FARADAY BAG vs FLIPPER ZERO
Today, I demonstrated the necessity of carrying a Faraday bag by using my Flipper Zero to read my bank card and access card.
Without the Faraday bag, I successfully accessed both cards. However, when the cards were placed inside the Faraday bag, I
EXPLOITING THE VULNERABILITY IN IPHONE AND ANDROID
As a penetration tester and security researcher, I want to talk about SS7; a vulnerability that exist in iPhones and android. People don’t know about it.
It can’t be patched. I don’t need to install malware on your phone
First of all, Hush was not a hacker. He belonged to a syndicate.
Secondly,the only thing Hush can teach is social engineering. Take this from me. He is smart, no doubt.
I think you did not read well about Hush and only fed on the information you found in online sources.
Hush
Hushpuppi will comfortably school most of your tech founders when it comes to cyber-security. Why? He has first hand knowledge when it comes to loopholes in a given security system. Invictus Obi, on the other hand was named of the most talented entrepreneurs by Forbes.
These
CYBERSECURITY GAMES AND SIMULATIONS
Engaging in cybersecurity games and simulations can be a fun and effective way for pentesters and red teamers to enhance their skills and stay sharp. Here are some cybersecurity games tailored for professionals in these roles:
1. Hack The Box
A company asked me to break into their CCTV. I did in 3 minutes. I streamed it on their VLC player through url.
I’ll share the details of how I did it soon. But 2023; people still use default usernames and passwords🌚.
By the way; this is my small hacking office in my room😂😂.
Hello my upcoming Hackers
I’m dropping this here, it’s a free ethical hacking course from Cisco with 70 hours of content and 34 hands on labs.
Make good use🎈.
Link :
I met this guy on LinkedIn today. He commented on a post; we linked up. He shared his number with me.He is a Ghanaian. He is very humble.
He has experiences with FBI, Interpol and Department of Justice. He is an ethical hacker and an expert digital forensic officer. He is
Certified Information Systems Security Professional Study Guide (CISSP) Book
Certified Information Systems Security Professional Study Guide (CISSP) Past Question
Download:
follow:
@RedHatPentester
I demonstrated to my colleagues and top men why it is a bad thing to insert any foreign iPhone cable, type C cable or USB into their mobile device or laptop. My malware through this cable was able to steal sensitive data from a fully Kaspersky and windows defender protected PC.
Thank you Jesus for Everything.
As Amazon, Google, Disney and all the big firm started as home offices; grant me the strength Lord to do exploit with the little I have🤍.
This my Home Office; the place I do everything cybersecurity 💻 🤙🏽
I have read this book like 4 times this year.
What a Book❤️
This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a
Complete MCSE FREE Training:
This comprehensive Training is a game-changer for anyone looking to master Microsoft's server technology and secure a career in Microsoft Windows Server 2019 Administration.
Level up your skills!
Follow
@RedHatPentester
Download Link:
TRAFFIC LIGHT HACKING
We frequently see movie scenarios when hackers are able to breach systems for the management of traffic lights, with devastating repercussions. This is a tested security research.
Introduction
Traffic lights are a critical component of urban
API HACKING
Application Programming Interface is referred to as API. Different software applications can communicate and interact with one another according to a set of rules and protocols. Applications' methods and acceptable data formats for information requests and sharing
Russian Hackers are so good; they don’t compete but collaborate.
The Shadow Brokers took on the NSA in just 14 minutes and leaked all the hacking tools on GitHub. They were in their systems for months without their notice. They even went on to advance their own tools and used it
Deep down I am still shocked how the American FBI used a Nintendo Switch to find an abducted girl😂. They were able retrieve the console's IP address and were able to locate the girl 11 days after she first disappeared. She was returned safely to her family. The same Nintendo we
I’m here again.
If Nigeria wins this final, I’ll be doing a live wireless penetration testing session on password cracking and GSM Cell Tower Hacking via Microsoft teams for cybersecurity professionals for 2 consecutive saturdays. I don’t break my promise🤝.
We cannot allow
I carried out an attack today on my iPhone 12 Pro using the flipper zero. The Flipper device has a feature in the BLE spamming app that exploits a zero-day vulnerability related to BLE spamming. It sends specific packets that trigger BLE pop-ups, causing the phone to crash and
This is called TRIANGULATION. This was how Russian hackers in (Kaspersky lab) were able to find out they were being spied; they used wireshark and MVT. I challenge every cybersecurity professional and enthusiast to learn how to use these two tools: they help in mobile forensics.
Best Cybersecurity Certifications FREE (Updated)
Retweet and Share.
