Deprecated: Function get_magic_quotes_gpc() is deprecated in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 99
Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 619
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 832
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839 tag:blogger.com,1999:blog-49990094552843632922025-10-14T00:12:03.435-07:00Mubassir KamdarPentesting | cryptojacking | malware detection | bug bountiesMubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.comBlogger22125tag:blogger.com,1999:blog-4999009455284363292.post-70197067347455035652023-01-08T05:51:00.003-08:002023-01-08T05:52:55.277-08:00[Fixed] How Much Does TikTok Pay You For 1 Million Views In 2023<p>While it's no secret that TikTok has become one of the most popular social media platforms in the world, many people don't know what kind of money they can make from their content on the app. In this article, we'll be exploring the different ways that artists and influencers can make money from their videos on TikTok, with a focus on how much you can expect to earn for 1 million views.</p><h3 style="text-align: left;">Introduction</h3><p>As you may have heard, TikTok has been paying some users for their videos. But just how much does tiktok pay you for 1 million views?</p><div class="separator" style="clear: both; text-align: left;">TikTok offers two different ways to make money from your videos: through advertising and through partnerships. Advertising is the main way that TikTok makes money, and they share a portion of that revenue with their content creators. Partnerships are special arrangements between TikTok and individual content creators where TikTok pays them a set amount for each video they post.</div><p>So, <b>how much does tiktok pay you for 1 million views?</b></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT2QSOQ7lLw36NpffX2hkVXBieVNO9gf2hpEsm2ft3bqeu7G4gmhe6Uj4QHHDXtU5bylvf1u3wPw3Rkg4KorFYtrgb5Apu8cH_zqRQ8G7In0UFkK5LxFfCCfLdro6Xa4BW1sRTlVxTObEKTMFzRCAvOxai0rEUmfOQCPwFHjUBjGbGlbA2ybZCyQ/s2245/How%20Much%20Does%20TikTok%20Pay%20You%20For%201%20Million%20Views.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1587" data-original-width="2245" height="226" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT2QSOQ7lLw36NpffX2hkVXBieVNO9gf2hpEsm2ft3bqeu7G4gmhe6Uj4QHHDXtU5bylvf1u3wPw3Rkg4KorFYtrgb5Apu8cH_zqRQ8G7In0UFkK5LxFfCCfLdro6Xa4BW1sRTlVxTObEKTMFzRCAvOxai0rEUmfOQCPwFHjUBjGbGlbA2ybZCyQ/w320-h226/How%20Much%20Does%20TikTok%20Pay%20You%20For%201%20Million%20Views.png" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><p> If you're just starting out on the platform, you're not likely to make very much money from advertising. However, if you have a large following and are posting popular videos, you could potentially make a lot of money from advertising revenue sharing. And if you're lucky enough to land a partnership with TikTok, you could make even more!</p><h3 style="text-align: left;">How Does TikTok Pay You?</h3><p>TikTok pays out based on a revenue sharing model, where they keep 30% of the ad revenue and you get 70%. That means that if an ad is played in your video, you will get 70% of the money that TikTok makes from that ad. For example, if an ad is played in your video and it costs the advertiser $100, then you would make $70.</p><p>However, it should be noted that TikTok only pays out when your videos have been viewed by real people. If your videos are viewed by bots or fake accounts, then you will not earn any money.</p><h3 style="text-align: left;">Factors That Determine How Much You Earn for 1 Million Views on TikTok</h3><p>There are a few factors that will affect how much you earn for 1 million views on TikTok. The first is your location. If you live in a country with a higher cost of living, you'll likely earn more than someone who lives in a country with a lower cost of living. This is because advertisers are willing to pay more for ad space in countries where people have more disposable income.</p><p>The second factor is the type of content you're creating. If your videos are particularly creative or engaging, you'll be able to charge more for them. This is because advertisers are willing to pay more for ad space on videos that are likely to get attention and generate buzz.</p><p>The third factor is the length of your videos. Shorter videos generally command higher prices than longer videos, as they're less time-consuming for viewers to watch. This means that advertisers are willing to pay more for ad space on shorter videos, as they're more likely to reach their target audience.</p><p>Finally, the fourth factor is the number of followers you have on TikTok. The more followers you have, the more valuable your ad space becomes. This is because advertisers know that their ads will be seen by a large number of people if they're placed on popular videos with lots of followers.</p><p>All of these factors will affect how much you can earn for 1 million views on TikTok. If you create high-quality content and have a large following, you can expect to earn a money</p><h3 style="text-align: left;"><b>The Country Where Your Video Is Being Watched</b></h3><p>TikTok is a social media platform where users can share short videos of themselves. TikTok is available in over 150 countries and has been downloaded over 1 billion times.</p><p>The amount of money that TikTok pays creators for their videos varies depending on the country where the video is being watched. For example, TikTok pays creators in the United States $0.01 for every view, while TikTok pays creators in India $0.004 for every view.</p><p>There are a few factors that contribute to the difference in payouts between countries. One factor is the cost of living in each country. For example, the cost of living in the United States is much higher than the cost of living in India, so TikTok pays creators in the United States more money per view to account for this difference.</p><p>Another factor that contributes to the difference in payouts between countries is the advertising market in each country. The advertising market in the United States is much larger than the advertising market in India, so TikTok can charge advertisers more money for ads that are shown to users in the United States. This allows TikTok to pay creators in the United States more money per view than it pays creators in India.</p><p></p><h3 style="text-align: left;"><b>How Long the Video Is?</b></h3><p></p><p>The average TikTok video is between 15 and 60 seconds long. Videos that are longer than 60 seconds can be divided into multiple parts, each with its own view count. The average TikTok user spends about 52 minutes on the app each day.</p>
<script async="" crossorigin="anonymous" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script>
