Discover and read the best of Twitter Threads about #Hacking

Most recents (24)

1/ As you plan to relocate to Canada as a permanent resident, “settlement funds” and other “monies” are required for processing (e.g. IELTS, PNP EOI, Police Report, ICA, etc).

If you are like me and don’t have rich parents, you will have to hack our way through.

A Thread
2/ I know these are tough times and exchange rate is not smiling. Therefore, your plan to save up may be looking bleaky. So, hacking your savings through remote work or freelancing opportunities around the world to help you save up, should be considered as a plan. #RoadToCanada
Due to Covid-19 lockdown, digital skills and remote jobs opportunities are rising in areas such as Content Writing and Editing, Graphics Design, Web And App Development, Project Management, Digital Marketing, Online Course Development, Social Media Management and so on. #Hacking
Read 9 tweets
1/ Go through this tweets thread👇(especially don’t miss 11/ in this thread) to understand how persons like @fs0c131y are running #propaganda against our govt apps.
It will explain how for famous govt apps claims of #hacking or security issues are made while hiding the #reality
2/ First thing is you have to look like a pro hacker like those you see in movies or web series
—> yes you thought it right! You can even use name of a famous fictional character from web series or movies say #ElliotAlderson in #MrRobot web series. How cool that is! Isn’t it?🤔
3/ To look more cool 😎 hacker
—> You need some fancy terminal and fancy font. Powerline font and Oh-my-zsh with the Agnoster theme would be cool.
—> use curl for making requests to app server (you can even avoid posting the response in case you did not get desired response 😂)
Read 13 tweets
[Thread] Certifications

A non-comprehensive, non-linear summary of Dr. Craig Wright’s professional certifications.

National Security Training Academy
Security Industry Course and Firearm Certificate of Achievement - Granted in 1992

#Bitcoin
#Satoshi
#BSV
Brisbane YMCA Youth Club
Best Military Tactics - Granted in 1988

#YMCA
#Australia
#Rambo
International Systems Security Professional Certification Scheme - Granted in 2005

#International
#SysSec
#Professional
Read 60 tweets
1) Q3931
2) One must "only look" to see. That sounds easy enough.
I search Classified 1-99 (BTW: When you "hover" your pointer on CLASS, you'll see "classified"). This is the first entry.
3) THE INSIDER THREAT TO US GOVERNMENT INFORMATION SYSTEMS
written by Lt. Gen. Michael Hayden in July of 99
Read 24 tweets
HTB: Kryptos.pdf
github.com/blaCCkHatHacEE…
HTB: Helpline.pdf
github.com/blaCCkHatHacEE…
HTB: Unattended.pdf
github.com/blaCCkHatHacEE…
HTB_ Hackback.pdf
github.com/blaCCkHatHacEE…
Keep Calm and Hack The Box - Devel.pdf
github.com/blaCCkHatHacEE…
#Hacking #BugBountytips
Hack The Box Write-up - Access.pdf
github.com/blaCCkHatHacEE…
Hack The Box Write-up - Active.pdf
github.com/blaCCkHatHacEE…
Hack The Box Write-up - Carrier.pdf
github.com/blaCCkHatHacEE…
Hack The Box Write-up - DevOops.pdf
github.com/blaCCkHatHacEE…
#BugBounty
Read 7 tweets
my own ebook library contain hundreds (661) of hacking books and computer science books,i love reading and reading again and again.feel free to ask me about the best hacking books
#Hacking #Pentesting #redteam #bugbountytip #Malware #CyberSecurity
The Best Hacking Books in 2020 part )1(:
-effective-cybersecurity
-Rootkits and Bootkits
-Gray Hat Hacking the Ethical Hacker's Handbook 5
-THE HACKER PLAYBOOK 3
-Black Hat Go
-Practical Binary Analysis
-Hacking Exposed Industrial Control Systems
-Windows Forensics
-Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
-Hunting Cyber Criminals
-Guide to Computer Forensics and Investigations-Processing Digital Evidence
-Mobile Forensic Investigations: A Guide to Evidence Collection
Read 6 tweets
@AmbJohnBolton Dec 11, 2016 John Bolton #Traitor
Aggressively Gaslighting Russian #Hacking
Even before Trump took office, Bolton was supporting Russia. Gave away Pompeo would be appointed to help cover up. Devil in the details @TheDemocrats @HouseDemocrats @SenateDems
@AmbJohnBolton @TheDemocrats @HouseDemocrats @SenateDems JOHN BOLTON & Russia since 2013 #Traitor
With Russian SPY: Maria Butina & NRA
Part of TRAITOR BOLTON's NRA speech to RUSSIA 2013
@AmbJohnBolton @TheDemocrats @HouseDemocrats @SenateDems Full Dec interview, exposing Trump, Bolton, and Pompeo, before he took office. Bolton REFUSED to accept Russia was involved in hacking and worked hard to deceive the public. I noticed it when it happened.
Read 4 tweets
Stoked to share these free resources to expand your #infosec and technical skill set.