✅1. Introduction to Cybersecurity:
✅2. Cybersecurity Essentials:
✅3. Networking Essentials:
✅4. Intro to Information Security by
Encrypt your WhatsApp with Face ID and bring it to me; I’ll bypass that encryption with my mobile forensic software.
The Israeli designers are so good that they gave the software capabilities to bypass this encryption🤍. Top tier.🙌🏽🙌🏽
Radio Pentesting .
Radio signals can be recorded and replayed to your disadvantage.
Opening the door of a building with Hackrfportapack. Doors are the targets now.
This for educational purpose.
Here are 10 ports commonly targeted by hackers:
1. Port 21 (FTP)
2. Port 22 (SSH)
3. Port 23 (Telnet)
4. Port 25 (SMTP)
5. Port 53 (DNS)
6. Port 80 (HTTP)
7. Port 443 (HTTPS)
8. Port 3074 (Xbox Live)
9. Port 5060 (SIP)
10. Port 8080 (Proxy)
I think cybersecurity professionals should start building a team of 4.
I want to build a team of 4 personally:
Software engineer
Programmer
Networking engineer
And a Hacker.
There’s a reason for this.
You people will be the best team ever🤍🙌🏾🙌🏾
Tomorrow I am going to show you how Law Enforcement Agencies tap into your phone calls.
The problem with radio hacking is that instead of one number, you’ll end up sniffing on a lot of numbers.
Stay tuned for tomorrow 😂❤️
I will upload the NSA tools shadow brokers leaked and share the url with you. .
Feel free to download but I am not responsible for your use.
I’ll collaborate with few people to modify and use few of the tools for good🤝.
PENETRATION TESTING
Penetration testing, often referred to as pen testing or ethical hacking, is a proactive and systematic approach to assessing the security of computer systems, networks, applications, and physical infrastructure. Its primary purpose is to identify
IMSI CATCHERS (STINGRAYS)
IMSI Catchers, also referred to as "Stingrays," are specialised monitoring tools designed to intercept and keep track of mobile communications within a particular geographical region. Due to their potential for intrusive and warrantless surveillance,
CARD SKIMMING
Meet this device. It is a card skimmer and writer. Capable of reading your card numbers by radio as well reading them by swipe. It uses capable of reading 9 type of cards.
Once the magstripe is swiped past the reading head, the embedded data is decoded by the
Formed my organization in Level 100 years ago. After 8 years, H. I. V. E is a successfully registered cybersecurity company. More successful times ahead🤍
Please I need a correct designer for logos.
Drone Penetration Testing💚
Faking GPS has become my thing now.
You have to lie to that drone and cause it do emergency landing😂.
Also know that, GPS spoofing can be done with the Hackrf one and the drone can also be hacked with a wireless adapter.
Prioritize safety
My Snapchat users; are you aware that the moment Snapchat blocks you, they don’t only block your account but blocks your device because when you registered from the onset; the application registers your IMEI number on their servers.
My advice; anytime you want to buy an iPhone;
A friend got a role in GRC just two days ago, and I tell you, though I helped her prepare for it; GRC is not my thing. If you make a mistake, you will deviate.
She has asked me to share her interview questions. The interview lasted just 45 minutes:
Technical knowledge and
The top 10 wireshark filters every cybersecurity professional should know:
1. Filter by IP Address:
To capture traffic to or from a specific IP address, you can use the following filter:
ip.addr == x.x.x.x
2. Filter by Port:
To capture traffic on a specific port, use the
Dragon OS is a very powerful OS for radio penetration testing.
It contains over 100 strong tools to aid you filter the air for information.
Using Kali Linux is not really an effective advise I’d give to anyone who wants to study radio hacking.
Before the American FBI will process you for court, then they have all evidence and charges against you.
Unless God comes through for you like how He did for Marcus Hutchins ~ Malware Tech😂😂🤝. He was arrested in US when he went for DEFCON.
He’s the only cybersecurity
I’ll be forming a strong cybersecurity team to develop exploit tools used ethically to fight crime.
Here are my concepts I’ve developed so far for exploits:
1. Tarzan: A tool to compromise wireless networking devices such as routers and access points. It will allow the us to
CYBERSECURITY FOR AUTOMOBILES
Cybersecurity for autonomous vehicles, often referred to as "connected cars," is a critical concern due to the potential safety risks associated with cyberattacks on these vehicles. Here are some key aspects of cybersecurity for autonomous vehicles:
CYBERSECURITY AND MATHEMATICS
Mathematics plays a vital role in the theory and practice of cybersecurity. Mathematical concepts and techniques are used to develop secure cryptographic algorithms, analyze cyber threats, model security risks, and optimize cybersecurity
Offensive Security Proving Grounds
I have uploaded some videos from the OSCP for penetration testing. This is a gold mine. Please retweet and follow
@RedHatPentester
Purely practical
Download:
Cybersecurity folks let’s gather here.