<h3 style="text-align: left;">Platforms Where the Video Is Shared</h3><p>There are a few different ways to make money on TikTok, and one of them is by sharing your videos on other platforms. This can be done through TikTok's official website or through third-party websites that offer video sharing services.</p><p>Some platforms that you can share your TikTok videos on include YouTube, Facebook, Instagram, and Twitter. You can also share your videos on your own website or blog if you have one.</p><p>When you share your videos on these platforms, you will typically earn a commission based on the number of views that your video gets. The amount that you earn will vary depending on the platform that you're using and the number of views that your video receives.</p><p>For example, if you share your TikTok video on YouTube and it gets 1 million views, you could potentially earn $1,000 from YouTube alone. If you were to share the same video on Facebook and it only got 100,000 views, you would only earn $100 from Facebook.</p><p>The amount of money that you can make from sharing your TikTok videos will depend on how popular your videos are and which platforms you're using to share them. However, if you can get a lot of views for your videos, then you could potentially make a decent amount of money from sharing them on other platforms.</p><h3 style="text-align: left;">The Quality of Content</h3><p>It is no secret that TikTok is one of the hottest social media platforms out there right now. With over a billion active monthly users, it is clear that there is a lot of interest in the platform. But <b>how much does TikTok pay you for 1 million views</b>?</p><p>The answer to this question depends on a number of factors, including the quality of your content, the engagement level of your audience, and your location. Let's take a closer look at each of these factors to get a better understanding of how much TikTok pays you for 1 million views.</p><h3 style="text-align: left;">How to Increase Your Earnings from 1 Million Views on TikTok</h3><p>In order to maximize your earnings from your 1 million views on TikTok, follow these steps:</p><p>1. <b>Use high-quality content</b>: Be sure that the videos you are posting are high quality and engaging. This will ensure that people continue to watch your videos, which will lead to more views and potential earnings.</p><p>2. <b>Post regularly</b>: Consistency is key when it comes to social media platforms like TikTok. If you want to increase your earnings, make sure to post videos on a regular basis so that people have something new to watch from you.</p><p>3. <b>Use hashtags and other marketing strategies</b>: Utilize hashtags, geotagging, and other marketing strategies to help your videos get seen by more people. The more people who see your videos, the more potential there is for earning money from those views.</p><p>4. <b>Promote your TikTok account</b>: Make sure that people know about your TikTok account by promoting it on other social media platforms and through word-of-mouth. The more exposure you have, the more likely people are to watch your videos, leading to increased earnings.</p><h3 style="text-align: left;">Creating Quality Content</h3><p>It's no secret that high-quality content is the key to success on TikTok. But just how much does TikTok pay you for 1 million views?</p><p>While there's no hard and fast answer, we can give you some general guidelines. First and foremost, <b>your content must be engaging and entertaining</b>. It should also be original and unique - something that people can't find anywhere else.</p><p>If your content meets these criteria, you stand a good chance of earning money from TikTok. How much you earn will depend on a number of factors, including the popularity of your videos and the number of views they get.</p><p>So if you're wondering how much TikTok pays you 1 for million views, <b>the answer is</b>: it depends! But if you create quality content, you stand a good chance of earning money from your videos.</p><h3 style="text-align: left;">Building an Engaged Audience</h3><p>There's no one-size-fits-all answer to this question, as the amount TikTok pays creators for their videos varies depending on a number of factors. However, we can give you some general guidance on what to expect in terms of earnings.</p><p>First and foremost, it's important to remember that TikTok is a platform that prioritizes engagement over views. This means that even if your video has a 1 million views, you won't necessarily earn a lot of money from it if people aren't liking, commenting, and sharing it.</p><p>With that said, the more engaged your audience is, the more money you can potentially make from your TikTok videos. In general, you can expect to earn around $100 for every 100,000 views on your video. So, if your video has one million views, you could potentially earn $10,000 from it.</p><p>Of course, these are just estimates – the actual amount you make will vary depending on a number of factors such as your location, the advertiser demand in your region, and the type of content you're creating. Nevertheless, this should give you a rough idea of what to expect in terms of earnings from TikTok.</p><p><br /></p>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-47316834308851907132022-12-11T09:42:00.001-08:002022-12-11T09:42:08.277-08:00CVE-2022-41040: ProxyNotShell Exchange Vulnerability<h2 style="text-align: left;">What is ProxyNotShell Attack?</h2><div>The ProxyNotShell vulnerability is a critical security flaw that was discovered in Microsoft's Exchange Server. This vulnerability is categorized as Server-Side Request Forgery (SSRF) and has been assigned the <b>CVE-2022-41040</b> identifier with a CVSSv3 score of 6.3. In addition to this, there is another vulnerability that has been categorized as remote code execution (RCE) with the CVE-2022-41082 identifier and a CVSSv3 score of 8.8. These vulnerabilities pose significant risks to users and should be addressed as soon as possible.</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBGdnPM9JLaqY_TgyTdXJeabzJWRGZb625XtEiLeJHYWbMf4KPhHZ6IhOxZWAPcMWRHlF2AoLroy-dQp0SqDIlNpjLfMx_tnx4GAB223X8aBt61ub0wlY5JlcKSCVnY73XB8pTvjZFSaWQu4f4qK2PvMbTivp0VBInNXG6SWkCcv09wbqCAz4VEw/s828/CVE-2022-41040.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="621" data-original-width="828" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBGdnPM9JLaqY_TgyTdXJeabzJWRGZb625XtEiLeJHYWbMf4KPhHZ6IhOxZWAPcMWRHlF2AoLroy-dQp0SqDIlNpjLfMx_tnx4GAB223X8aBt61ub0wlY5JlcKSCVnY73XB8pTvjZFSaWQu4f4qK2PvMbTivp0VBInNXG6SWkCcv09wbqCAz4VEw/s16000/CVE-2022-41040.jpg" /></a></div><br /><div><br /></div><h2 style="text-align: left;">Where was it Found?</h2><div>The ProxyNotShell (<b>CVE-2022–41040</b>) vulnerability was discovered in the Microsoft Exchange server on September 29, 2022. At that time, Microsoft confirmed reports of adversaries exploiting two zero-day vulnerabilities that affected the Exchange service. In August 2021, around 1,900 Microsoft Exchange Servers were known to have been hacked. Many organizations were affected by ProxyShell attacks, including construction companies, food processors, industrial machinery manufacturers, repair shops, and even a small residential airport, according to Kyle Hanslovan, CEO of Huntress Labs. These vulnerabilities pose significant risks to users and should be addressed as soon as possible.</div><div><br /></div><h2 style="text-align: left;">What all can it do?</h2><div>The ProxyNotShell (<b>CVE-2022–41040</b>) vulnerability allows attackers to plant ransomware and gain access to critical files on the Exchange mail server by exploiting the vulnerability to perform remote code execution. This vulnerability is particularly easy to exploit, making it a significant threat to organizations. To help organizations assess their level of exposure to ProxyNotShell, Cymulate Research Lab has developed a custom assessment tool that can be used to estimate the level of risk. It is important for organizations to use this tool or other means to assess their exposure to this vulnerability and take steps to address it as soon as possible.