Hacker Habesha 🇪🇹Ethiopian Hackers Arise 🇪🇹ሀከር ሀበሻ


Kanal geosi va tili: Efiopiya, Inglizcha
Toifa: Darknet


"Join our Ethiopian ethical hackers channel for exclusive hacking tutorials📽, tools🛠, Info🔉 and also hacking, programing, Networking and cybersecurity resources🧰. Learn and grow with us!"😉

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Efiopiya, Inglizcha
Toifa
Darknet
Statistika
Postlar filtri






Social Media OSINT Tools Collection

https://github.com/osintambition/Social-Media-OSINT-Tools-Collection

A collection of most useful osint tools for SOCINT


Join @hacker_habesha🇪🇹


🧅Tor Tools

🔹Nipe - Script to redirect all traffic from the machine to the Tor network.
🔗https://github.com/GouveaHeitor/nipe

🔹OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
🔗https://onionscan.org/

🔹Tails - Live operating system aiming to preserve your privacy and anonymity.
🔗https://tails.boum.org/

🔹Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
🔗https://www.torproject.org/

🔹dos-over-tor - Proof of concept denial of service over Tor stress test tool.
🔗https://github.com/skizap/dos-over-tor

🔹kalitorify - Transparent proxy through Tor for Kali Linux OS.
🔗https://github.com/brainfuckSec/kalitorify

✌️👉Join:@hacker_habesha🇪🇹
Join:@hacker_habesha🇪🇹


🤤 How to Become an Ethical Hacker in 8 Months 🇪🇹


1.   Start from the Basics (Month 1)

-Basic Computer Skills
-Intro to Cybersecurity
-CIA Triads
-Intro to Ethical Hacking
-PenTesting
-Phases of Ethical Hacking.

2.  Learn Networking Concepts (Month 2)

-Network Basics
-IP and MAC Address
-Ports
-Topology
-OSI Model
-TCP and UDP

3.   Learn some Programming Languages (Month 3 & 4)

-Python
-JavaScript
-HTML
-Shell Scripting

4. Database Skills (Month 5)

-SQL

5.  Get Hands-on Experience (Month 6 &7)

-Get well versed on Kali Linux
-Practice on Platforms like TryHackMe and HackTheBox e.t.c.

6.  Explore other Cybersecurity Techniques (Month 8)

-Password Cracking
-WI-FI Hacking
-Steganography
-Web Hacking
-Social Engineering
-Dark Web
-Google Dorking

😎 Note- The Learning Process Never Ends.... It Keeps Going Like that

🤘Join
👉@hacker_habesha🇪🇹

🔥 Give 20+ Reactions it really Motivates us ⬆️




🖥 100 Web Vulnerabilities, categorized into various types : 😀

⚡️ Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)


⚡️ Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse

⚡️ Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakag
e
25. Unencrypted Data Storage
26. Missing Securit
y
Headers
27. Insecure File Handling

⚡️ Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improp
er Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration

⚡️ XML-Related Vulnerabilities:
37. XML Ext
ernal Entity (XXE) Injection
3
8. XML Entity Expansion (XEE)
39. XML Bomb

⚡️ Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forcef
ul Browsing
44. Missing Function-Level Access Control

⚡️ Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection

️ API Security Issues:
48. Insecure
A
PI Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation

⚡️ Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure
Communication Protocols

⚡️ Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues

⚡️ Denial of Service (DoS):
61. Distributed Denial of Servi
ce (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of S
e
rvice

⚡️ Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTT
P Parameter Pollution (HPP)
68. Insecure Redir
e
cts and Forwards
69. File Inclusion
Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging
and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse

⚡️ Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure D
ata Transmission on Mobile Devices
78.
Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering

⚡️ IoT Web Vulnerab
ilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT D
evices
82
. IoT Device Vulnerabilities

⚡️ Web of Things (WoT) Vulnerabilities:
83. Unauthorized Acces
s to Smart Homes
84. IoT Data Privacy Issues

⚡️ Authentication Bypass:
85. Insecure "Remember Me" Functi
onality
86. CAPTCHA Bypass

⚡️ Serve
r-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF

⚡️ Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypa
ss
91. Content Security Policy (CSP) Bypass

⚡️ Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabil
ities
95. P
rice Ma
nipulation
96. Account Enumeration
97. User-Based Flaws

⚡️ Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched
Vulnerabilities
100. Day-Zero Exploits

👉Join: @hacker_habesha🇪🇹
👉Join: @hacker_habesha🇪🇹




🎣Social Engineering Attacks

🔖#infosec #cybersecurity #hacking #pentesting #security

👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹


🧬Popular HTTP Request Methods for Log Analysis

🔖#infosec #cybersecurity #hacking #pentesting #security

👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹


Video oldindan ko‘rish uchun mavjud emas
Telegram'da ko‘rish
🗝Plaintext vs Encoding vs Hashing vs Encryption

🔖#infosec #cybersecurity #hacking #pentesting #security

👉Join: @hacker_habesha
👉Join: @hacker_habesha🇪🇹


📋Cyber Security Periodic Table

🔖#infosec #cybersecurity #hacking #pentesting #security

👉Join: @hacker_habesha






The Hacker News dan repost
41% attacks bypass network security.

Defense-in-Depth isn't enough. Use AI-powered Cyber Threat Intelligence (CTI) and Breach & Attack Simulation (BAS) to test defenses against real-world attacks, uncover vulnerabilities.

Read to find the key: https://thehackernews.com/2024/01/perfecting-defense-in-depth-strategy.html


Video oldindan ko‘rish uchun mavjud emas
Telegram'da ko‘rish
**🚀 Exciting News! PicoCTF-Africa Online Training Series**

Hey everyone! 🌟

Hope you're all doing well! 🚀 I've got some exciting news - the PicoCTF-Africa online training series is kicking off on Jan 27! 🖥️ It's a fantastic opportunity for university undergrads & high schoolers interested in diving into the world of cybersecurity.

🔗 Register here: https://forms.gle/JhgPHzCVPWEx4uPNA

📅 Training starts: Jan 27

🌐 About:
🖥️Introduction to the cyber-Security concepts focusing on practical skills using a Capture The Flag (CTF) approach.
🖥️ Familiarizing with PicoCTF platform and getting ready for PicoCTF2024 competition.

📌 Poster Attached: Check out the poster and feel free to share this amazing opportunity with your friends and peers!

📢 Kindly share with your undergrad and high school colleagues! Let's make sure everyone gets a chance to join this cybersecurity adventure.


Got questions or need more info? Drop them here, and let's get ready for an awesome learning experience together! 🛡️✨



17 ta oxirgi post ko‘rsatilgan.

471

obunachilar
Kanal statistikasi