• Content Count

  • Avg. Content Per Day

  • Joined

  • Last visited

  • Days Won


dEEpEst last won the day on January 20

dEEpEst had the most liked content!

Community Reputation

35,507 Excellent

About dEEpEst

Recent Profile Visitors

57,795 profile views
  1. Tool To Be Used: Harvester Today we will learn about Information Gathering using theHarvester in Kali Linux. Good information gathering can make the difference between a successful penetration test and one that has failed to provide maximum benefit to the client. TheHarvester has been developed in Python by Christian Martorella. It is a tool which provides us information about e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key server. This tool is designed to help the penetration tester on an earlier stage; it is an effective, simple and easy to use. The sources supported are: Google – emails, subdomains Google profiles – Employee names Bing search – emails, subdomains/hostnames, virtual hosts Pgp servers – emails, subdomains/hostnames LinkedIn – Employee names Exalead – emails, subdomain/hostnames New features: Time delays between requests XML results export Search a domain in all sources Virtual host verifier Let’s get started, If you are using Kali Linux, open the terminal and type theharvester If not then it can be easily downloaded from here: [Hidden Content] Simply Download and extract it Provide execute permission to: by [chmod 755] Then simply run ./theharvester You will see similar to this: Here I am using kali linux. Tutorial: [Hidden Content]
  2. How Do I Protect My Computer From Bots? It’s Very Possible To Protect Your Computer From Bots, But it Takes Diligence And Knowing What To Look For. Use The Following Tips To Keep Your Computer Safe: *Install Firewalls To Block Malicious Attacks And Never Turn Them Off. *Use A Long And Complicated Password That Contains Numbers And Symbols. *Never Use The Same Password For Multiple Programs. *Install Quality Anti-Malware Software Such As Norton security to protect your device. *Ensure Software Is Up To Date, And Never Ignore System Updates. *Refrain From Using Flash Drives, Or Thumb Drives, In An Infected Computer.
  3. dEEpEst

    Cross-site Scripting (XSS)

    Cross-site Scripting (XSS) *Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the user’s browser. Vulnerable vehicles that are commonly used for Cross-site Scripting attacks are forums, message boards, and web pages that allow comments. * A web page or web application is vulnerable to XSS if it uses unsanitized user input in the output that it generates. This user input must then be parsed by the victim’s browser. XSS attacks are possible in VBScript, ActiveX, Flash, and even CSS. However, they are most common in JavaScript, primarily because JavaScript is fundamental to most browsing experiences.
  4. How To Create Android Apps Without Coding *These are the best sites for android application making without any coding : #1 AppsGeyser : AppsGeyser is a FREE service that converts your content into an App and makes your money. Your app will have all you need including messaging, social sharing, tabs and full support for HTML5 enhancements. But forget about the app, Apps geyser helps you to build a business and profit from mobile! #2 Appypie : Appy Pie is the fastest growing cloud based Mobile Apps Builder Software (App Maker) that allows users with no programming skills, to create Android and iPhone applications for mobiles and smartphones. #3 Buzztouch : Buzztouch is an open source “app engine” that powers tens of thousands of iPhone, iPad, and Android applications. Buzztouch is used in conjunction with the iOS and Androidsoftware developer kits (SDK’s). #4 Appyet : Using AppYet, anyone can create a professional Android app. There’s no programming knowledge required, only take a few minutes to build your first app. #5 Appclay : AppClay , conceived and created by core development experts at ShepHertz Technologies, is an esteemed intuitive interface that enables each one of us- become an App developer effortlessly without any coding, software installation, maintenance and financial investment.
  5. dEEpEst

    What Is Zero-Day?