</div><div><br /></div><h2 style="text-align: left;">Ways to Exploit CVE-2022-41040:</h2><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM_ZHnvq_5RvgJs3jsfKueACbZBZwtlnsgKGwOC76vGliXECls7DSbblj4_2L5DQbdpD1YVRCi7UcUR0oIr_3I20pb-BZyDb4MDLVa3goQSoqT-z0Y-uTeEzM0zw6py9h7MmRml4Mz-Eggh_XvNcX3RQ0uM4knf6CmrGpctKVBZeuXz16v0VAakw/s609/CVE-2022-41040-1.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="261" data-original-width="609" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM_ZHnvq_5RvgJs3jsfKueACbZBZwtlnsgKGwOC76vGliXECls7DSbblj4_2L5DQbdpD1YVRCi7UcUR0oIr_3I20pb-BZyDb4MDLVa3goQSoqT-z0Y-uTeEzM0zw6py9h7MmRml4Mz-Eggh_XvNcX3RQ0uM4knf6CmrGpctKVBZeuXz16v0VAakw/s16000/CVE-2022-41040-1.webp" /></a></div><div><br /></div>It's important to be aware that there are many unscrupulous individuals who may try to sell you fake exploits for the ProxyNotShell vulnerability. To exploit this vulnerability, you can use the Nmap script engine (NSE) with the appropriate command. Be cautious when using any exploit and make sure you trust the source before proceeding.<div><br /></div><div><script async="" crossorigin="anonymous" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script><br /><div><br /></div><div><b>nmap --script proxyshell.nse your target -p 443</b></div><div><b><br /></b></div><div><b><br /></b></div><div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh31hBh6kA_VdgVAe9LEJqCGLR4uAYlIG27tMt9Aei49xxTV0ZAePPxaXiAUaWX5XvJNewN7wQHmR8Dyu5RKc9bsWh4zr7BvHR5lc7GkJa19eoZ14H4KiAetCfOpjtVUF6saiL1It2Pvn56Dzch0fJq8Lbgf3qD6oc3A0vYxdvPJzEQLP2vPdJHHg/s701/CVE-2022-41040-2.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="358" data-original-width="701" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh31hBh6kA_VdgVAe9LEJqCGLR4uAYlIG27tMt9Aei49xxTV0ZAePPxaXiAUaWX5XvJNewN7wQHmR8Dyu5RKc9bsWh4zr7BvHR5lc7GkJa19eoZ14H4KiAetCfOpjtVUF6saiL1It2Pvn56Dzch0fJq8Lbgf3qD6oc3A0vYxdvPJzEQLP2vPdJHHg/s16000/CVE-2022-41040-2.webp" /></a></div><br /><b><br /></b></div><div>you can also use the Metasploit framework to exploit the ProxyNotShell (<b>CVE-2022-41040</b>) vulnerability.</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp2NmWgdukHTUi8ZTr-AdPC2IyvFXHN9gzhStx-e6Iqb9Vb5WV_q8rTIDGCx1o3jQJFCBnzI3koCnYyT-xeYB0ZW8n4dawdQIqwFJqIlSRN48Elvk9e8LNHPVcx4f3TgmjzQyTiQYbJS6YpSLuyN6auTSK-o5iKe_Huz-26u34QNMT45VuRk79Pw/s828/CVE-2022-41040-3.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="202" data-original-width="828" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp2NmWgdukHTUi8ZTr-AdPC2IyvFXHN9gzhStx-e6Iqb9Vb5WV_q8rTIDGCx1o3jQJFCBnzI3koCnYyT-xeYB0ZW8n4dawdQIqwFJqIlSRN48Elvk9e8LNHPVcx4f3TgmjzQyTiQYbJS6YpSLuyN6auTSK-o5iKe_Huz-26u34QNMT45VuRk79Pw/s16000/CVE-2022-41040-3.webp" /></a></div><div><br /></div><div>To use Metasploit to exploit the ProxyNotShell vulnerability, you would first need to launch the msfconsole and search for the proxy shell module. Once you have found it, you can use the "use" command to select it, and then use the "show options" command to view the available options for the module. You would then need to set the required options using the "set" command, and finally use the "exploit" command to execute the payload.</div><div><br /></div><h2 style="text-align: left;">Patching this Vulnerability</h2><div>While Microsoft has not officially acknowledged the ProxyNotShell vulnerability, they have suggested using third-party web-based protection or Web Application Firewall (WAF) products to implement recommended URL filters and blocks as a precautionary measure. Additionally, limiting outgoing connections or using an outgoing proxy can help to reduce the risk of potentially suspicious web requests. These steps can help to protect against the vulnerability, but it's always important to stay vigilant and keep your software and systems up to date to reduce the likelihood of being exploited</div><div><br /></div><h2 style="text-align: left;">Facts</h2><div>The ProxyNotShell vulnerability <b>affects on-premise Exchange servers</b> running versions 2013, 2016, or 2019. To exploit this vulnerability, an attacker would need to have <b>authenticated access to the Exchange server</b>. At the moment, there is no patch available to fix this vulnerability. Microsoft has observed attacks using this vulnerability in fewer than 10 organizations globally. These attacks typically involve the use of web shells, which are dropped onto the server by chaining together two zero-day exploits. It's important for organizations to be aware of this vulnerability and take steps to protect themselves.</div><div><br /></div><br /><div><br /></div></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-71099645170541810362022-12-11T08:51:00.006-08:002022-12-11T09:00:46.903-08:00Unleashing The Power Of the Flipper Zero<p>Welcome to my <a href="https://www.mubassirkamdar.com/" target="_blank">blog</a>! Today we're going to unleashing the power of the Flipper Zero by installing some custom firmware. But before we get started, let's make sure your Flipper Zero is running the latest version. if not download latest version from <a href="https://flipperzero.one/update" target="_blank">here</a>.</p><h2 style="text-align: left;">Updating Flipper Zero:</h2><div>After downloading the Flipper Zero desktop software, open it from the icon on your computer. Then, connect your Flipper Zero to your computer using the USB C cable that came with it. The software should automatically detect the firmware version on your device. If it's up to date, you can move on to the next step. But if it's not, go ahead and click the 'install' button to update your firmware.</div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTvdGg0UD59c3lQmSnXxiv2Rw5JyHRAitfgUN5AvlVlOaINGq-tkV-5bWvtIR5cutaB8NETaKGt--GeknOTp79R6ggEJAn2g8pxLDGnZlOzz-Roj_FVf66DrJCvkPlRX6GP68LR7-jvcCtOgbvaDl1PCm79EhojiClKd2zIfIC785-CUrlLMDnGw/s640/unleashed%20firmware%20flipper1.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTvdGg0UD59c3lQmSnXxiv2Rw5JyHRAitfgUN5AvlVlOaINGq-tkV-5bWvtIR5cutaB8NETaKGt--GeknOTp79R6ggEJAn2g8pxLDGnZlOzz-Roj_FVf66DrJCvkPlRX6GP68LR7-jvcCtOgbvaDl1PCm79EhojiClKd2zIfIC785-CUrlLMDnGw/s16000/unleashed%20firmware%20flipper1.png" /></a></div><div><br /></div><h2 style="text-align: left;">Backing Up Flipper Zero:</h2><div>Before moving on, it's a good idea to back up your device. This is simple to do - just click on the spanner menu button. From there, you'll see a number of options, including 'backup', 'restore', 'erase', and 'check for updates'. To create a backup, just click on the 'backup' button and save the file it generates to a secure location.</div><div><br /></div><div><br /></div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO9-PVSia9YD_bPsIrnFqae60dkm6LVq-7kHsImbv1S3yQwqDZv7XBPkOKjyeFQ7nGHLNhw4ERhUfx4N7vjQ0PS3i9F68k4o1yV52TDEaqC2c633jUozmcpd8faMPYjPrgho_bzcsc4UV0EMnvJkQobWhtkykQFCHIcLCSQJKeqePrX9Avtr6wiw/s640/unleashed%20firmware%20flipper2.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO9-PVSia9YD_bPsIrnFqae60dkm6LVq-7kHsImbv1S3yQwqDZv7XBPkOKjyeFQ7nGHLNhw4ERhUfx4N7vjQ0PS3i9F68k4o1yV52TDEaqC2c633jUozmcpd8faMPYjPrgho_bzcsc4UV0EMnvJkQobWhtkykQFCHIcLCSQJKeqePrX9Avtr6wiw/s16000/unleashed%20firmware%20flipper2.png" /></a></div><br /><div><br /></div><div>The Flipper blog suggests that updating the firmware on the Flipper device is typically a reliable process. However, as with any firmware update, it's important to be cautious and avoid interrupting the process, as this can potentially damage the device. The Flipper device appears to have a fail-safe in place that keeps the old firmware intact until the new firmware is successfully installed.</div><div><br /></div><div><br /></div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJoemrittRbGlPfurAVUui1Oug_ZUCztbb0CB1JLu1Ltx_rXQrB_LA2VU_LELMMqQI6tlzbDowEGiTQEpZyB5mX4fXDTqwB19-g9Ghtm0vdQERDpIcRie_-lKc-AqdH6jS8p3c_-ehMxUu65LQ49XHBHlEALW1GvuSPb5mtRb-m9UlfLDkGkSeIg/s640/unleashed%20firmware%20flipper3.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJoemrittRbGlPfurAVUui1Oug_ZUCztbb0CB1JLu1Ltx_rXQrB_LA2VU_LELMMqQI6tlzbDowEGiTQEpZyB5mX4fXDTqwB19-g9Ghtm0vdQERDpIcRie_-lKc-AqdH6jS8p3c_-ehMxUu65LQ49XHBHlEALW1GvuSPb5mtRb-m9UlfLDkGkSeIg/s16000/unleashed%20firmware%20flipper3.png" /></a></div><br /><h2 style="text-align: left;">Finding Custom Firmware:</h2><div>Now that you've updated your Flipper device and backed up your data, you may want to explore custom firmware options. One option is the <a href="https://bytemeta.vip/index.php/repo/Eng1n33r/flipperzero-firmware" target="_blank"><b>unleashed firmware</b></a> by Eng1n33r. <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"