Each is a career path in its own right, the rabbit hole goes down as far as you follow.

Check these out and make 2020 count! 🎊

#30DaysOfThreads #BlackTechTwitter
#latinxintech
Begin your road into #pentesting with this staple book and free VM to practice hacking into 💻

Metasploit The Penetration Testers Guide : archive.org/details/Metasp… via @internetarchive

offensive-security.com/metasploit-unl…
A requirement for all in #dfir is being able to read and understand network traffic. It’s how our systems communicate!

Practical packet analysis: using Wireshark to solve real-world network problems : Sanders, Chris

archive.org/details/Practi…
Read 9 tweets
Vamos a usar este tweet para publicar #Dorks de todo tipo, empecemos con este:

inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner -foro -forum -topic -blog -about -docs -articles

#CyberSecurity #dork #BugBounty
intext:"pass" ! "usuario" | "user" | "contraseña" filetype:sql -github
Este es muy bueno, nos permite hacer uploads, ha sido probado con imágenes .jpeg

intitle:"FCKeditor - Uploaders Tests"
Read 18 tweets
Beware #Android Users!

A new unpatched #vulnerability — dubbed Strandhogg — in Android could let malicious apps take extensive control over your device & steal your login credentials.

Details: thehackernews.com/2019/12/strand…

Dozens of apps are already exploiting this flaw in the wild.
@Swati_THN 1) #Phishing Attacks:

#Strandhogg task hijacking vulnerability can be exploited to display a fake user interface (UI) while tricking users into thinking they are using a legitimate app, making it easy for the malware to steal their credentials using spoofed login interfaces.
@Swati_THN 2) Fraudulently Requesting Permissions:

A malicious app can also escalate its capabilities significantly by tricking users into granting sensitive device permissions while posing as a legitimate app.

Read more: thehackernews.com/2019/12/strand…

#infosec #hacking #cybersecurity
Read 4 tweets
I’m going to write something or record a video on the importance of enumeration and why speed isn’t always your friend. Your task is to answer some questions about the target to help identify key elements. #pentesting #hacking #pwnDefendWithKali
So in the mean time i'm just going to make this a small thread... so we start with out awesome kali laptop on the network segement 192.168.100.0/24. We run ifconfig and understand our gateway and subnet, DHCP options etc.
after running "ip a" we are now going to launch wireshark. The number of people who seem to not pcap whilst testing is way bigger than you think. SANS recomend it.. there's a reason for that ;)
Read 38 tweets
1 of many tweets regarding this post.

A couple examples of media's malice, lying, hypocrisy, manipulation, projection etc.. etc... In other words: Fake News!

Monday's #QAnon Post 3628 11/25/19

Enemy of the People.
You are the news now.
Facts matter.
Q
2 of many.

From Monday's #QAnon Post 3628 11/25/19

#Obama #Trump #SocialMedia #Health #ElectorialCollege Gay Parents
3 of many.

