cybersecurity404 | Unsorted

Telegram-канал cybersecurity404 - 🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

2125

We Are 𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 fans!

Subscribe to a channel

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

https://www.webmd.com/mental-health/addiction/crystal-meth-what-you-should_know

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Finding Files (find, locate)
##########################

## LOCATE ##
# updating the locate db
sudo updatedb

# displaying statistics
locate -S

# finding file by name
locate filename # => filename is expanded to *filename*
locate -i filename # => the filename is case insensitive
locate -b '\filename' # => finding by exact name

# finding using the basename
locate -b filename

# finding using regular expressions
locate -r 'regex'

# checking that the file exists
locate -e filename

# showing command path
which command
which -a command


## FIND ##
find PATH OPTIONS

# Example: find ~ -type f -size +1M # => finding all files in ~ bigger than 1 MB

## Options:
# -type f, d, l, s, p
# -name filename
# -iname filename # => case-insensitive
# -size n, +n, -n
# -perm permissions
# -links n, +n, -n
# -atime n, -mtime n, ctime n
# -user owner
# -group group_owner

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Working with files and directory (touch, mkdir, cp, mv, rm, shred)
##########################

# creating a new file or updating the timestamps if the file already exists
touch filename

# creating a new directory
mkdir dir1

# creating a directory and its parents as well
mkdir -p mydir1/mydir2/mydir3

######################
### The cp command ###
######################
# copying file1 to file2 in the current directory
cp file1 file2

# copying file1 to dir1 as another name (file2)
cp file1 dir1/file2

# copying a file prompting the user if it overwrites the destination
cp -i file1 file2

# preserving the file permissions, group and ownership when copying
cp -p file1 file2

# being verbose
cp -v file1 file2

# recursively copying dir1 to dir2 in the current directory
cp -r dir1 dir2/

# copy more source files and directories to a destination directory
cp -r file1 file2 dir1 dir2 destination_directory/


######################
### The mv command ###
######################
# renaming file1 to file2
mv file1 file2

# moving file1 to dir1
mv file1 dir1/

# moving a file prompting the user if it overwrites the destination file
mv -i file1 dir1/

# preventing a existing file from being overwritten
mv -n file1 dir1/

# moving only if the source file is newer than the destination file or when the destination file is missing
mv -u file1 dir1/

# moving file1 to dir1 as file2
mv file1 dir1/file2

# moving more source files and directories to a destination directory
mv file1 file2 dir1/ dir2/ destination_directory/

######################
### The rm command ###
######################
# removing a file
rm file1

# being verbose when removing a file
rm -v file1

# removing a directory
rm -r dir1/

# removing a directory without prompting
rm -rf dir1/

# removing a file and a directory prompting the user for confirmation
rm -ri fil1 dir1/

# secure removal of a file (verbose with 100 rounds of overwriting)
shred -vu -n 100 file1

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## File Timestamps and Date
##########################

# displaying atime
ls -lu

# displaying mtime
ls -l
ls -lt

# displaying ctime
ls -lc

# displaying all timestamps
stat file.txt

# displaying the full timestamp
ls -l --full-time /etc/

# creating an empty file if it does not exist, update the timestamps if the file exists
touch file.txt

# changing only the access time to current time
touch -a file

# changing only the modification time to current time
touch -m file

# changing the modification time to a specific date and time
touch -m -t 201812301530.45 a.txt

# changing both atime and mtime to a specific date and time
touch -d "2010-10-31 15:45:30" a.txt

# changing the timestamp of a.txt to those of b.txt
touch a.txt -r b.txt

# displaying the date and time
date

# showing this month's calendar
cal

# showing the calendar of a specific year
cal 2021

# showing the calendar of a specific month and year
cal 7 2021

# showing the calendar of previous, current and next month
cal -3

# setting the date and time
date --set="2 OCT 2020 18:00:00"

# displaying the modification time and sorting the output by name.
ls -l

# displaying the output sorted by modification time, newest files first
ls -lt

# displaying and sorting by atime
ls -ltu

# reversing the sorting order
ls -ltu --reverse

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

ZLT S12 Pro Brand new ගන්න තියෙන තැනක් (ලංකාව ඇතුලෙ) තියෙනවනම් කියන්න ගානත් එක්ක.
contact me @hora_pusa

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Video Download software for windows.