    What Is Zero-Day? The term “zero-day” refers to a newly discovered software vulnerability. Because the developer has just learned of the flaw, it also means an official patch or update to fix the issue hasn’t been released. So, “zero-day” refers to the fact that the developers have “zero days” to fix the problem that has just been exposed — and perhaps already exploited by hackers. Once the vulnerability becomes publicly known, the vendor has to work quickly to fix the issue to protect its users. But the software vendor may fail to release a patch before hackers manage to exploit the security hole. That’s known as a zero-day attack.
  6. dEEpEst

    Network Protocol Terminologies 

    Network Protocol Terminologies *LAN: LAN stands for “Local Area Network” and refers to a network that is not publicly accessible by the internet. Examples of this are home or office network. *WAN: WAN stands for “Wide Area Network” and generally refers to large dispersed networks and, more broadly, the internet. *ISP: ISP stands for “Internet Service Provider” and refers to the company responsible for providing you access to the internet. *NAT: Network Address Translation allows requests from outside your local network to be mapped to devices within your local network. *Firewall: A firewall is a piece of hardware or software that enforces what type of network traffic is and is not allowed. This is generally done by establishing rules for which ports should be externally accessible. *Router: A router is a network device whose main goal is to transfer data back and forth between different networks. This device allows requests to be made to the internet and for information to be sent back to the devices on a local network. *Switch: The basic function of a switch is to provide access between devices on a local network. An example is an Ethernet switch. *Network Interface: This component allows you to connect to a public or private network. It provides the software required to utilize networking hardware. An example of this is the Network Interface Cards (NICs). *Port: A port is a logically defined connection location. Ports provide a destination endpoint for communication and the transfer of data. The ports range from 0 to 65535. *Packet: A packet is the basic unit of data transferred over a network. A packet has a header that gives information about the packet (source, destination, etc) and a body or payload containing the actual data being sent.
  7. How to Stop Instagram Data Tracking to Limit Targeted Ads ⚜ We Have Shared A Step-By-Step Guide On Limiting Instagram Data Tracking To Stop Targeted Ads. Step 1: First of all, launch the Facebook app on your Android smartphone. Step 2: Now tap on the three horizontal lines as shown below. Step 3: Next, tap on the Settings & Privacy option. Step 4: Under Settings & Privacy, tap on the ‘Settings.’ Step 5: Now scroll down and tap on the ‘Ad Preferences’ option. Step 6: Now tap on the ‘Ad Settings’ option. Step 7: Under the Ad Settings, scroll down and tap on the ‘Data about your activity from partners’ Step 8: On the next page, use the toggle button to turn off ‘Facebook’ and ‘Instagram.’ Step 9: Now go back and tap on the ‘Categories used to reach you’ Step 10: Tap on the ‘Interest Categories’ Step 11: You need to opt-out of all the Interest Categories Step 12: You need to do the same for ‘Other Categories’ as well. That’s it! You are done. Now you won’t get highly accurate ads on Instagram and Facebook.
  8. Software Testing Software Testing is a method to check whether the actual software product matches expected requirements and to ensure that the software product is Defect free. It involves the execution of software/system components using manual or automated tools to evaluate one or more properties of interest. The purpose of software testing is to identify errors, gaps, or missing requirements in contrast to actual requirements. Some prefer saying Software testing as a White Box and Black Box Testing. In simple terms, Software Testing means the Verification of Application Under Test (AUT). This tutorial introduces testing software to the audience and justifies its importance. Why Software Testing is Important? Software Testing is Important because if there are any bugs or errors in the software, they can be identified early and can be solved before delivery of the software product. Properly tested software product ensures reliability, security, and high performance which further results in time-saving, cost-effectiveness, and customer satisfaction. Testing is important because software bugs could be expensive or even dangerous. Software bugs can potentially cause monetary and human loss, and history is full of such examples. In April 2015, the Bloomberg terminal in London crashed due to a software glitch that affected more than 300,000 traders on financial markets. It forced the government to postpone a 3bn pound debt sale. Nissan cars recalled over 1 million cars from the market due to software failure in the airbag sensory detectors. There has been reported two accident due to this software failure. Starbucks was forced to close about 60 percent of stores in the U.S and Canada due to software failure in its POS system. At one point, the store served coffee for free as they were unable to process the transaction. Some of Amazon's third-party retailers saw their product price is reduced to 1p due to a software glitch. They were left with heavy losses. Vulnerability in Windows 10. This bug enables users to escape from security sandboxes through a flaw in the win32k system. In 2015 fighter plane F-35 fell victim to a software bug, making it unable to detect targets correctly. China Airlines Airbus A300 crashed due to a software bug on April 26, 1994, killing 264 innocents live In 1985, Canada's Therac-25 radiation therapy machine malfunctioned due to a software bug and delivered lethal radiation doses to patients, leaving 3 people dead and critically injuring 3 others. In April of 1999, a software bug caused the failure of a $1.2 billion military satellite launch, the costliest accident in history In May of 1996, a software bug caused the bank accounts of 823 customers of a major U.S. bank to be credited with 920 million US dollars. What are the benefits of Software Testing? Here are the benefits of using software testing: Cost-Effective: It is one of the important advantages of software testing. Testing any IT project on time helps you to save your money for the long term. In case if the bugs caught in the earlier stage of software testing, it costs less to fix. Security: It is the most vulnerable and sensitive benefit of software testing. People are looking for trusted products. It helps in removing risks and problems earlier. Product quality: It is an essential requirement of any software product. Testing ensures a quality product is delivered to customers. Customer Satisfaction: The main aim of any product is to give satisfaction to their customers. UI/UX Testing ensures the best user experience. Types Of Testing Functional Testing Unit Testing Integration Testing Smoke UAT ( User Acceptance Testing) Globalization Interoperability So on Non-Functional TestingPerformance Endurance Load Volume Scalability Usability So on Maintenance Regression Maintenance