crossorigin="anonymous"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script> which is known for its ease of installation and additional features. These features include community applications for tasks like fuzzing, as well as some games like Doom. Overall, the unleashed firmware offers a range of enhanced functionality for your Flipper device.</div><div><br /></div><div><br /></div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcEaNxX_Ki76Qg0qqAB92mAUvPrenpgtxWt5YvCFkNOe4SKMIhozf1QvfeFgHwvj_sIyKYGXkHeMJzmDukcPpr74r2PeHicX5eqkN1-80zvsx5C4VAB_3rRWNKSj0MmAb_Zce6I0mGCTCO4-v07uJp3-ij1HXk_q9ZGjyvt7Fsr1VSyg2nSx-PkQ/s640/unleashed%20firmware%20flipper4.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcEaNxX_Ki76Qg0qqAB92mAUvPrenpgtxWt5YvCFkNOe4SKMIhozf1QvfeFgHwvj_sIyKYGXkHeMJzmDukcPpr74r2PeHicX5eqkN1-80zvsx5C4VAB_3rRWNKSj0MmAb_Zce6I0mGCTCO4-v07uJp3-ij1HXk_q9ZGjyvt7Fsr1VSyg2nSx-PkQ/s16000/unleashed%20firmware%20flipper4.png" /></a></div><br /><h2 style="text-align: left;">Downloading Custom Firmware:</h2><div>To download the custom unleashed firmware flipper, go to the <b><a href="https://github.com/DarkFlippers/unleashed-firmware/releases/tag/un1-76d38e" target="_blank">releases</a></b> page on GitHub. You should see a link to a .tgz file. Click this link and save the file to a safe location on your computer. Note that there is a web installer that can make the installation process easier, but I found it didn't work for me. You will need to use a Chromium-based browser, but it may not work if you have an older firmware version installed.</div><div><br /></div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgagS8GNoQBABNwmDe_ICTRLja73KDme4KXMAeocAolQZV70EoSQA00No9Nqf37eJY1_h0TyZJaB4a5tw0v1aNeb7T0qOmLdvSqd43OeVopMP49QOnV1hpdxbLk6-pKmB6g5eAX5y20g5ca62fzbcl-skUoGi7wcAPM8XPkYG2GwwoM9ix8jAETGw/s640/unleashed%20firmware%20flipper5.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgagS8GNoQBABNwmDe_ICTRLja73KDme4KXMAeocAolQZV70EoSQA00No9Nqf37eJY1_h0TyZJaB4a5tw0v1aNeb7T0qOmLdvSqd43OeVopMP49QOnV1hpdxbLk6-pKmB6g5eAX5y20g5ca62fzbcl-skUoGi7wcAPM8XPkYG2GwwoM9ix8jAETGw/s16000/unleashed%20firmware%20flipper5.png" /></a></div><div><br /></div><h2 style="text-align: left;">Installing Flipper Zero Custom Firmware:</h2><div>To install the custom unleashed firmware of Flipper Zero, go to the settings page in the Flipper Desktop application. There, you should see an option to install the firmware from a file. Click this option and navigate to the .tgz file that you downloaded. The desktop application will then show a progress bar while it installs the firmware. Once it is finished, the custom firmware should be installed and ready to use.</div><div><br /></div><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1agJ_z1QjRjQqdS9W72xo4wSNmkbXBD1Ksn7_esgXPtxp0hvId7mYEk5LqO7onqUurdvuKnIHj7FvLJr8kVFW-Ex-fd0aLOuy4AilaMN-6yCPxuoFeLGNKGi7VdnDU4JKFzPrBuBiAfHdbYIEqb6rnlxZBjp5gpyoLL-4jy8Xr5edkQq31epMQ/s640/unleashed%20firmware%20flipper6.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs1agJ_z1QjRjQqdS9W72xo4wSNmkbXBD1Ksn7_esgXPtxp0hvId7mYEk5LqO7onqUurdvuKnIHj7FvLJr8kVFW-Ex-fd0aLOuy4AilaMN-6yCPxuoFeLGNKGi7VdnDU4JKFzPrBuBiAfHdbYIEqb6rnlxZBjp5gpyoLL-4jy8Xr5edkQq31epMQ/s16000/unleashed%20firmware%20flipper6.png" /></a></div><div><br /></div><div><br /></div>After the Flipper desktop application reaches 100%, you will need to follow the instructions on your Flipper Zero device to complete the installation. This may involve pressing buttons or making other interactions with the device. After a few minutes, you should get a notification that the Unleashed firmware has been installed successfully. This notification should look similar to the image you provided. You can then start using the custom firmware on your Flipper Zero device.<div><br /><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_ZZdTfJW0oQ91IGz8NrnETVjUudQM1hIBFIwADCBRAWFom5q27O0MaPbVTcDSDxS4f0enAaalfLQiEorLIGQHyn6mkylDTgn0GTuabuAHIXh7e_10hm_nkXT75AhqmluRxlgkubXIFDVvLmJIT12ayM0nVlCuHKZA1rhSDANGkzU-cWalBp7I4w/s640/unleashed%20firmware%20flipper7.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="364" data-original-width="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_ZZdTfJW0oQ91IGz8NrnETVjUudQM1hIBFIwADCBRAWFom5q27O0MaPbVTcDSDxS4f0enAaalfLQiEorLIGQHyn6mkylDTgn0GTuabuAHIXh7e_10hm_nkXT75AhqmluRxlgkubXIFDVvLmJIT12ayM0nVlCuHKZA1rhSDANGkzU-cWalBp7I4w/s16000/unleashed%20firmware%20flipper7.png" /></a></div><br /><div><br /><h2 style="text-align: left;">Unleashed Firmware Features:</h2><div>The custom firmware, called Unleashed, comes with a number of new features and apps. It includes games like Doom, Tetris, and Flappy Bird, which you can play in between your hacking activities. You can find a full list of features on the firmware's webpage. I may write a separate post or create a video about these features in the future. For now, you can try them out on your Flipper Zero device and see how they enhance your experience.</div><div><br /></div><h2 style="text-align: left;">Conclusion:</h2><div>This post is not intended to be a comprehensive guide to the features of the Unleashed firmware. Instead, it focuses on how to find and install the custom firmware safely. The developer provides detailed instructions on their GitHub page, so this post may be redundant. However, I wanted to provide an additional resource for those who are interested in installing the firmware. In my personal experience, the Unleashed firmware adds useful functionality to the Flipper Zero device. However, I plan to switch to the Roguemaster firmware in the near future.</div><div><br /></div></div></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-20382995421726274862022-11-15T03:06:00.003-08:002022-11-15T03:06:25.478-08:00How To Check For Viruses On Android Phone<h1>how to check for viruses on android phone</h1>
<p>This article is dedicated to those of you who have had their Android phone hacked and want to know how to avoid such a situation in the future. To learn more about virus protection for Android, please continue reading.</p>
<h2>What is a virus?</h2>
<p>A virus is a type of malware that is designed to replicate and spread itself across a computer system or network. Viruses can be very destructive, causing data loss and system crashes. They can also be used to steal personal information or to launch attacks on other computers.</p><p><b>What is spyware</b>?