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Status Download Apps දාගන්න ඕන්නෑ.
පහල commands දෙක termux එකේ ගහම්න නිකම්ම Gallery එකට එයි.

👇👇👇

cp /storage/emulated/0/WhatsApp/media/.Statuses/*.mp4 /storage/emulated/0/DCIM/Camera/

cp /storage/emulated/0/WhatsApp/media/.Statuses/*.jpg /storage/emulated/0/DCIM/Camera/

🔥

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

⭕ *නව පන්ති ආරම්භය* ⭕
🔹2024 AL ICT *දෙසැ. 01 බ්‍රහස්.*
🕔 *හවස 6.30 - 9.00*🌐සහේත්‍රා ගලකොන
*Join Group* 👉🏻https://chat.whatsapp.com/JmyulNi2wqFIdWKK93gbNj

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Bash History
##########################

# showing the history
history

# removing a line (ex: 100) from the history
history -d 100

# removing the entire history
history -c

# printing the no. of commands saved in the history file (~/.bash_history)
echo $HISTFILESIZE

# printing the no. of history commands saved in the memory
echo $HISTSIZE

# rerunning the last command from the history
!!

# running a specific command from the history (ex: the 20th command)
!20

# running the last nth (10th) command from the history
!-10

# running the last command starting with abc
!abc

# printing the last command starting with abc
!abc:p

# reverse searching into the history
CTRL + R

# recording the date and time of each command in the history
HISTTIMEFORMAT="%d/%m/%y %T "

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Getting Help in Linux
##########################

# MAN Pages
man command # => Ex: man ls

# The man page is displayed with the less command
# SHORTCUTS:
# h => getting help
# q => quit
# enter => show next line
# space => show next screen
# /string => search forward for a string
# ?string => search backwards for a string
# n / N => next/previous appearance

# checking if a command is shell built-in or executable file
type rm # => rm is /usr/bin/rm
type cd # => cd is a shell builtin

# getting help for shell built-in commands
help command # => Ex: help cd
command --help # => Ex: rm --help

# searching for a command, feature or keyword in all man Pages
man -k uname
man -k "copy files"
apropos passwd

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

https://www.youtube.com/watch?v=MYvBeGKv0FQ

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Electricity bill calculator for windows x64.

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

500GB potable HDD For sale.
Price : 6000/=
contact me for buy.
👇👇
0703273236
*අද හෙට ගන්නවනම් අඩු කරලා දෙන්නම්.

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

ඔයාලට මේ tool එක use කරලා linux vm එකක් termux එකේ කරගන්න පුලුවන්. (PC එකක් නැති programming වලට එහෙම කැමති අයට මේකෙන් වැඩක් ගන්න පුලුවන් වෙයි.)

👇👇👇

https://github.com/horapusa-lk/TerLinux

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Additional Cybersecurity Skills


Now, go through a set of additional skills that can help you get into the cybersecurity field:

Risk Analysis: Cybersecurity professionals are required to identify, manage and mitigate risks. Risk management and mitigation are a skill set that will be in high demand in the coming years.

Information Security: Companies require skilled professionals who can protect their electronic data from unauthorized access.

Security Incident Handling & Response: As a cybersecurity expert, you must be prepared to handle any genuine threat of violating an organization's security policy. With security incident management, you are required to identify, manage, record, and analyze security threats in real-time. As a security practitioner, you must also manage and analyze the security information and event management (SIEM) tools and services.

Security Audit: It is an internal check that is carried out to find flaws in the organization's information system. Security audit and compliance knowledge are very crucial because any missed area of regulatory compliance might incur significant fines and penalties for the organization.

Laws and Regulations: This is an often-overlooked cybersecurity aspect. There are several cybersecurity laws and regulations that you should be aware of. These laws define how you can use the internet and protect people from becoming victims of cybercrimes.