  9. Facebook’s security practices changed for the better after its biggest data breach. If you haven’t heard already, hackers managed to steal 267 million user profiles. And, they did exactly what any other hacker would do - they sold the data on the Dark Web for other malicious actors to exploit. To make the matters worse, this happened only a couple of days after the massive Zoom data breach which affected over half a million users. This just shows how vulnerable your online accounts can be, including Facebook. Even though Facebook has implemented a better cybersecurity infrastructure, that doesn’t mean that your account is 100% safe. Today, even newbie hackers can infiltrate your account. And if they have the means or the know-how, you can easily hack a Facebook account and expose someone's private messages. But luckily, you can also prevent this from happening quite easily. In this article, we’ll go over some important tips that every digital user should implement. Data has become more vulnerable than ever, with hundreds of hacking attempts happening every day. So, stay safe by following these tips below. 1. Use a Password Manager to Store and Create Passwords Wondering how to prevent a Facebook hack easily? Just use a secure password. Simply put, password managers help you store and create unique passwords. This means that you can choose to create very long and complex passwords that are not easy to hack. In addition, they also take away the burden of recalling passwords for all sites. image However, password managers can also help with: Generating new passwords for your accounts periodically Storing credit card information Multi-factor authorization Ideally, long and complex passwords make it harder for hackers to brute force themselves into your Facebook account. And password managers can help you with that. Luckily for you, if you’re a Chrome user, Google has implemented an automatic password generator that pops up every time you need to create a password. It will automatically generate a strong password and store it in the password manager. That way, you’ll always have a bulletproof password only one click away. 2. Hide Your Email Address from Your Friend List For most people, an email address is a gateway to several other accounts apart from Facebook. This is especially true if you use the same password for all your accounts. As such, it’s essential to hide your email address from public view as much as you can. And yes, that includes your Facebook friend list too. To get started on hiding your email address on Facebook, this is what to do: While logged in to your Facebook account, click on your name/profile picture to access your profile. On the profile page, click the About tab. Select Contact and Basic Information from the left menu to see a list of your contact information. Click on the edit icon next to your email then set the Facebook Privacy Settings as Only me. image Doing that ensures that only you can see your email address. Since hackers can’t also see your email address, you’ll be much less of a target to them. People can do a lot of things only with your email, so make sure to keep it private. 3. Log Out of Old Devices Unlike your banking app, Facebook always keeps you logged in once you log in. And this means that anyone who uses one of your old devices can gain access to your account. Since they won’t be needing any password, it’ll be easy to collect all the information they need. But luckily, you can instruct Facebook to log you out of all active devices. Below is what you should do to log out of old devices: If logged in, tap on the arrow on the top right part of your screen next to the notification bell then click Settings and Privacy. On the settings page, click Security and Login. Under the section Where You’re Logged In, you’ll see a list of all devices that have recently accessed your account. Click on the three dots beside any of your old devices and select Logout. By logging out, anyone using your old device will need to login once more to access your account. You can therefore rest easy knowing that no one can access your Facebook account. 4. Enable a VPN When Using Public Wi-Fi To many, VPNs are tools to use to unblock restricted web content. In schools, for instance, it is common for students to use VPNs to unblock sites like Facebook. image However, VPNs also add a layer of protection. And particularly when you’re using public Wi-Fi. So, is Facebook secure over public Wi-Fi? Not really, think again. VPNs work by creating an encrypted tunnel between your device and Facebook. Therefore, anyone who tries intercepting your messages won’t be able to do so. By using a VPN, not only will you keep your identity hidden, but you’ll also protect yourself from various hacking attacks such as man-in-the-middle attacks or spoofing. 5. Learn How to Recognize Phishing Links Most Facebook accounts today get hacked through phishing. But sadly, few people know what phishing is and how it works in the first place. The whole purpose of a phishing email is to create a fake account that will mimic a well-known company or a person. image Then, the hackers con the users into clicking various links that either contain malware, or will take them to a fake page where they’ll enter their login credentials. Then, the hackers will use this data for identity theft, blackmail, and a lot of other bad stuff. Regardless, it’s still easy to spot a phishing email as well as its links. This is how: The e-mail sender doesn’t refer you by name Hover over links to see the true URL E-mail message content has spelling errors and typos The messages request sensitive information Conclusion In all honesty, staying vigilant is the best way of preventing your Facebook account from getting hacked. And that means you’ll need to instantly take action whenever you notice strange activity on your account. We hope that, through this article, you’ve learned how to secure a Facebook account from hackers.
  10. dEEpEst

