الاختراق ليس سهل كما بالسابق / الامور سهله والثغرات مفتوحه
والتطور ضعيف اول
* الان التطور زاد والحمايه قويه : وصعب الترصد ( بس للمحترفين بمعني الكلمه ) يقدر
بس انا متأكد
واحد بالميه : دايما شروح القرصنه ناقصه وبختصر :)
شرحي :
1- يتم الاختراق لمواقع حسب نوع البرمجه او السكربت
2- الاختراق لتواصل الاجتماعي او الايميلات : هي الاستقبال بشئ لا يعرفه
هنا يتم الاختراق والتحكم بكل شئ هو جوال ولا كمبيوتر نفس الوضعيه
3- الاخطر واللى الكل ينتبه منه وحذرت اكثر من مره :
هو الاتصال البعيد اذا مفعل + ودع كمبيوترك او حتى جوالك
حل الاغلاق لحاسوب -
- الجوال
حماية بطاقة SIM الخاصة بك من الاستخدام غير المصرح به باستخدام PIN
https://youtu.be/89Rdebd7V8Y
ما هو رمز PIN لالغاء قفل الجهاز؟
كيفية إلغاء رمز pin سامسونج أو هواوي أو هاتف آخر - iMobie
طريقة فتح رمز PIN سامسونج أو أي هاتف أندرويد آخر
افتح تطبيق الإعدادات من الشاشة الرئيسية لجهازك
انقر على خيار الأمان أوالموقع والأمان
انقر فوق خيار كلمة مرور قفل الشاشة
انقر فوق قفل الشاشة وأدخل رقم PIN الصحيح
حدد الخيار بلا أو None وقم بالتأكيد لإزالة قفل الشاشة
ما هو رمز PIN الخاص بإلغاء تأمين شبكة SIM؟
ثم اطلب *#0808# أو ##3424# أو #9090# على لوحة مفاتيح الهاتف الخاصة بك
Samsung. وعادة أحد هذه الأرقام والرموز يعمل بشكل صحيح. بعد ذلك حدد DM + MODEM +
ADB or UART[*] or CDMA MODEM على الهاتف. بعد ضبط الهاتف بشكل صحيح، انقر فوق
إلغاء القفل
* تدري او ما تدري في تطبيقات تجبرنا في تفعيل هذي الخدمه
مثل *
تيك توك وخدمات قوقل وغيرها ... هم يحبون التعرف علينا ولهم اهدافهم بس خطر
على كل مستخدم ويجهل بعض الشغلات
والبرامج واجد كمثال -
1. Nmap
https://nmap.org/
Short for Network Mapper, no ethical hacker can do without this tool because of
its powerful searching and scanning abilities. Ethical hackers use this tool for
port scanning. The information gathered using this tool is vital for every
ethical hacker in deciding how to attack the target system, i.e., the steps
involved. Nmap enables them to discover services and hosts on any network,
creating a network map. Using this tool, you can probe computer networks and
detect operating systems. First developed for Linux or Unix, Nmap is now a
cross-platform tool and works on Mac and Windows
2. Nessus
https://www.tenable.com/
Second on the list is Nessus, the world’s most renowned vulnerability scanner.
It was developed by Tenable. It helps you detect unpatched services,
misconfiguration, weak passwords, and other system vulnerabilities. A free tool
Nessus is recommended for non-enterprise usage. An ethical hacker can see
critical bugs in any target system
3. Burp Suite
https://portswigger.net/burp
Burp Suite is a Java-based framework that deals with Web Penetration Testing. It
is an industry-standard suite of tools that information security professionals
use. As an ethical hacker, Burp Suite enables you to find vulnerabilities in
your target system and confirm if any attack vectors are affecting web
applications. Burp Suite has a great web application crawler that maps content
and functionality accurately. It also handles state changes, application logins,
and volatile content
4. Metasploit
https://www.metasploit.com/
Metasploit is an open-source penetration testing framework written in Ruby. It
is a public resource for confirming security vulnerabilities and developing
code. This code allows any ethical hacker to break into their network to
identify security risks and decide which vulnerabilities to address first—many
beginners in the field of ethical hacking use this tool to sharpen their skills
5. Netsparker
https://www.invicti.com/
The advantage that Netsparker brings to the table is that it gives you the
ability to imitate a hacker’s typical actions. You can use this tool to identify
any web API threats (application programming interface), such as SQL injection
or cross-site scripting. You don’t have to worry about vulnerabilities being
disguised as a false positive – Netsparker identifies genuine vulnerabilities
one after the other without manual verification. This software is also easy to
access. It’s available as an online service and Windows software,
6. Acunetix
https://www.acunetix.com/
Between an SQL Injection (SQLi) and an XSS attack (cross-site scripting), which
would you say is more dangerous? The former sends damaging SQL statements back
to the victim user and compromises the safety of the database server behind the
application. On the other hand, the latter attacks interactions between users
and an application if it is vulnerable. Acunetix is a lifesaver in both
scenarios. It’s a fully automated tool, capable of detecting and reporting
almost 5,000 security threats, including every variant of SQLi and XSS! It
supports both HTML5 and JavaScript and prioritizes vulnerabilities based on risk
level
7. Aircrack-Ng
https://www.aircrack-ng.org/
Across the world, a layperson will equate good internet with a strong Wi-Fi
connection. So, it’s no surprise that specific tools target Wi-Fi networks. The
advantage that Aircrack-Ng offers ethical hackers is the arsenal of tools that
they can use to check and evaluate a network. If they identify a vulnerable
network, they can then test, monitor, strike, and crack it, like a proper
operation! This Wi-Fi hacking software spares no platform- it supports Windows,
OS X, Linux, 2Free BSD, NetBSD, OpenBSD, and even Solaris!
8. John the Ripper
https://www.openwall.com/john/
If you know anything about the gruesome Jack the Ripper murders, you know that
you have enough reason to fear this tool. This is a tool that explicitly targets
and hacks passwords. It is free and can mainly spot weak UNIX passwords. It
comes with a bundle of password crackers and can be used on Windows, DOS, and
Open VMS. You can also use this tool to create a tracker tailored to your needs.
If you want to target encrypted passwords and security, this is your tool
9. Ettercap
https://www.ettercap-project.org/
Ettercap is an open-source network security tool commonly used for protocol
analysis and security auditing. It targets insecure ARPs (address resolution
protocols) and poisons such ARP caches. It can filter content, sniff packets
(both MAC and IP-based), analyze networks and hosts, decrypt passwords, etc.
Ettercap can decode several types of passwords, including HTTP, FTP, POP, and
SSL
مشاهدات الان
القسم :
Archives ارشيف هكركوز