❌

Reading view

There are new articles available, click to refresh the page.

Secure Phone and Hack Phone Android Intensive

By: seo_spec
Download now!

β€œSECURE PHONE”

  • Let’s create a phone using ANDROID OS as an example
  • With protection against network traffic interception;
  • With notification about substitution of the base station (BS);
  • By choosing open source firmware or removing built-in backdoors (yes, yes, they’re present in almost every firmware!);
  • By encrypting it and making it resistant to forensics;
  • Discuss backup and recovery methods, as well as encryption for secure storage;
  • Talking about antiviruses for Android: are they useful and which one to choose?
  • We will highlight services of automatic caller’s number detection, as well as services of automatic call recording of GSM standard and messengers;
  • Figuring out the safest messengers of the 3 dominant types (federated, centralized, and p2p);
  • Protecting sim cards, types of root and frameworks to change OS function on the fly;
  • Using VPN for smartphone;
  • Protecting the phone’s DNS from spoofing;
  • Using firewalls for Android;
  • By protecting your smartphone from being tapped by third-party applications;
  • Safely deleting files, with a clear understanding of why you can’t give your phone to repair or sell it without first scrubbing it.

β€œHACK PHONE”

  • Phone as a pentester tool that is always on hand
  • Phone as a bootable flash drive for hacking and administering Windows;
  • Phone as a BAD UASB tool to deliver a payload;
  • Net Hunter and its installation types, directly on the phone, or as an element of Smartphone firmware;

Testing router security via Smartphone;

Setting up and optimizing Termux to work with root rights and pentester frameworks for β€œunderhand” testing

A lesson in personal cybersecurity (2022)

By: seo_spec
Download now!

Description:

How we can help you save money and your reputation?

We’ll tell and show you by real examples:

  • Why simple and repeated passwords are dangerous
  • Who needs your data and why
  • The pitfalls of public wifi
  • How bank cards are stolen
  • Pros and cons of dual authentication
  • How to easily access your phone
  • What smart homes and assistants keep quiet about

    Also, let’s talk about topics:

    • Digital Hygiene
    • Antivirus, VPN and other protection
    • Online extortion
    • Surveillance of intelligence services and not only
    • Who needs your intimate photos
    • Online porn, dangers and precautions
  • Network vulnerability analysis

    By: seo_spec
    Download now!

    Description:

    If you want to learn how to defend or attack networks, one of the most important thing is the ability to detect and analyze vulnerabilities in systems or networks.

    In this course, you will learn how to follow a systematic process and use it to detect and handle potential vulnerabilities. At . first, you’ll learn passive and active scanning techniques for vulnerabilities. Next, you’ll learn how to extract the results from the data and analyze them to identify vulnerabilities that can be attack, or identify risks that need to be minimize. Finally, you’ll learn how to apply the three most popular vulnerability scanners and compare them with each other. At the end of the course, you will have have the knowledge and skills needed to identify vulnerabilities and take take action.

    Course content:

    • Introduction
    • Preparing the tools
    • Virtual Machines
    • OWASP Broken Web Applications
    • Metasploitable 2
    • Nmap
    • Vulnerability scanning methodology
    • Search targets to work around without penetration
    • Find targets to work around with penetration
    • Port and service discovery/scanning
    • Vulnerability detection
    • Find Internet vulnerabilities effectively
    • Types of vulnerability scans
    • Passive scan
    • Active scan
    • Vulnerability scanning

    DarkNet Guide – I2P and Freenet (2018)

    By: seo_spec
    Download now!

    What you will learn in this course:

    β€œFreenet”

    • network overview;
    • setting up and configuring a Freenet node;
    • creating an anonymous profile using WOT (Web of Trust);
    • creating a mailbox in Freemail;
    • creating a microblog in Sone;
    • creating a discussion group in FMS;
    • messaging and chatting in FLIP;
    • cryptocurrencies with GPG and Enigmail; Freenet links and resources.

    β€œI2P”

    • A comparison of I2P with Freenet and other darknets;
    • Installing and configuring a web browser to access I2P;
    • how I2P architecture differs from TOR;
    • specifics of cryptocurrencies in I2P and support of different protocols;
    • I2P plugins (Bittorrent and i2psnark / Azureus I2P service);
    • what is eepsite;
    • the gateway from TOR to I2P;
    • mail, browsing, blogging, forums, web hosting, real-time chat, filesharing and decentralized data storage using I2P.
    ❌