cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

BhinnekaSec1337

Part of BogorWanien Team | Security Just illusion | We Are Party in your Security | IndonesianHack | LeakingTools Contact @God7Society www.instagram.com/bhinnekasec1337 @BhinnekaService | BhinnekaSec service

إظهار المزيد
مشاركات الإعلانات
937
المشتركون
لا توجد بيانات24 ساعات
+17 أيام
-10430 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

All Shodan dork.txt0.11 KB
👍 3
Exploring Shodan: The Search Engine for the Internet of Things Introduction to Shodan Shodan is often referred to as the "Google for hackers," but it’s much more than that. Shodan is a search engine that allows users to discover devices connected to the internet. Unlike traditional search engines like Google that index web pages, Shodan indexes information about the devices themselves. This includes webcams, routers, servers, smart TVs, traffic lights, industrial control systems, and more. What is Shodan? Shodan was created by John Matherly in 2009 and has since become a crucial tool for cybersecurity professionals and researchers. It works by scanning the internet and collecting information from various connected devices. Shodan captures details such as the type of device, its operating system, geographic location, and even its software version. This data can be invaluable for identifying vulnerabilities and understanding the landscape of the Internet of Things (IoT). Functions of Shodan Shodan serves several key functions: 1. Device Discovery: Shodan helps users find specific types of devices on the internet. This can include anything from home automation systems to industrial control systems. 2. Security Research: Cybersecurity professionals use Shodan to identify vulnerable devices. By searching for devices with outdated firmware or known security flaws, they can assess the security posture of different networks. 3. Network Monitoring: Organizations use Shodan to monitor their own networks. By seeing what devices are exposed to the internet, they can better manage and secure their infrastructure. 4. Data Collection and Analysis: Researchers and analysts use Shodan to gather data for studies on the proliferation and security of IoT devices. How to Use Shodan Using Shodan is relatively straightforward, but there are some advanced features that can be incredibly powerful. Here’s a step-by-step guide on getting started with Shodan: 1. Create an Account: While you can perform basic searches without an account, creating an account on the Shodan website (www.shodan.io) gives you access to more features and increased usage limits. 2. Perform a Basic Search: Start by entering a simple query into the search bar. For example, searching for "webcam" will return a list of internet-connected webcams. 3. Use Filters: Shodan offers a variety of filters to refine your search. You can filter by country (country:US), operating system (os:Windows), port number (port:80), and more. These filters help you narrow down the search results to devices of interest. 4. Analyze the Results: Each result provides detailed information about the device, including its IP address, location, and a summary of the services running on it. You can click on each result to get more details. 5. Advanced Searches: For more complex queries, Shodan supports advanced search operators. For instance, you can search for devices with a specific version of software that might be vulnerable (product:Apache version:2.4.1). Examples of Using Shodan To illustrate the capabilities of Shodan, here are a few practical examples: 1. Finding Vulnerable Industrial Control Systems: By searching for terms like SCADA or PLC, you can find industrial control systems that are connected to the internet. These systems often control critical infrastructure and can be a target for cyber attacks. 2. Identifying Exposed Databases: A search for port:27017 reveals MongoDB databases that are accessible on the internet. Similarly, port:3306 can be used to find MySQL databases. These searches can help identify unsecured databases that might contain sensitive information. 3. Locating IoT Devices: Searches like default password or admin can uncover devices that are using default credentials. These devices are highly vulnerable to being hacked.
إظهار الكل...
Photo unavailableShow in Telegram
إظهار الكل...