    What is password cracking ?

    What is password cracking ? - Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource. It can also be used to help a threat actor obtain unauthorized access to resources. - With the information malicious actors gain using password cracking, they can undertake a range of criminal activities. Those include stealing banking credentials or using the information for identity theft and fraud. - A password cracker recovers passwords using various techniques. The process can involve comparing a list of words to guess passwords or the use of an algorithm to repeatedly guess the password.
  11. dEEpEst

    Ubuntu 21.10 (Daily Build)

    Ubuntu 21.10: Release Date You will be able to download Ubuntu 21.10 on October 14, 2021. This date is the one listed on Launchpad, the home of Ubuntu development. Prior to then there are several development milestones to come as part of the Impish Indri development cycle: Feature Freeze: Aug 19, 2021 UI Freeze: Sept 9, 2021 Ubuntu 21.10 Beta: Sept 23, 2021 Kernel Freeze: Sept 30, 2021 Release Candidate: Oct 7, 2021 Keep in mind that that these dates are not fixed and are subject to change. Download Ubuntu 21.10 (Daily Build) You can download Ubuntu 21.10 daily builds from the Ubuntu website linked below. The installer is provided as a 64-bit .iso image. You need to burn this image to a blank DVD, or write it to a USB drive (4GB or greater) using a tool like Etcher in order to install it on a laptop or desktop PC [Hidden Content]
  12. 1 download

    Loi Liang Yang- Full Ethical Hacking Course What you'll learn? Ethical hacking and cybersecurity Penetration testing -------------------------------------------------------------- Requirements:- Basic computer knowledge Download Link: Free for users PRIV8 *No backup link