From Monday's #QAnon Post 3628 11/25/19

Jessica Valenti #CatCall #Border #Hacking #Comey
Read 27 tweets
I did this one before. But since we're making #30daysofthreads a great opportunity for folks to learn gems going into 2020, I figured I bring this one back!

With that being said, I will list 10 books to get started you in #hacking & #penetrationtesting
#CyberSecurity #infosec
“Penetration Testing" by
@GeorgiaWeidman
- 1 of the top books you must read if you're new to hacking or reviewing. Some material is dated but it is still a great book (Georgia is working on a new version. Don't bother her about it!) -

amzn.to/2WRB4N7
@georgiaweidman “Linux Basics for Hackers” by OccupyTheWeb

This book is great for those learning or working w/ Linux. It explains how to install Kali & what services are installed & what they're used for. This book also explains how to create scripts in BASH & Python

amzn.to/2NcCKNN
Read 10 tweets
#Pegasus was created by Israeli #cyber weapons dealer #NSOGroup whose parent company Francisco Partners also owns #CrossMatch contracted by #UIDAI for #Aadhaar. This was revealed by us already in 2017. Took almost 2 years for Indian media to catchup. #RIP
gginews.in/cia-spies-acce…
Hopefully @Swamy39 alerted the PMO as promised regarding this threat from Israeli #cyber weapons firm #NSOGroup that created spying tool #Pegasus and whose sister concern with links to #CIA was awarded #Aadhaar contract.
Above article was written in 2017. Blackstone made a deal to buy NSO Group but was dropped after heavy protests. So backed by Novalpina Capital stakes were bought back by NSO Group in Feb 2019. The #Aadhaar contract and the spying happened when Francisco Partners owned NSO Group.
Read 7 tweets
Paul Loves a Timeline

Before continuing,
always good 2 have
metrics at hand.

Dates
Places
People
Assholes
+
Murdoch Murdoch Murdoch

NoW
News of the World

Destroying Democracy
Mob Tactics

Phone-Tapping
Mob Tactics

So lets review.
UK Phone Hacking Scandal Fast Facts
4-29-19

British newspapers
r accused of making payments
2 police + hacking N2 phones of:
celebrities
law makers
royalty
murder victims
Most cases involve
News Corp.'s News of the World,
Sun, DMG publications involved.
cnn.com/2013/10/24/wor…
Let's note + begin w

British Monarchy

November 2005

British tabloid
News of the World
[NoW]
prints story about
Prince William
injuring knee,
prompting royal officials
2 complain 2 police
of probable voicemail hacking.

Phone Hacking = MobTactic

Murdoch's fall in bowl of soup.
Read 63 tweets
Interesting. #UnsealEpstein

Former MIT media lab staffer says leadership made it clear Epstein's donations were to be kept secret - CNN cnn.com/2019/09/08/us/…
#Epstein = 'Voldemort'? 🤔 5:5?
#UnsealEpstein MIT has some 'splaining to do...
Read 16 tweets
1/ (Thread 👇)
On Thursday, #AttorneyGeneral #WilliamBarr held a conference to go over the findings of the #MuellerReport. theepochtimes.com/barr-explains-…
2/ #AttorneyGeneral #WilliamBarr said nobody in the Trump campaign, or any American, colluded with #Russia to interfere in the 2016 elections.

Barr said #Russia did interfere, but nobody on the Trump campaign colluded with them.
3/ #Barr also said that it was #Russia who provided the emails to @Wikileaks. No member of the Trump campaign, however, worked with or coordinated with @Wikileaks in the release of the documents.