Spyware is a type of malware that is designed to collect information about a user without their knowledge or consent. Spyware can be used to collect sensitive information such as passwords, financial data, or personal details. It can also be used to track a user's online activities.</p><p><b>What is adware?</b>
Adware is a type of malware that is designed to display advertising on a computer system. Adware can be very intrusive and annoying, displaying pop-up ads or redirecting a web browser to unwanted websites.</p><p><b>What is a trojan horse?</b>
A trojan horse is a type of malware that is disguised as legitimate software. When executed, a trojan horse will perform some malicious action, such as stealing data or deleting files. Trojans can also be used to give an attacker remote access to a computer system.</p>
<h2>How to check for viruses on Android:</h2><div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj74EUMBznisdBSbgXfvfU00a07HhmhfphYXslgpXeTBrzsYd9B8khAnEixeKAtyuS6R51BnN2apYeN74hoRZLNIApvPgnDtXz_3s4tT5bceWfGLMCYPo3M06fjZoHSUzhDtRjTM0jC5DH18B9uvnCDKGSW8BOXXKydA59MRofEndiW3ZKMCZoOTg/s750/How%20To%20Check%20For%20Viruses%20On%20Android%20Phone.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="430" data-original-width="750" height="183" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj74EUMBznisdBSbgXfvfU00a07HhmhfphYXslgpXeTBrzsYd9B8khAnEixeKAtyuS6R51BnN2apYeN74hoRZLNIApvPgnDtXz_3s4tT5bceWfGLMCYPo3M06fjZoHSUzhDtRjTM0jC5DH18B9uvnCDKGSW8BOXXKydA59MRofEndiW3ZKMCZoOTg/s320/How%20To%20Check%20For%20Viruses%20On%20Android%20Phone.jpg" width="320" /></a></div><br /><div><br /></div>
<p>Checking for viruses on your Android phone is important to keep your phone and data safe. There are a few different ways to do this:</p><p>1. <b>Check for viruses manually:</b> You can check for viruses on your Android phone by downloading and running a virus scanner. There are many different virus scanners available, so be sure to choose one that is reputable and trusted. </p><p>2. <b>Use an antivirus app:</b> Another way to check for viruses on your Android phone is to install an antivirus app. These apps will scan your phone for viruses and malicious software, and can help remove any that are found.</p><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"
crossorigin="anonymous"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script><p>3. <b>Update your phone regularly:</b> One of the best ways to protect your Android phone from viruses is to keep it up-to-date with the latest security patches and updates from Google. To do this, go to Settings > About Phone > System Updates.</p><p>4. <b>Be careful what you download:</b> Only download apps from trusted sources, such as the Google Play Store or Amazon Appstore. Avoid downloading apps from unknown sources, as these could contain malicious software.</p><p>5. <b>Keep your screen lock enabled:</b> Screen locks help prevent unauthorized access to your device if it's lost or stolen. To enable a screen lock, go to Settings > Security > Screen Lock .</p>
<h2>-How to protect your phone from viruses</h2>
<p>It is important to protect your phone from viruses in order to keep it working properly and to avoid losing any important data. There are a few simple steps you can take to help protect your phone:</p><p>1. Keep your operating system and apps up to date. Viruses can exploit vulnerabilities in outdated software, so it’s important to keep everything updated.</p><p>2. Install a reputable antivirus app and run regular scans. This will help detect and remove any viruses that may have slipped through the cracks.</p><p>3. Be cautious when downloading apps, especially from unknown sources. Stick to trusted app stores and only install apps from developers you know and trust.</p><p>4. Avoid clicking on links or opening attachments from suspicious emails or texts. These can contain viruses that will infect your phone if you click on them.</p><p>5. Keep your personal information safe. Be careful what you share online and who you share it with. Don’t put yourself at risk by sharing sensitive information with someone you don’t know or trust.</p><p>By following these simple tips, you can help keep your phone safe from viruses and other malware.</p>
Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-10364704645447130852022-11-15T01:10:00.006-08:002022-11-15T01:17:04.408-08:00How can I check my Android phone for malware<h1>How can I check my Android phone for malware?</h1>
<p>It's important to keep your Android phone secure. Malware can compromise the performance of your device and take hold personal information, credit card data, personal photos, and more.</p>
<h2>What is malware?</h2>
<p>Malware, short for malicious software, is any software designed to cause harm to a computer, server, client, or network. Malware can be used to collect sensitive information, damage data, or gain access to unauthorized systems. There are many different types of malware, including viruses, worms, Trojans, Spyware, Adware, and Ransomware.</p><p>Most malware is spread through email attachments or downloads from untrustworthy websites. Once downloaded or opened, the malware can infect a system and spread to other computers on the same network. Malware can also be injected onto a system via vulnerabilities in software or hardware.</p><p>Malware can cause serious damage to a system. It can delete files, damage data, or steal information. It can also give an attacker access to your system or allow them to control your system remotely. Malware can also lead to denial of service attacks by disrupting the normal operation of a system.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLU1WzxunVGsPhceAOTygo-GhxzbPeCmoSL7DLSfRJ6Fd4TzkjTOuu0mjp4fYf9CwXMcd37i_9Ir0WPyuYj8HhH0dKajUP9-znn03ZzcbLnNF7ykv16HsWhbagyll-WTgDUIjw17Oawb3hsvZ4JeXIozgzmJzNV_8x3RRkFGDocoCo0EGHRQV1Og/s1280/How%20can%20I%20check%20my%20Android%20phone%20for%20malware.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="1280" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLU1WzxunVGsPhceAOTygo-GhxzbPeCmoSL7DLSfRJ6Fd4TzkjTOuu0mjp4fYf9CwXMcd37i_9Ir0WPyuYj8HhH0dKajUP9-znn03ZzcbLnNF7ykv16HsWhbagyll-WTgDUIjw17Oawb3hsvZ4JeXIozgzmJzNV_8x3RRkFGDocoCo0EGHRQV1Og/w400-h225/How%20can%20I%20check%20my%20Android%20phone%20for%20malware.jpg" width="400" /></a></div><p><br /></p><p>If you think your Android phone may be infected with malware, there are a few things you can do to check. First, run a security scan with an antivirus app like Avast Mobile Security & Antivirus or Bitdefender Antivirus Free. These apps will scan your device for malware and remove any infected files.</p><p>You can also check for signs of malware manually. Look for unusual activity on your device, such as unexpected pop-ups or ads, changes to your home screen or settings without your permission, unexplained</p>
<h2>How can I tell if I have malware on my device?</h2>
<p>If you think your Android phone may be infected with malware, there are a few things you can look for. One is unexpected behavior on your phone, such as programs opening and running on their own or changes to your home screen that you didn’t make yourself.</p><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"
crossorigin="anonymous"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script><p>Another way to tell if you have malware on your device is if you see signs of unusual activity, like a sudden increase in data usage or strange charges on your monthly bills. And if your battery starts draining faster than usual, that could also be a sign that something is wrong.</p><p>If you notice any of these things happening on your phone, the best thing to do is run a malware scan with an antivirus app. There are plenty of great options out there, so find one that suits your needs and run a scan. If it comes back clean, then you’re probably in the clear. But if it does find something, then you can take steps to remove the malware and protect your device from future infection.</p>
<h2>How can I remove malware from my phone?</h2>
<p>Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware includes viruses, spyware, trojan horses, worms, and more.</p><p>Most malware is designed to perform some sort of malicious action on the infected device or its owner. For example, a virus might delete important files or a spyware app might record your keystrokes to steal your passwords. Some malware is even designed to damage hardware or infect other devices connected to the infected device.</p><p>While there are many different types of malware, they all have one thing in common: they're all unwanted and can cause serious problems. That's why it's important to remove malware from your phone as soon as you suspect that it's there.</p><p>Fortunately, there are a few things you can do to remove malware from your Android phone. First, try using an antivirus app to scan your phone and remove any malicious software it finds. There are many great antivirus apps available for free on the Google Play Store.</p><p>If that doesn't work, you can try factory resetting your phone. This will erase all of the data on your phone, including any malicious software that may be installed. Of course, this will also erase all of your personal data and files, so make sure you back everything up before proceeding.</p><p>Finally, if all else fails, you can always contact your carrier or manufacturer for help.</p>