This bag here is the faraday box (bag).
This bag here protects your cell phones, tablets, and other electronics from location tracking, hacking, and damage by blocking all incoming and outgoing EMF signals between 200 MHz and 40 GHz,
Mobile Pentesting and Forensics is amazing. The goal is to investigate your phone.
I successfully broke into an iPhone 11 without jailbreaking it with the use of the forensic tool that I purchased.
I got access to 6GB of the phone log files.
SMS Messages from iCloud and sim
My Mega folder is updated.
My cybersecurity people.
These are 20 Offensive and Bug Bounty tools for Ethical Hacking and Penetration Testing.
Download link:
Follow
@RedHatPentester
for more.
#Retweet
Are you ready my junior and senior Penetration Testers?
I purchased this course at $65 to share for you guys. Files uploading. Be expecting it soon.
Follow
@RedHatPentester
BURP SUITE MASTERY: BUG BOUNTY PERSPECTIVE. UDEMY.
What you’ll learn?
Burp suite community edition
This is the biggest misconception out there. Yahoo doesn’t come close to ethical hacking. Is just like that guy saying Hushpuppi will school cybersecurity professionals .
They are two different things; yahoo yahoo is social engineering and ethical hacking is legally breaking
PROJECT OWL RECON - DIGITAL FORENSICS
This is an investigation of an iPhone 15 Pro Max. This investigation took me 21 hours, 55 minutes. Items of 56GB of data were extracted.
The map showed the geoposition of everywhere the suspect has been in the last 7 months. Everything
PENETRATION TESTING
Types of Penetration:
There are several types of penetration testing, each with a specific focus:
- Black Box Testing: Testers have no prior knowledge of the target system and approach it as an external attacker would.
-White Box Testing: Testers have
OSINT TOOLS
1. Google Search: A powerful search engine for finding publicly available information on the web.
2. Social Media Platforms: Platforms like Twitter, Facebook, LinkedIn, and Instagram provide valuable insights into individuals, organizations, and events.
3. Maltego:
If you’re entering into cybersecurity, make sure you have at least 4 emails.
I have 9 emails; Each with different passwords💙. This tactics is very good and strategic for all cybersecurity professional and enthusiasts .
HACKING AND PEN-TESTING.
FREE ($80).
Learn practical hacking and pentesting with a step by step guide. A hands on approach to learn practical ethical hacking.
The ultimate Practical Hacking and Pentesting Guide for Beginners. Learn Ethical Hacking and Penetration Testing!
Yes we know hacking without permission is illegal but in most cases that I’ve read especially on firms in USA and Russia, you’ll either be recruited by the company or the Feds if your skill is vital like this. You’ll just face community services as punishment because you’re
I saved to buy this 7 years ago; you all can have it. Make good use of it🙌🏾.
CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab 🔥
Download Link:
ELEVEN CYBERSECURITY PROVERBS
1. "A chain is only as strong as its weakest link."
2. "Security is not about risk elimination, but risk management."
3. "The best defence is a good offence."
4. "Trust, but verify."
5. "An ounce of prevention is worth a pound of cure."
6.
You have to learn NETWORKING very well if you love cybersecurity. During pentesting in 2021, I was able to shut down the entire communication system of a company because they had only two DNS servers for their critical infrastructure (Emails, internet, phone systems & websites)
Want to study eJPT(v2) for free?
The eLearnSecurity Junior Penetration Tester exam (eJPT) validates that an individual has the knowledge and skills needed to fulfill a role as an entry-level penetration tester.
Access resources:
WHY YOU SHOULDN’T SEND YOUR PHONE DURING PROTESTS
In February this year I did an educational live demo on how IMSI catchers are used to get IMSI numbers of phones in a geographical area using the Hackrf. This is an aspect of radio Pentesting aimed at surveillance in most cases.
Teaching Cybersecurity has never been easy. Teaching cybersecurity demands a dynamic approach, staying current with the field, and addressing the diverse needs of students while emphasizing ethical responsibility. Virtual class sessions are so tedious yet we make sure things are
Dear Newbie,
In wireless penetration testing, you need to first get a laptop, then a wireless adapter, and also get a handshake before you can crack passwords.
In order to crack a Wi-Fi password using tools like airodump-ng and aircrack-ng, you typically need to capture a