Universal anonymous
Join all' fans. I will upload best hacking method for increasing you skills and make a anonymous on this World...⚠️𝗗𝗶𝘀𝗰𝗹𝗮𝗶𝗺𝗲𝗿 ⚠️ this post almost forwarded other channels or group we are store documents for you
Ko'proq ko'rsatishMamlakat belgilanmaganTil belgilanmaganToif belgilanmagan
726
Obunachilar
Ma'lumot yo'q24 soatlar
Ma'lumot yo'q7 kunlar
Ma'lumot yo'q30 kunlar
- Kanalning o'sishi
- Post qamrovi
- ER - jalb qilish nisbati
Ma'lumot yuklanmoqda...
Obunachilar o'sish tezligi
Ma'lumot yuklanmoqda...
🔰 Motion Ninja Pro Video Editor Version: v1.1.2.1 (Latest) 🔰
⭕ Features of Mod :-
▪️Key Frame & Animation Editor
▪️Best After Effects Video Editor
▪️Chroma Key & Green Screen
▪️Video Filters, Transition & more
▪️Photo Slideshow Video Maker
▪️Funny Video Editor, Meme Maker
▪️Premium subscription unlocked
Motion_Ninja_v1.1.2.1_Pro.apk25.17 MB
TEMPO - MUSIC VIDEO EDITOR V2.3.8 [PRO].apk
https://play.google.com/store/apps/details?id=com.tempo.video.edit
Mod Info:
๏ Pro Features Unlocked
๏ Full HD Export Unlocked
๏ Watermark Removed
๏ AOSP Compatible (No Google)
๏ Multi Languages
๏ Debug Info Removed.
TEMPO - MUSIC VIDEO EDITOR V2.3.8 [PRO].apk77.89 MB
Заметки на полях: Microsoft Incident response playbook
Ежедневно атакам подвергаются сотни организаций. А у крупных организаций инциденты безопасности происходят каждый день. Большое количество инцидентов, в конечном итоге, очень плохо влияет на BlueTeam - глаз замыливается и какие-то действительно серьезные инциденты пропускаются.
Пропуск инцидентов еще усугубляется тем, что не у всех организаций (даже крупных) есть инструкция (или playbook) о том, как надо обрабатывать инциденты, на что обращать внимание, как расследовать. Нет каких-то чеклистов, чтобы быстро посмотреть, проверить, сохранить и потом (в случае необходимости) вернуться к инциденту.
У компании Microsoft есть небольшой гайд по тому как реагировать на самые распространенные типы атак.
Под самыми распространенными понимают всего 3 вида атак:
1) Фишинг
2) password spraying
3) Предоставление разрешения для приложения - предоставление разрешений приложению для доступа к каким-то данным пользователя или организации (например, была распространенная фишинговая атака, когда злоумышленник создавал свое приложение и оно просило доступ к авторизационным данным пользователя)
Конечно, playbook от Microsoft ориентирован больше на их продукты - Azure Sentinel, Azure AD.
Но схемы процесса для расследования и чеклисты - очень информативные и полезные - их можно использовать для построения процессов в своей компании.
Очень рекомендуем ознакомиться - https://docs.microsoft.com/en-us/security/compass/incident-response-playbooks и составить playbook для своей организации. Или хотя бы иметь представление, где можно посмотреть, если на данный момент не актуально
Translation: ru-en
Side note: Microsoft Incident response playbook
Hundreds of organizations are attacked daily. And large organizations have security incidents every day. A large number of incidents, in the end, has a very bad effect on the BlueTeam - the eye is blurred and some really serious incidents are missed.
Skipping incidents is further aggravated by the fact that not all organizations (even large ones) have an instruction (or playbook) on how to handle incidents, what to look for, how to investigate. There are no checklists to quickly view, check, save and then (if necessary) return to the incident.
Microsoft has a short guide on how to respond to the most common types of attacks.
Under the most common understand only 3 types of attacks:
1) Phishing
2) password spraying
3) Granting permission for the application - granting permissions to the application to access some user or organization data (for example, there was a common phishing attack when an attacker created his application and it asked for access to the user's authorization data)
Of course, Microsoft's playbook is focused more on their products - Azure Sentinel, Azure AD.
But Investigative Process Diagrams and Checklists are very informative and useful - they can be used to build processes in your company.
We highly recommend that you read https://docs.microsoft.com/en-us/security/compass/incident-response-playbooks and compile a playbook for your organization. Or at least have an idea where you can look if it is not relevant at the moment
Incident response playbooks
Use these playbooks to quickly respond to security incidents in the Microsoft cloud.
Repost from JUST HACKED 😈
#ᴶᵁˢᵀᴴᴬᶜᴷᴱᴰиєтωσяк
NOW THE LAST TOPIC OF THIS POST "SCADA" OR "ICS" (INDUSTRIAL CONTROL SYSTEM)
THESE ALSO MACHINES USED IN INDUTRIES AND ORGNISATIONS
SCADA Communication Protocols
There are multiple communication protocols used in SCADA or Industrial Control Systems (ICS). Unlike Ethernet or Internet Protocols (IP), the industrial control industry uses multiple protocols, often unique to the manufacturer of the programmable logic controllers (PLC). Although there are many protocols, some of the more popular communication protocols within these systems are;
modbus port 502
dnp port 19999
dnp3 port 20000
fieldbus port 1089-91
ethernet/IP port 2222
etherCAT port 34980
profinet port 34962-64
You should be able to find other SCADA devices by searching for ports 19999, 20000, 1089-1091, 2222, 34980, and 34962-34964.