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Searching for text patterns (grep)
##########################

grep [OPTIONS] pattern file

Options:
-n # => print line number
-i # => case insensitive
-v # inverse the match
-w # search for whole words
-a # search in binary files
-R # search in directory recursively
-c # display only the no. of matches
-C n # display a context (n lines before and after the match)


# printing ASCII chars from a binary file
strings binary_file

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Piping and Command Redirection
##########################

## Piping Examples:

ls -lSh /etc/ | head # see the first 10 files by size
ps -ef | grep sshd # checking if sshd is running
ps aux --sort=-%mem | head -n 3 # showing the first 3 process by memory consumption

## Command Redirection

# output redirection
ps aux > running_processes.txt
who -H > loggedin_users.txt

# appending to a file
id >> loggedin_users.txt

# output and error redirection
tail -n 10 /var/log/*.log > output.txt 2> errors.txt

# redirecting both the output and errors to the same file
tail -n 2 /etc/passwd /etc/shadow > output_errors.txt 2>&1

cat -n /var/log/auth.log | grep -ai "authentication failure" | wc -l
cat -n /var/log/auth.log | grep -ai "authentication failure" > auth.txt # => piping and redirection

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Viewing files (cat, less, more, head, tail, watch)
##########################

# displaying the contents of a file
cat filename

# displaying more files
cat filename1 filename2

# displaying the line numbers
can -n filename

# concatenating 2 files
cat filename1 filename2 > filename3

# viewing a file using less
less filename

# less shortcuts:
# h => getting help
# q => quit
# enter => show next line
# space => show next screen
# /string => search forward for a string
# ?string => search backwards for a string
# n / N => next/previous appearance


# showing the last 10 lines of a file
tail filename

# showing the last 15 lines of a file
tail -n 15 filename

# showing the last lines of a file starting with line no. 15
tail -n +5 filename

# showing the last 10 lines of the file in real-time
tail -f filename


# showing the first 10 lines of a file
head filename

# showing the first 15 lines of a file
head -n 15 filename

# running repeatedly a command with refresh of 3 seconds
watch -n 3 ls -l

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################

## The ls Command

## ls [OPTIONS] [FILES]

##########################



# listing the current directory

# ~ => user's home directory

# . => current directory

# .. => parent directory

ls

ls .



# listing more directories

ls ~ /var /



# -l => long listing

ls -l ~



# -a => listing all files and directories including hidden ones

ls -la ~



# -1 => listing on a single column

ls -1 /etc



# -d => displaying information about the directory, not about its contents

ls -ld /etc



# -h => displaying the size in human readable format

ls -h /etc



# -S => displaying sorting by size

ls -Sh /var/log



# Note: ls does not display the size of a directory and all its contents. Use du instead

du -sh ~



# -X => displaying sorting by extension

ls -lX /etc



# --hide => hiding some files

ls --hide=*.log /var/log



# -R => displaying a directory recursively

ls -lR ~



# -i => displaying the inode number

ls -li /etc

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

ඔයාලට මේ software එකෙන් video download කරගන්න පුලුවන්.

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Hurry Guys...

DM Me❤️
/channel/kolly_fansl_1301

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Hi hi යාලුවනෙ 😗🌸 මතකද දන්නෙ නැ Anotech එක. ඔව් ඒක වහල දාලා තිබ්බෙ ආයෙ පටන් ගත්තා ඉතිම් 🌝❤️ එනවද ඒ පැත්තෙ 🫣😁

අපි කතා කරනව,

• Tech tips
• Tech facts
• About computer
• Networking
• Cybersecurity
• Programming tips

. . .ect 🌝🖤


නෑ නෑ හැක් කරන්න කියල දෙන්නෙ නැ 😂💔

ඇවිල්ලා බලන්න අලුත් වෙනස හොදයිද කියල 😙❤️‍🩹

.
.
.
.
.
.
.
.

ልиσтє¢нᵠ 👾🇱🇰

𝘞𝘦𝘭𝘤𝘰𝘮𝘦 𝘵𝘰 𝙄𝙣𝙛𝙞𝙣𝙞𝙩𝙮 . . . シ︎ 𝘠𝘰𝘶 𝘩𝘢𝘷𝘦𝘯'𝘵 𝘴𝘦𝘦𝘯 𝘪𝘵 𝘺𝘦𝘵 ♨️

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Running commands as root (sudo, su)
##########################

# running a command as root (only users that belong to sudo group [Ubuntu] or wheel [CentOS])
sudo command

# becoming root temporarily in the terminal
sudo su # => enter the user's password

# setting the root password
sudo passwd root

# changing a user's password
passwd username

# becoming root temporarily in the terminal
su # => enter the root password

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

##########################
## Keyboard Shortcuts
##########################

TAB # autocompletes the command or the filename if its unique
TAB TAB (press twice) # displays all commands or filenames that start with those letters


# clearing the current line
CTRL + L

# closing the shell (exit)
CTRL + D

# cutting (removing) the current line
CTRL + U

# moving the cursor to start of the line
CTRL + A

# moving the cursor to the end of the line
Ctrl + E

# stopping the current command
CTRL + C

# sleeping a the running program
CTRL + Z

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

පරන වැඩ කරන සෙල්ලම් රිමෝට් කාර් එකක් නැද්ද හොයාගම්න.
හරවන්න පුලුවන් එකක්.