<h2>Should I downgrade to an earlier version of Android?</h2>
<p>If you're running an older version of Android, you might be at risk for malware. But downgrading to an earlier version of the operating system isn't always the best solution.</p><p>Older versions of Android have security vulnerabilities that can be exploited by malicious apps. So even if you downgrade to a version that's no longer supported by your phone's manufacturer, you could still be at risk.</p><p>The best way to protect yourself from malware is to install a reputable security app and keep it up to date. Some security apps can also help you recover if your device is infected.</p>
Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-27461161756168667762022-11-14T17:00:00.002-08:002022-11-15T01:20:00.302-08:00Where do I learn bug bounty hunting in websites<h1>Where do I learn bug bounty hunting in websites?</h1>
<p>Bug bounties are a great way to make money by finding bugs in websites. In this article, learn how bug bounties work and where you can get started with learning the skills necessary for successful bug bounty hunting.</p>
<h2>Types of Web Hacking</h2>
<p>There are many different types of web hacking, but some of the most common include SQL injection, cross-site scripting, and malware injection. </p><p><b>SQL Injection:</b>
SQL injection is one of the most common types of web hacking. It occurs when a malicious user inserts code into a web form that is then executed by the server. This can allow the attacker to access sensitive data, such as passwords and credit card information.</p><p><b>Cross-Site Scripting:</b>
Cross-site scripting (XSS) is another common type of web hacking. It occurs when a malicious user inserts code into a web page that is then executed by the browser of unsuspecting users who visit the page. This can allow the attacker to steal cookies or session information, which can be used to gain access to sensitive data.</p><p><b>Malware Injection:</b>
Malware injection is a type of web hacking that occurs when a malicious user injects code into a web page that downloads and installs malware on the computers of unsuspecting users who visit the page. This can allow the attacker to gain control of the victim's computer and use it to launch attacks against other computers or networks.</p>
<h2>What is a bug bounty?</h2><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj16E2bK-hH0VfNPwLBZ39qoeBICSeZyjIe1g-YBttFI9lce_-NpaMbrOy9oNdHiBUtSgUz_EsxWFvdMfHpNjkuOISo0Hn-vDolrcTVwG5MhGL1AGPEikaswrJNrFsmTOxvtS7HNPPBXFze3NespqMAelBhAc1io8vcZsYVtC0M1lJg_BbA_mVKcQ/s1000/HowtoGetStartedWithBugBounty.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="470" data-original-width="1000" height="188" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj16E2bK-hH0VfNPwLBZ39qoeBICSeZyjIe1g-YBttFI9lce_-NpaMbrOy9oNdHiBUtSgUz_EsxWFvdMfHpNjkuOISo0Hn-vDolrcTVwG5MhGL1AGPEikaswrJNrFsmTOxvtS7HNPPBXFze3NespqMAelBhAc1io8vcZsYVtC0M1lJg_BbA_mVKcQ/w400-h188/HowtoGetStartedWithBugBounty.png" width="400" /></a></div><br /><div><br /></div>
<p>A bug bounty is a monetary reward given to individuals who find and report software bugs. These bounties are typically offered by technology companies in order to encourage people to find and report bugs so that they can be fixed before they cause major problems. Many bug bounty programs offer rewards of $500 or more for critical bugs, making it an attractive way for people to earn money while helping to improve the safety and security of popular software.</p>
<h2>Who can join bug bounties?</h2><div><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"
crossorigin="anonymous"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script></div>
<p>Many bug bounty programs are open to the public, and anyone can participate. There are also private programs that are invite-only. To join a bug bounty program, you will need to create an account on the organization's website and agree to their terms and conditions. Some organizations may require you to complete a short application or screening process before you can start participating.</p>
<h2>Common Techniques in Web Hacking</h2>
<p>There are a few common techniques used in web hacking, which are outlined below.</p><p>1. <b>SQL Injection:</b> This is one of the most common attacks on websites, and involves injecting malicious code into an input field in order to gain access to the database.</p><p>2. <b>Cross-Site Scripting (XSS)</b>: This attack injects malicious code into a web page, which is then executed by the user's browser. This can be used to hijack the user's session or redirect them to a malicious website.</p><p>3. <b>Cross-Site Request Forgery (CSRF)</b>: This attack tricks the user into making a request to a website that they didn't intend to, such as submitting a form or clicking a link. This can be used to perform actions on behalf of the user, such as changing their password or transferring money out of their account.</p><p>4. <b>Session Hijacking:</b> This attack takes advantage of vulnerabilities in the way sessions are managed by the website. By stealing the session ID, an attacker can take over the session and perform actions as if they were the legitimate user.</p><p>5. <b>denial-of-service (DoS) attack:</b> This type of attack seeks to make a website unavailable by overwhelming it with traffic from multiple sources.</p>
<h2>Ethical Consideration with Bug Bounties</h2>
<p>When it comes to bug bounty hunting, ethical considerations are important. Here are a few things to keep in mind:</p><p></p><ul style="text-align: left;"><li>Make sure you have permission from the website owner before starting a hunt. </li><li>Do not perform any attacks that could cause harm or damage to the website or its users.</li><li>Be transparent about any vulnerabilities you find, and do not take advantage of them for personal gain.</li><li>Respect the privacy of website users, and do not collect or share any personal information without consent. </li></ul><p></p><p>By following these guidelines, you can ensure that your bug bounty hunting is ethical and responsible.</p>
<h2>Conclusion</h2>
<p>There are a few different ways that you can learn bug bounty hunting in websites. You can find some great resources online, or you can take a course from a reputable provider. You can also get involved in the community and learn from other experienced hunters. Whichever route you choose, make sure that you put in the time and effort to learn all that you can so that you can be successful in your pursuits.</p>
Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-33607035208589826372021-10-18T06:38:00.000-07:002021-10-18T06:38:17.039-07:00 CyberCorps: Scholarship for Service (SFS) Program at Michigan Tech<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHzcyIQkMpYNiWSf20qgJRP7_2rQQrq81uZT165YoKnufM0yhQU9es3Yuo-YRJakij81oG_0Q6IiKsP0KL0SVsZcz2T6rHxr_93DF-N-bGXdsPjd5wLVYYcZg9b2rkC3pKEK7XaYUHtw/s1456/FullName_Horizontal_TwoColor.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="482" data-original-width="1456" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHzcyIQkMpYNiWSf20qgJRP7_2rQQrq81uZT165YoKnufM0yhQU9es3Yuo-YRJakij81oG_0Q6IiKsP0KL0SVsZcz2T6rHxr_93DF-N-bGXdsPjd5wLVYYcZg9b2rkC3pKEK7XaYUHtw/w640-h213/FullName_Horizontal_TwoColor.png" width="640" /></a></div><br /><p></p><h4 style="text-align: left;"><span>🏠 </span><span style="font-weight: normal;">USA Universities </span><span><span style="font-weight: normal;"></span></span></h4><h4 style="text-align: left;"><span>💰 </span><span style="font-weight: normal;"><span>Fully Funded</span></span></h4><h4 style="text-align: left;"><span>🎓 </span><span style="font-weight: normal;"><span>Postgraduate, Masters ,Bachelor's degree<br /></span></span></h4><h4 style="text-align: left;"><span>📖</span><span> <span style="font-weight: normal;">All Subjects </span></span></h4><h4 style="text-align: left;"><span>📅 </span><span style="font-weight: normal;"><span>Dec 1, 2021 <b>to</b> Feb 1, 2022. </span></span></h4><h2 id="New">What's New?