ps-aux-grep root Profile picture
cybersecurity | Ethical hacker | Consultant | Linux Programmer 🇹🇿
Jun 24, 2022 13 tweets 7 min read
PHISHING Attacks | Twitter
#hackingwithfriends
@TOTTechs @ITexpertTz @HabariTech @blackninja233 @INFLUENCERjr @nicl4ssic @anon_codex @asatayo @abdoolkhery

KILA mtu anajua maana ya phishing attack na currently kuna watu wanadiriki kusema siwezi kuwa hacked via phishing. ..... Jibu ni No Anyways leo kwenye hacking with friends tutachek namna gani unaweza kuwa phished kwa kutumia BITB ATTACK
Phishing ni udanganyifu unafanywa na cyber crimes kupitia cloned web pages ambazo zinaonekana kama legitimate website za mtoa huduma kwa lengo la kupata ur logs
Aug 14, 2021 19 tweets 8 min read
HOW EASY FOR Hackers to Craft A Malicious Doc Exploit.

- Networking hacking based on STAgers

@TOTTechs @ITexpertTz @asatayo @razaqdm01 @HabariTech @AbilMdone

short Story:
Assume umekaaa offficn na ukapokea email kutoka kwa moja wa wafanyakaz wako, wakidai wameattouch report. Image na inakupasa upitie , umeopen ile attouchment ukaisoma ila hukujua in background there something special ina run na kutarget ur entire network. How do u feel? perfect

sasa leo tutaenda kucheck ni jinsi gani hzi doc attouched zinavyoweza hack na kuiba takataka zote kwenye network Image
Jan 26, 2021 18 tweets 9 min read
PROTECT UR PRIVACY , ANONYMIZE YOUR footprint over internet using TOR.

@TOTTechs @cindybernardtz @JemsiMunisi @ITexpertTz @razaqdm01 @troniofficial @HabariTech @AbilMdone

Juzi kati niliongelea swala la watu kutumia Vpns , tor network kuwa wako 100% naked .

na hii hutokana na Image kutokuwa na uleelewa zaidi na issue nzima ya jinsi kuji anonymous na kubypass advance filters na scannners ambazo hutumiwa na ISP, network admins , ku pata nyayo zako ukiwa katika network na especiall ukileta uharibifu sehemu.

hivo basi embu leo ujifunzie kitu kidogo sana ambach