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

GUYS ඔයාලත් කැමතිද සල්ලි දීල ගන්න තියෙන RDP, VPS, Premium Accounts නොමිලේම ගන්න. 🤩

☘️ අපේ චැනල් එකෙන් ඔයාලට

🔰 Netflix
🔰 Spotify
🔰 Azure
🔰 Zoom
🔰 Deezer
🔰 Nord Vpn
🔰 Disney+
🔰 HMA Vpn
🔰 Pureflix
🔰 Wondershare
🔰 Zee5
🔰 Lifeselector

👆 වගේ තව ගොඩක් Premium Accounts වගේම PAID EHI FILES, PAID SSH ACCOUNTS, CREDIT CARD වගේ තව ගොඩාක් දේවල් නිකන්ම ගන්න පුළුවන්.

🎉 එහෙනම් ඔයාල හැමෝම පහලින් තියෙන Button එක ක්ලික් කරලා Request එකක් දාල අපේ Channel එකට Set වෙම්න...

කට්ටිය 1K යමුනෙද? 1K ගිය ගමන් රිලොඩ් වැස්සක් දෙන්න යන්නේ හතර වට‌ෙම ශෙයා කරලා 1000 ගහන්න ඔනේ කොල්ලො සෙට් ඒක ගැම්මට 😊😊😊😊

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

How to hack CCTV | Google Hacking | Docking in Sinhala | Ep 2 :-
https://youtu.be/j1FYROxBar8

Google hacking/docking is very helpful thing for everyone,
It helps us to search anything easily. So in this video I talk about how to get access IP cameras & CCTV cameras.

Tap on Like and put a comment on YouTube guys, and Share🌝❤️

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Google Hacking is Scary easy | Docking in Sinhala | Ep 1 :-
https://youtu.be/aTA6EE21G7M

Google Hacking | Common Query Operator | Docking in Sinhala.

Google hacking/docking is very helpful thing for everyone,
It helps us to search anything easily. So in this video I talk about basics of Google Hacking.
Today I'm talk about Common Google Query Operators and Query Operator Structures.
Then I show you how to do Google Hacking and How to use Exploit db for Docking

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

https://youtu.be/v003mAAfy04

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Blockchain’s popularity is increasing, thanks in part to the level of security it offers. Consequently, cybersecurity professionals should become familiarized with blockchain and how it handles security issues. Consider it preparing for the future.

Blockchain will likely make security inroads into areas like Internet of Things devices (more on this later), network control, supply chain integration, identity control, and mobile computing.

Blockchain’s complex nature makes it difficult for intruders to compromise. For a cybercriminal to corrupt or destroy a blockchain, they would have to eliminate the data found on each user’s computer that’s connected to the targeted global network.


7. The Internet of Things (IoT)


According to Statista, there will be over 30 billion Internet of Things devices connected worldwide by 2025. With such a huge number of devices comes many more opportunities for security vulnerability. Therefore, IoT security will become a higher priority in the near future, and an essential part of maintaining the integrity and security of the overall Internet system.

Many IoT devices are sensors that collect personal data, which raises the stakes in maintaining secure networks and preserving consumer confidence.

IoT security emphasizes protecting connected devices and networks over the Internet, especially since most of these devices access networks without human intervention or oversight. Therefore, it becomes important to make sure that proper security measures are in place so that IoT devices can be left alone to perform their functions automatically, without cybersecurity experts having to be concerned about keeping out unauthorized intruders.


8. Artificial Intelligence (AI)


Like blockchain, Artificial Intelligence is a relatively young innovation that’s been enjoying widespread use. AI is perfect for the cybersecurity sector, as it brings reliability and consistency to cybersecurity measures, as it helps security professionals identify suspicious activity and impart a greater understanding of the cyber environment.

AI brings a level of automation and support that is unmatched by human capabilities, catching threats that may otherwise go unnoticed and unaddressed.

Artificial Intelligence can also be trained to learn and evolve, making it better equipped to handle new emerging threats and hacking techniques.

Читать полностью…
Subscribe to a channel