they different?
Penetration Testing Guide ( for beginners )
https://forum.shellcrew.org/topic/67-penetration-testing-guide-for-beginners/?do=findComment&comment=88
π°Penetration Testingπ°
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix.
Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters β
>what will be the time of penetration test,
>where will be the IP source of the attack, and
>what will be the penetration fields of the system.
Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.
βοΈTypes of Penetration Testing
1οΈβ£Black Box β Here, the ethical hacker doesnβt have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.
2οΈβ£Grey Box β It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.
3οΈβ£White Box β In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.
4οΈβ£External Penetration Testing β This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.
5οΈβ£Internal Penetration Testing β In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.
Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead with penetration testing. The risk is calculated as follows and it is a management risk.
βΌοΈ Share and support us βΌοΈ
https://forum.shellcrew.org/topic/67-penetration-testing-guide-for-beginners/?do=findComment&comment=88
π°Penetration Testingπ°
Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix.
Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters β
>what will be the time of penetration test,
>where will be the IP source of the attack, and
>what will be the penetration fields of the system.
Penetration testing is conducted by professional ethical hackers who mainly use commercial, open-source tools, automate tools and manual checks. There are no restrictions; the most important objective here is to uncover as many security flaws as possible.
βοΈTypes of Penetration Testing
1οΈβ£Black Box β Here, the ethical hacker doesnβt have any information regarding the infrastructure or the network of the organization that he is trying to penetrate. In black-box penetration testing, the hacker tries to find the information by his own means.
2οΈβ£Grey Box β It is a type of penetration testing where the ethical hacker has a partial knowledge of the infrastructure, like its domain name server.
3οΈβ£White Box β In white-box penetration testing, the ethical hacker is provided with all the necessary information about the infrastructure and the network of the organization that he needs to penetrate.
4οΈβ£External Penetration Testing β This type of penetration testing mainly focuses on network infrastructure or servers and their software operating under the infrastructure. In this case, the ethical hacker tries the attack using public networks through the Internet. The hacker attempts to hack the company infrastructure by attacking their webpages, webservers, public DNS servers, etc.
5οΈβ£Internal Penetration Testing β In this type of penetration testing, the ethical hacker is inside the network of the company and conducts his tests from there.
Penetration testing can also cause problems such as system malfunctioning, system crashing, or data loss. Therefore, a company should take calculated risks before going ahead with penetration testing. The risk is calculated as follows and it is a management risk.
βΌοΈ Share and support us βΌοΈ
https://www.linkedin.com/posts/cybritexsecurity_cybersecurity-cyber-security-activity-6856958661068230656-m1aI
Skills To Acquire in Cybersecurity...
Skills To Acquire in Cybersecurity...