THESE ARE SOME FOLLOWNIG PORT S ICS RUN SERVICES
NOW THE QUESTION IS HOW TO FIND ALL THE SYSTEM WITH FOLLOWING SERVICES ?
ANS : SHODAN
USE > port:502
so here we coverd all creepy stuff of internet from basic to intermediate
see you in post 2 for more advance stuff
follow : @justhacked_channel for more :)
⚡ @justhackednetwork ⚡
JOIN HERE
Repost from JUST HACKED 😈
Photo unavailableShow in Telegram
SCADA Hacking: Finding SCADA Systems using Shodan
HI TODAY WE ARE GOING TO LEARN ALL ABOUT :
- SHOADN
- DORKING (OSINT)
- SCADA HACKING BASICS
- FINDING VURNABLE SYSTEM OVER THE INTERNET
#shodanbasictopro
SO HERE WE START WITH BASICS :)
WHAT IS SHOADAN ?
ITS A SIMPLE SEARCH ENGINE WHICH INDEX ALL DEVICE WHICH ARE CONNECTED TO INTERNET IN THE FORM OF IP ;
HOW TO USE IT ?
GO TO
https://www.shodan.io/search?query= "YOUR IDEA HERE"
ENTER YOU QUERY IN THE SERCH OPTION
#SERACHING=HACKING
YOU ARE FEMILER WITH THE BASICS
NOW WE WILL MOE TO RECON PART
AS YOU ALL KNOW FOR FIDING UNIQUE (TARGATED) STUFF ON
GOOGLE INTERNET :) WE USE DORKS ; WE DO SAME HERE ; JUST DIFFRENT QUERY
#dig shoadan.io
DORK FOR COUNTRY
> country:in
DORK FOR OS
> os:"windows server 2007"
DORK FOR WEBPAGE TITTLE
> http.title:JUSTHACKEDNETWORK
SO HERE ARE SOME DORKS
EXAMPLE TO FIND A VURNABLE SYSTEM TO FIND VULNARABLITY
country:in os:"windows server 2007"server: apache http.title:"Index of /"
HOPE YOU GOT IT
Photo unavailableShow in Telegram
#ScanPro - NMap Scanning Scripts
ScanPro Menu
[1] Target Selection
[2] Port Selection
[3] Scan Types
[4] Service and Operating System Detection
[5] Output formats
[6] NSE Scripting
[7] HTTP info gathering
[m] Main Menu
https://github.com/Anlominus/ScanPro
Post credit DwiseC
📓 Maltego Handbook for Social Media Investigations
Post credit DwiseC
Maltego Handbook for Social Media Investigations.pdf3.71 MB
#Free And Fresh Always Auto-updated SOCKS5 SOCKS4 Proxy list Http Https Proxies
https://github.com/fate0/proxylist
https://github.com/ShiftyTR/Proxy-List
https://github.com/rdavydov/proxy-list
https://github.com/mmpx12/proxy-list
https://github.com/IshanSingla/proxy-list
https://github.com/monosans/proxy-list
https://github.com/S767/proxycheck
https://github.com/UptimerBot/proxy-list
https://github.com/TheSpeedX/PROXY-List
https://github.com/aswin-m-p/proxy-list
https://github.com/reny311/proxy
https://github.com/Volodichev/proxy-list
https://github.com/RX4096/proxy-list
https://github.com/manuGMG/proxy-365
https://github.com/HyperBeats/proxy-list
https://github.com/Koshsky/proxy-getter
https://github.com/mertguvencli/http-proxy-list
https://github.com/roosterkid/openproxylist
https://github.com/hookzof/socks5_list
https://github.com/ObcbO/getproxy
https://github.com/jetkai/proxy-list
https://github.com/yuewei5215/Proxies-1
https://github.com/clarketm/proxy-list
https://github.com/sunny9577/proxy-scraper
https://github.com/stamparm/fetch-some-proxies
https://github.com/almroot/proxylist
https://github.com/takelley1/proxy-servers
https://github.com/ph4ntonn/Stowaway
https://github.com/proxyips/proxylist
https://github.com/vaitan/proxy-list
https://github.com/h4mid007/free-proxy-list
Post credit DwiseC
Photo unavailableShow in Telegram
🔥Recharges Available at Discount 🔥
Airtel
Vi
Jio
DTH AVAILABLE
🔥At 20% off
📌100% safe
Inbox @The_Xcell
Note : 10-20 minutes
ESCROW / Payment First
📌100% Safe
Photo unavailableShow in Telegram
🔥Recharges Available at Discount 🔥
Airtel
Vi
Jio
DTH AVAILABLE
🔥At 20% off
📌100% safe
Inbox @The_Xcell
Note : 10-20 minutes
ESCROW / Payment First
📌100% Safe