🔥 4
The Rise of Kevin Mitnick: The World's Most Famous Hacker Kevin Mitnick's name is synonymous with hacking. Often referred to as the "world's most famous hacker," Mitnick's journey from a curious teenager to a legendary figure in the cybersecurity world is a story of ingenuity, controversy, and redemption. Early Days: A Passion for Technology Mitnick's hacking career began in the late 1970s when he exploited the Los Angeles bus system's punch card system to get free rides. His passion for understanding and manipulating systems only grew from there. By the age of 16, he had broken into the computer network of Digital Equipment Corporation (DEC), a major American company. The Notorious Hacker Throughout the 1980s and early 1990s, Mitnick embarked on a hacking spree that targeted some of the largest corporations in the United States, including IBM, Nokia, and Motorola. He didn't hack for financial gain; instead, he was driven by the challenge and thrill of outsmarting sophisticated security systems. Mitnick's exploits became legendary. He hacked into the voicemail systems of Pacific Bell, stole computer manuals, and evaded FBI capture for years, making him a notorious figure in the hacking community and beyond. Capture and Incarceration In 1995, Mitnick's luck ran out. After a highly publicized chase, the FBI finally captured him. Mitnick was charged with multiple counts of wire fraud and computer fraud. He spent five years in prison, including eight months in solitary confinement. During his trial, he was accused of causing millions of dollars in damages, although these figures were later contested. Redemption and Legacy After his release in 2000, Mitnick turned his life around. He used his skills for good, becoming a leading cybersecurity consultant and public speaker. His autobiography, "Ghost in the Wires," became a bestseller, providing an insider's view of his hacking adventures and the evolution of the cybersecurity landscape. Mitnick's transformation from a notorious hacker to a respected security expert highlights the dual nature of hacking—its potential for both harm and good. His story serves as a cautionary tale and a source of inspiration, demonstrating that redemption is possible even for those who stray far off the path. Why Kevin Mitnick is Famous 1. Technical Mastery: Mitnick's ability to bypass advanced security systems with ease made him a legend in the hacking community. 2. High-Profile Targets: His exploits against major corporations and government systems drew significant media attention. 3. Cat-and-Mouse Game with the FBI: Mitnick's prolonged evasion of federal authorities captivated the public and media, enhancing his notoriety. 4. Transformation and Redemption: His post-incarceration career as a cybersecurity expert and author added a positive dimension to his legacy, showcasing his expertise and advocating for better security practices.
إظهار الكل...
👍 1
Photo unavailableShow in Telegram
Top 10 Tools Every Ethical Hacker Should Know In the ever-evolving world of cybersecurity, ethical hackers play a crucial role in identifying and mitigating vulnerabilities before malicious actors can exploit them. To be effective in this role, ethical hackers rely on a suite of powerful tools that help them probe, test, and secure systems. Whether you're a seasoned professional or just starting out in the field, here are the top 10 tools every ethical hacker should have in their arsenal. 1. Nmap (Network Mapper) Nmap is a versatile open-source tool used for network discovery and security auditing. It can identify devices on a network, discover open ports, and detect services and operating systems. Nmap is essential for network mapping and vulnerability scanning. 2.Wireshark Wireshark is a network protocol analyzer that allows ethical hackers to capture and inspect data packets in real-time. It's invaluable for troubleshooting network issues, analyzing network traffic, and detecting anomalies. 3.Metasploit Framework Metasploit is a powerful penetration testing platform that provides information about security vulnerabilities and aids in exploiting them. It is widely used for developing and executing exploit code against remote targets. 4. Burp Suite Burp Suite is a comprehensive web application security testing tool. It helps identify vulnerabilities in web applications through features like spidering, proxying, and automated scanning. The suite is essential for ethical hackers focusing on web security. 5. John the Ripper John the Ripper is a popular password cracking tool used to perform dictionary attacks, brute force attacks, and other methods to identify weak passwords. It's a critical tool for testing password strength and security. 6.Nessus Nessus is a widely used vulnerability scanner that helps identify potential vulnerabilities in networks, systems, and applications. It provides detailed reports and recommendations for remediation, making it indispensable for security assessments. 7.Aircrack-ng Aircrack-ng is a suite of tools for auditing wireless networks. It includes utilities for capturing packets, deauthenticating clients, cracking WEP and WPA-PSK keys, and testing Wi-Fi security. 8.Hydra Hydra is a fast and flexible network login cracker. It supports numerous protocols and is capable of performing dictionary and brute force attacks to test the security of network services like FTP, SSH, and HTTP. 9. SQLmap SQLmap is an automated tool for detecting and exploiting SQL injection vulnerabilities in web applications. It supports a wide range of database management systems and helps ethical hackers identify and mitigate SQL injection risks. 10.OpenVAS (Open Vulnerability Assessment System) OpenVAS is an open-source vulnerability scanner and manager. It offers a wide range of scanning capabilities to detect security issues and provides detailed reporting and remediation suggestions.
إظهار الكل...