</h2><ul style="text-align: left;"><li>New applications for the 2022-2023 CyberCorps companion will be acknowledged Dec. 1, 2021 to Feb. 1, 2022 <br /></li></ul><ul style="text-align: left;"><li>Click <span style="color: #01ffff;"><a href="https://www.mtu.edu/sfs/infosession.pdf" target="_blank">here here to see the ppt</a></span> for the CyberCorps data meeting on September 30, 2021.</li></ul><ul style="text-align: left;"><li>Extra data meetings will be booked later. <br /></li></ul><ul style="text-align: left;"><li>Four CyberCorps researchers for the 2021-2022 companion have been chosen. Congrats to the understudies! <br /></li></ul><ul style="text-align: left;"><li>On OR off chance that you have any inquiries or remarks, reach us at: <a href="mailto:sfs@mtu.edu">sfs@mtu.edu</a> </li></ul><h4 style="text-align: left;"><br /></h4><h2 id="About">What is CyberCorps: Scholarship for Service (SFS)?</h2><p>CyberCorps Scholarship for Service (SFS) is an exceptional public program intended to enlist and prepare the up and coming age of data innovation experts, modern control framework security experts, and security directors to address the issues of the network safety mission for Federal, State, neighborhood, and ancestral legislatures. <br /><br />This program gives full grants to a few years of help for online protection undergrad and graduate training. As a trade-off for their grants, beneficiaries should consent to work after graduation for the U.S. Government, in a position identified with network protection.</p><h2 style="text-align: left;">Scholarship Benefits:</h2><div style="text-align: left;">SFS scholars (scholarship recipients) shall receive all of the following:</div><div style="text-align: left;"> </div><div style="text-align: left;"><ul style="text-align: left;"><li>Full-time educational cost and schooling related expens<br /><br /></li><li>Allowance: $25,000 each year for college understudies and $34,000 each year for masters students </li></ul><ul style="text-align: left;"><li>Proficient improvement recompense (travel, proficient confirmation and so forth) up to $6,000 each scholarly year </li></ul><p> </p><p><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script> <br /></p><br /><b>Moreover, there are numerous non-monetary advantages: </b><br /><br /><ul style="text-align: left;"><li>Profession improvement openings <br /> <br /></li><li>Supports from proficient networks, and some more. <br /></li></ul><p> </p><h2 id="Eligibility">Eligibility for Scholarship:</h2><div id="Eligibility" style="text-align: left;"><ul style="text-align: left;"><li>US resident or law full permanent resident.<br /> </li><li>Meet determination rules for U.S. government work.<br /> </li><li>Have no less than a 3.0 undergrad GPA </li></ul> </div><div id="Eligibility" style="text-align: left;"><h2 id="Eligibility">SFS Curriculum Tracks:</h2><div id="Eligibility" style="text-align: left;"><b>Track 1)</b> BS in <span style="color: #01ffff;"><a href="https://www.mtu.edu/applied-computing/undergraduate/cybersecurity/" target="_blank">Cybersecurity</a></span>. <br /><br />Understudies will get two-year support (junior + senior year) in the wake of applying and being chosen as a SFS researcher in their sophomore year. <br /><br /><b>Track 2)</b> BS in another taking an interest major + a <a href="https://www.mtu.edu/computing/undergraduate/minors/cybersecurity/" target="_blank">minor in Cybersecurity</a>. Understudies in this track will be urged to remember an online protection part for their capstone project. <br /><br />Understudies will get two-year grant support (junior + senior year) in the wake of applying and being chosen as a SFS researcher in their sophomore year. <br /><br />The minor in Cybersecurity requires 18 credit hours. The minor gives an establishment in network safety to plan SFS researchers for their post-graduation work in government offices. </div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"></div><div id="Eligibility" style="text-align: left;"> </div><div id="Eligibility" style="text-align: left;"> </div><div id="Eligibility" style="text-align: left;"><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script><br /><br /><b>Track 3)</b> BS in a taking an interest major + a speed up <a href="https://www.mtu.edu/accelerated/masters/cybersecurity/" target="_blank">MS in Cybersecurity</a>. <br /><br />Understudies will get two-year SFS grant support (senior year + one year MS) in the wake of applying and being chosen in their lesser year of undergrad study. </div><div id="Eligibility" style="text-align: left;"><br /></div><div id="Eligibility" style="text-align: left;"><h2 id="Application">Scholarship Application:</h2></div>This SFS grant opportunity at Michigan Tech is a profoundly particular interaction and liable to allow subsidizing accessibility. After introductory evaluation dependent on submitted application materials, a waitlist will be created for face to face meets. SFS student who applied for scholarship should wait in the waitlist will likewise be approached to finish a poll for historical verification.</div><div id="Eligibility" style="text-align: left;"> </div><div id="Eligibility" style="text-align: left;"> </div><div id="Eligibility" style="text-align: left;"><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script> <br /></div><div id="Eligibility" style="text-align: left;"><p><b>SFS scholarship recipients are selected based on:</b></p><div style="text-align: left;"><ul><li>Scholastic execution and potential <br /><br /></li><li>Paper/video laying out the candidate's goals as it identifies with network safety and a vocation in government <br /><br /></li><li>Resume <br /><br /></li><li>Letters of suggestion <br /><br /></li><li>Capacity to get trusted status <br /><br /></li><li>Meeting</li></ul><p>If you are willing to apply a scholarship for service (SFS) then click bellow button for <b>fully funded scholarship</b><br /></p><p><br /></p><p><a href="https://www.mtu.edu/sfs/#Application" target="_blank">
<input b90bb="" onmouseout="this.style.backgroundColor=" onmouseover="this.style.backgroundColor=" style="background-color: #1b90bb; border-bottom-width: 1px; border-color: rgb(213, 213, 213); border-left-width: 1px; border-radius: 5px; border-right-width: 1px; border-top-width: 1px; border-width: 1px; color: white; cursor: pointer; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; margin: 10px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px; padding: 10px;" this.style.bordercolor="#d5d5d5" this.style.color="#FFFFFF" type="button" value="Scholarship For Service Cybercorps!" />
</a><br /></p><p> <br /></p></div><div style="text-align: left;"><b> </b></div> </div><p> </p></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-66696914961603832802021-10-17T16:56:00.002-07:002021-10-17T17:03:31.596-07:00British Chevening Scholarships 2022<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2wp1T3_sxWa10Ym-IJQrxZgsNMIZgb8_eLyV9ETZRSSP9NA2s5yQMdQfS_4iCj1_wMEUBIOvkQpJ2baqKE3w7QpyvbNrMs7bRvpyFvODHJ8urWFgJNFNrkJ_pccDAzN3CE_Erk8yDHA/s800/chevening_uk_government_scholarship_for_international_students.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="600" data-original-width="800" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2wp1T3_sxWa10Ym-IJQrxZgsNMIZgb8_eLyV9ETZRSSP9NA2s5yQMdQfS_4iCj1_wMEUBIOvkQpJ2baqKE3w7QpyvbNrMs7bRvpyFvODHJ8urWFgJNFNrkJ_pccDAzN3CE_Erk8yDHA/w400-h300/chevening_uk_government_scholarship_for_international_students.png" width="400" /><span> </span></a></div><div class="separator" style="clear: both; text-align: center;"><span> </span></div><div class="separator" style="clear: both; text-align: left;"><h4 style="text-align: left;"><span>🏠 </span><span style="font-weight: normal;">UK Universities </span><span><span style="font-weight: normal;"></span></span></h4><h4 style="text-align: left;"><span>💰 </span><span style="font-weight: normal;"><span>Fully Funded</span></span></h4><h4 style="text-align: left;"><span>🎓 </span><span style="font-weight: normal;"><span>Postgraduate, Masters </span></span></h4><h4 style="text-align: left;"><span>📖</span><span> <span style="font-weight: normal;">All Subjects </span></span></h4><h4 style="text-align: left;"><span>📅 </span><span style="font-weight: normal;"><span>11/02/2021 </span></span></h4><h3 style="text-align: left;"><span>Scholarship Description: </span></h3><div style="text-align: left;"><span>British Chevening Scholarships 2022 is open for Developing Countries, Commonwealth Countries Chevening Countries. The scholarship grant permits to Postgraduate, Masters level programms in the field of All Subjects taught at UK Universities . The cutoff time of the grant is 02 Nov 2021.