    $100.00 PRIV8

  13. View File Loi Liang Yang- Full Ethical Hacking Course [8.6 GB] Loi Liang Yang- Full Ethical Hacking Course What you'll learn? Ethical hacking and cybersecurity Penetration testing -------------------------------------------------------------- Requirements:- Basic computer knowledge Download Link: Free for users PRIV8 *No backup link Submitter dEEpEst Submitted 10/09/21 Category Libro Online Password ********  
  14. ProtonMail "logs" and delivers activist IP logs End-to-end encrypted email service provider ProtonMail has come under fire after it gave in to a legal request and shared the IP address of anti-gentrification activists with law enforcement authorities, leading to their arrests in France. The Switzerland-based company said it received a " legally binding order from the Swiss Federal Department of Justice " relating to a collective called Youth for Climate, which it was " obliged to comply with, " forcing it to hand over the IP address and related information. type of device used by the group to access the ProtonMail account. On its website, ProtonMail announces that: " No personal information is required to create your secure email account. By default, we do not keep any IP logs that can be linked to your anonymous email account. Your privacy comes first. ". Despite its claims that there are no IP logs, the company acknowledged that while it is illegal for the company to comply with requests from non-Swiss law enforcement authorities, it will be asked to do so if Swiss agencies agree to assist services. foreigners such as Europol in their investigations. " There was no possibility of appealing or rejecting this particular request because in fact an act contrary to Swiss law was carried out (and this was also the final determination of the Federal Department of Justice that makes a legal review of each case) ", the the company said in a lengthy response posted on Reddit. Simply put, ProtonMail will not only have to comply with orders from the Swiss government, but will be forced to hand over relevant data when people use the service for activities deemed illegal. This includes monitoring users' IP addresses in " extreme criminal cases ," according to its transparency report. " Proton must comply with Swiss law. As soon as a crime is committed, privacy protections can be suspended and we are required by Swiss law to respond to requests from Swiss authorities , "ProtonMail founder and CEO Andy Yen tweeted, adding:" It is regrettable that The legal tools for serious crimes are being used in this way. But by law, [ProtonMail] must comply with Swiss criminal investigations. Obviously, this is not done by default, but only if it is legally enforced . " In any case, ProtonMail users who are concerned about the visibility of their IP addresses should use a VPN or access the email service through the Tor network for additional anonymity. " The prosecution in this case seems quite aggressive. Unfortunately, this is a pattern that we have seen more and more in recent years around the world (for example, in France, where anti-terrorism laws are used inappropriately). " the company said. Update In a blog post titled " Important Clarifications on Arrest of a Climate Activist ," Andy Yen said the company " it may be forced to collect information on the accounts of users under Swiss criminal investigation. Obviously this is not done by default, but only if Proton obtains a legal order for a specific account . " Also, in a revision of its privacy policy, ProtonMail now explicitly explains that it will be forced to record the IP addresses of the users if found to be in violation of Swiss law: " By default, we do not keep permanent IP logs in connection with your use of the Services. However, IP logs may be temporarily kept to combat abuse and fraud, and your IP address may be permanently retained if you engage in activities that violate our terms and conditions (spam, DDoS attacks against our infrastructure, brute force attacks, etc. .). The legal basis for this processing is our legitimate interest in protecting our Services against nefarious activities. If you are breaking Swiss law, ProtonMail may be legally compelled to register your IP address as part of a Swiss criminal investigation ”. Note- The title of the article has been revised to reflect that ProtonMail may allow the registration of IP addresses in accordance with Swiss court orders.
  15. 8 downloads

    Advance Exploitation Course By Umar Sabil * Make Your Serve FUD - 12 Topics * Convert your Server to mp3,mp4,image * Convert your Server to TXT * Macro Word Exploit * Email spoofing Advance Techniques * Make Your Server Anti Kill * Make Your Own Crypter FUD Download Link : Free for users PRIV8

    $100.00 PRIV8