1
Photo unavailableShow in Telegram
White Hat vs. Black Hat: The Ethics of Hacking In the realm of cybersecurity, the terms "white hat" and "black hat" refer to two distinct types of hackers with very different intentions and methods. Understanding these differences is crucial not only for those in the tech industry but also for anyone interested in how digital security works. This article explores the ethical divide between white hat and black hat hackers and why this distinction is so important. What is a White Hat Hacker? White hat hackers are the "good guys" in the hacking world. They use their skills to identify and fix security vulnerabilities in systems, often working as security professionals or ethical hackers. Companies and organizations hire white hat hackers to perform penetration testing, which involves simulating cyberattacks to find and fix weaknesses before malicious hackers can exploit them. The primary goal of white hat hackers is to enhance security and protect sensitive data. Key Characteristics of White Hat Hackers: - Ethical Intentions: Their work is guided by a strict code of ethics. They have permission from the system owners to test and improve security. - Professional Training: Many white hat hackers are certified through programs like Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP). - Legal Work: They operate within the bounds of the law and often collaborate with businesses and governments to strengthen cybersecurity. What is a Black Hat Hacker? In contrast, black hat hackers are individuals who engage in illegal activities for personal gain, such as stealing data, committing fraud, or causing disruption. These hackers exploit vulnerabilities in systems without permission, and their actions can lead to significant financial and reputational damage for individuals and organizations. Key Characteristics of Black Hat Hackers: - Malicious Intentions: Their primary motivations are often financial gain, political reasons, or personal satisfaction from causing chaos. - Illegal Activities: They engage in activities like hacking into systems, spreading malware, and stealing sensitive information. - Lack of Ethics: Unlike white hat hackers, black hat hackers disregard legal and ethical standards, often causing harm without any regard for the consequences. The Ethical Divide The fundamental difference between white hat and black hat hackers lies in their intentions and adherence to legal and ethical standards. White hat hackers aim to protect and defend, while black hat hackers seek to exploit and harm. This ethical divide is critical because it shapes the entire approach and impact of their actions. Why Ethics Matter in Hacking: - Protecting Privacy: Ethical hackers help protect personal and sensitive information from being exposed or stolen. - Maintaining Trust: Businesses and consumers rely on the integrity of systems and networks, and ethical hacking helps maintain this trust. - Legal Implications: Engaging in unethical hacking activities can lead to severe legal consequences, including imprisonment and hefty fines. The Role of Grey Hat Hackers It's also worth mentioning grey hat hackers, who fall somewhere in between white hat and black hat hackers. Grey hats might exploit vulnerabilities without permission but typically do so without malicious intent, often disclosing the issues to the system owners afterward. While their intentions might not be harmful, their methods can still raise ethical and legal concerns.
إظهار الكل...
👍 1
Some poc deface! 1. Kindeditor 2. Drupal 3. Webdav 4. Kcfinder 5. Fckeditor 6. Elfinder 7. Com media 8. Com fabrik 9. Balitbang 10. Ojs 11. Jso 12. css simple 13. Rfm 14. tar.tmp 15. Socket 16. Take over 17. dorking 18. bypas 19. Wp-admin 20. Wp-content 21. Wp-dreamwork 22. Wp-gallery 23. Slims 24. Cbt25. xss 26. Register mem 27. Scr 28. Ifm 29. hepdesk 30. Com sexy 31. Com gbu 32. Com eslamiat 33. Com peliculas 34. Sql injection 35. poc shockwave 36. poc thimtumb 37. sql cms 38. sql lokomedia 39. add admin user 40. viral options 41. phuploder 42. cffm file 43. sql with dios 44. rfi 45. poc union bas sql 46. local file (lfi) 47. jfu 48. revslider 49. restricted area 50. easy file sharing 51. aspx uploder 52. csrf file uplod vuln 53. uploadify 54. laravel file manager 55. Tinymcpuk Mediatech 56. autoindex 57. Wp Themify Arbitrary File Upload 58. jdownloads 59. symlink 60. jumping 61. grab config 62. Proc/Self/Environ 63. aspx 64. sitefinity editor 65. effi file manager 66. technocgi 67. file attectment 68. spaw vuln 69. arbitari 70. css inject 71. array file 72. com fox contat 73. ftp 74. ajax 75. uber upload 76. com user 77. namastecms 78. hiangraientersoft HTML Injection Vulnerability 79. media creative center 80. robotstats admin robots 81. Fox Contact With Auto Exploiter 82. wp-install 83. Interspire Email marketer 84. Com Fox RCE 85. WordressSantosiTheam 86. DreamworkGallery 87. WordpressGhost 88. Portal Dekeos 89. sqli with dios 90. Joomla com_djclassifieds 91. Magento Auto Exploit 92. Sql Balitbang 93. Balitbang 3.5.3 94. Generator 95. RCE Technote CGI Exploit 0.4 96. 404 Uploader 97. 403 Uploader 98. 405 Uploader 99. Timthumb Rfi 100. Register Taxi 101.ParkedDomain 102.Bypass Admin 103.Bypass Sql 104.Take Over Domain 105.Sym 106.Bug Interaktif click 107.Joomla BruteForce 108.Sql Balitbang 109.Laravel PHP Unit 110.Xss 111.Dns Hijacking 112.Sql lokomedia
إظهار الكل...
4👍 2