He also said no one on the Trump campaign coordinated with Russia in the #Hacking.
Read 5 tweets
#hoax #FakeNews #Assangearrest #LouisianaChurchFires #gemtaria #wtf #qanon

Major fake news today....by the numbers
Today is the 101st day of the year
Julian assange was arrested for hacking
His hacker name was "mendax" wich=101
Julian assange also=101
Then the church burnings..
#JulianAssange #mendax #lousiana #church 101 #gematria for the 101st day of the year
Read 11 tweets
With the 2020 elections coming on strong already, I think it is important to talk about keeping yourself safe from "hacking".
When you think of hacking, most envision someone using a computer & complex code to break into your computer.
#CyberSecurity
/1
#Hacking can take many forms, many can be done done over the phone or through email messages. These scams are known as #Phishing.
Example: A phone call where someone asks you for information that are common security questions:

Your first car
Mother's maiden name
Birth City
/2
They might pretend to be from your bank, your email or internet service provider, or your mortgage lender. They might pose as someone looking to verify your identity because of "unusual activity". This can come many ways, e.g. via a phone call, text message or email.
/3
Read 13 tweets
➡️NSA phone data collection program shut down

➡️When did @Snowden breach NSA & CRIPPLE INTEL GATHERING 2013
➡️Who targeted NSA? #Brennan C_A
➡️C_A 'illegal' SURV SENATE INTEL #Blackmail
➡️No punishment [Brennan]

cnet.com/news/controver…
#QAnon @POTUS @GenFlynn #TuesdayThoughts
➡️NSA phone program exposed by Snowden not being used, could expire in 9 months
➡️NSA has not used the program in the past six months
➡️Trump administration might not ask Congress to renew its legal authority

foxnews.com/us/nsa-trump-a…
#QAnon @POTUS @GenFlynn #TuesdayThoughts
➡️Hannity blasts House investigation into Trump as gruesome display of modern day McCarthyism #WITCHHUNT
McCarthyism is the practice of making accusations of subversion or treason without proper regard for evidence
thehill.com/homenews/media…
#QAnon @POTUS @GenFlynn #TuesdayThoughts
Read 6 tweets
Some really important journalism can be produced by local news outlets in preparation for a Super Bowl.

For the run-up to #SuperBowlLIII , this story breaks some very interesting new ground.

A thread:
Iranian hackers wrecked the city of Atlanta's stripper database.

No, we are not making this up.

on-ajc.com/2HJtBwZ #cybersecurity #hacking #SuperBowl
The database recording licenses issued by the city of Atlanta to adult entertainment performers was, according to the city, permanently lost in the 2018 cyberattack on city government. on-ajc.com/2HJtBwZ #cybersecurity #ransomware #hacking
Read 8 tweets
At 5:34pm election night Vlasto emailed Bossie the polling data he requested. Trump was down 5-8pts in 8 key states. The polls at this point had never been wrong.

Bossie shared the data w Bannon, Preibus & Kushner 1/
Frank Luntz over at Fox was given Fox exit polls at 5:03pm election night. It wasn’t even close. Hillary would be President.

Luntz says Trump had the (illegally obtained) polls & knew what he knew. 2/
August 2016 Roger Stone writes a column for the Hill accusing Priebus of rigging Wisconsin elections.

Step 1 publish a rigged poll
Step 2 rig the voting

3/
Read 40 tweets
🇨🇦 🇺🇸 🇨🇳 🇮🇷 #Canada arrests #Huawei’s global chief financial officer in Vancouver – The Globe and Mail
theglobeandmail.com/canada/article…
A gauge of #technology shares on the MSCI #Asia Pacific Index slid as much as 3 percent before paring some losses - Bloomberg
🇺🇸 #SPX ⬇ as much as 1.9% from Tuesday’s close, before paring some losses. Selling pressure early in the session was so intense that it forced CME Group to intermittently pause trading, according to a spokesperson for the exchange - Bloomberg
*Link: bloom.bg/2BTw5DN
Read 736 tweets
(6/1) #OSINT #Thread This thread is including the most valuable #GoogleDorks that you might find useful while searching for #Trello public boards. Enjoy and let me know if am miss any of them! #research #hacking #tips #tricks
(6/2)

site:trello.com intext:@gmail.com
(6/3)

site:trello.com intext:accesskey
Read 7 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!