</span></div><div style="text-align: left;"><span> </span></div><div style="text-align: left;"><h3>Degree Level:</h3><div style="text-align: left;">British Chevening Scholarships 2022 is accessible to Postgraduate, Masters level courses at UK Universities. <br /><br />The chevening scholarship grant is for Masters Degree Programs presented at colleges in UK. The Scholarship is financed by British Government. </div><div style="text-align: left;"><br /></div><div style="text-align: left;"><h3>Available Subjects:</h3><div style="text-align: left;">Following subject are accessible to consider under this grant program. <br /><br />All Subjects <br /><br />You might choose any subject at Master Level education at colleges in UK.</div><div style="text-align: left;"> </div><div style="text-align: left;"><h3><br /></h3><script async="" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script> <br /></div></div></div></div><div style="text-align: left;"></div><div style="text-align: left;"></div><div style="text-align: left;"></div><div style="text-align: left;"><h3>Scholarship Benefits:</h3> <div style="text-align: left;">A Chevening Scholarship ordinarily covers college educational expenses, a month to month living recompense, an economy class return airfare to the UK, and extra awards and remittances to cover fundamental use. </div><div style="text-align: left;"><br /></div><div style="text-align: left;"><h3>Eligible Nationalities:</h3><div style="text-align: left;">The grants are designated to residents of Chevening-qualified nations. See the authority site for complete list of nations qualified for Chevening grants. </div><div style="text-align: left;"><br /></div><div style="text-align: left;"><h3>Eligibility Criteria:</h3><div style="text-align: left;">To be qualified for a Chevening Scholarship you should:</div><div style="text-align: left;"> </div><div style="text-align: left;"><ul style="text-align: left;"><li>Be a citizen of a Chevening-eligible country or territory.</li></ul><ul style="text-align: left;"><li>you need to go back to your country of citizenship for at least two years after your grant has finished </li></ul><ul style="text-align: left;"><li>Have finished all parts of a college degree that will empower you to acquire passage onto a postgraduate program at a UK college when you present your application. This is normally comparable to an upper below average 2:1 honours degree in the UK yet might be diverse relying upon your course and college decision. <br /></li></ul><ul style="text-align: left;"><li>Have somewhere around two years (identical to 2,800 hours) of work insight. <br /></li></ul></div></div></div> </div><a href="https://www.chevening.org/" target="_blank">
<input b90bb="" onmouseout="this.style.backgroundColor=" onmouseover="this.style.backgroundColor=" style="background-color: #1b90bb; border-bottom-width: 1px; border-color: rgb(213, 213, 213); border-left-width: 1px; border-radius: 5px; border-right-width: 1px; border-top-width: 1px; border-width: 1px; color: white; cursor: pointer; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; margin: 10px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px; padding: 10px;" this.style.bordercolor="#d5d5d5" this.style.color="#FFFFFF" type="button" value="Go And Get Scholarship!" />
</a><span></span><h3 style="text-align: left;"><span><br /></span></h3><h4 style="text-align: left;"><span> </span></h4><p></p><p></p><p></p>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-36364075331983169102021-09-24T12:49:00.005-07:002021-09-24T12:54:04.010-07:00How To Set Up A Business Tiktok Account<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsX-5lkImP3ieTwBnbUdFSk9lgjQt9G1tAR0ywiw-MMDx7a7dfPXaHaPf4bldV3PfqSpPkfYPliwvReHnn11hAim6riFEA70vmQAa7xlhV-BhOgJ4MuNHtTMZOdwG7igI_eNTw8Q05IQ/s1270/Screenshot+from+2021-09-25+00-25-51.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="569" data-original-width="1270" height="286" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsX-5lkImP3ieTwBnbUdFSk9lgjQt9G1tAR0ywiw-MMDx7a7dfPXaHaPf4bldV3PfqSpPkfYPliwvReHnn11hAim6riFEA70vmQAa7xlhV-BhOgJ4MuNHtTMZOdwG7igI_eNTw8Q05IQ/w640-h286/Screenshot+from+2021-09-25+00-25-51.png" width="640" /></a></div><p></p><p>
</p><h1 class="western" style="text-align: center;">
<span style="font-size: large;">HOW TO SET UP </span><span style="font-size: large;">A</span><span style="font-size: large;">
BUSINESS TIKTOK ACCOUNT</span></h1><p class="western" style="text-align: left;"><span style="font-size: small;"> </span></p><p class="western" style="text-align: left;"><span style="font-size: small;">You are looking for generating revenue for your business then you want to be on tiKtok. TikTok is a video-sharing app that has been downloaded over 200 million times in the United States alone. It is available in over 150 countries and has over 1 billion users. You should be on TikTok right now if your target audience is anyone between the ages of 13 and 60. So let me tell you <b>how to set up a business tiktok account</b>.</span></p><p style="margin-bottom: 0.14in;"><span style="color: #1f497d;"><span style="font-size: large;"> </span></span></p><p style="margin-bottom: 0.14in;"><span style="color: #1f497d;"><span style="font-size: large;">To</span></span><span style="color: #1f497d;"><span style="font-size: large;">
Set up </span></span><span style="color: #1f497d;"><span style="font-size: large;">A</span></span><span style="color: #1f497d;"><span style="font-size: large;">
Business TikTok Account:</span></span></p><p style="margin-bottom: 0.14in;"><span style="color: #1f497d;"><span style="font-size: large;"> </span></span></p><p style="margin-bottom: 0.14in;"><span style="color: #1f497d;"><span style="font-size: large;">
</span></span></p><p style="margin-bottom: 0.14in;">
<span style="font-size: small;">If you already have a personal
TikTok account and wish to convert it to a business account, our
guide will explain you how to set up</span><span style="font-size: small;">
a</span><span style="font-size: small;"> tiktok business
account</span></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;">Follow
these steps to setup tiktok business account</span></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><b>Step1:
</b></span><span style="font-size: small;">Tap the three dots
in the top-right corner of your TikTok profile to access your profile
settings.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrhQZQsbtbNhm3Q97kJBJ3ocksyJZh_-qa85a8R0CDbaVqdJY0eCCVDj9QeMbI1HmP8l60wNDGiOm3wXU_WF2jKz3fovp6sM7vq2G7iWr7lrLnFlRUVMC3eUr3hEsdXvekerkMz8OXQw/s640/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="445" data-original-width="640" height="223" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrhQZQsbtbNhm3Q97kJBJ3ocksyJZh_-qa85a8R0CDbaVqdJY0eCCVDj9QeMbI1HmP8l60wNDGiOm3wXU_WF2jKz3fovp6sM7vq2G7iWr7lrLnFlRUVMC3eUr3hEsdXvekerkMz8OXQw/w320-h223/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT.webp" width="320" /></a></span></div><span style="font-size: small;"><br /> </span>
<p></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><b>Step
2</b></span><span style="font-size: small;">:</span> <span style="font-size: small;">Select
"Manage Account" from the drop-down menu.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHgyuXwPPb5NmdGA9p6_HzrrwhkGgIYybEN7qbyvt0r1qdpuI0VAprASahyphenhyphenFGD1fS2z85b2QQ4YJ2nLYEIUHWqQPOiDGbqgp9fR5Ckwnop2GqsQ_CZ2gZ7UZK5Oqt78jbuLuRNbmr_GQ/s640/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-1.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="483" data-original-width="640" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHgyuXwPPb5NmdGA9p6_HzrrwhkGgIYybEN7qbyvt0r1qdpuI0VAprASahyphenhyphenFGD1fS2z85b2QQ4YJ2nLYEIUHWqQPOiDGbqgp9fR5Ckwnop2GqsQ_CZ2gZ7UZK5Oqt78jbuLuRNbmr_GQ/s320/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-1.webp" width="320" /></a></span></div><span style="font-size: small;"><br /> </span><p></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><b>Step3
:</b></span> <span style="font-size: small;">click on “switch
to pro account”</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEg-8SC_claZ_sVuaXMnHQmDFmisIOVAS9c-taqTh-txvub_njgYgzHZ_cUg3fQyp9JMWwTEiLsAoTlGGMSDJ6Oxt5k9BToS3-JliIHDNg0_7hrluREjAnGZIi3ATRAs4DHQHmNh-AUA/s640/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-2.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="557" data-original-width="640" height="279" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEg-8SC_claZ_sVuaXMnHQmDFmisIOVAS9c-taqTh-txvub_njgYgzHZ_cUg3fQyp9JMWwTEiLsAoTlGGMSDJ6Oxt5k9BToS3-JliIHDNg0_7hrluREjAnGZIi3ATRAs4DHQHmNh-AUA/s320/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-2.webp" width="320" /></a></span></div><span style="font-size: small;"><br /></span><p></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><b>Step
4: </b></span><span style="font-size: small;">click</span><span style="color: #505050;"><span style="font-family: Helvetica, serif;"><span style="font-size: small;"><span style="background: rgb(255, 255, 255) none repeat scroll 0% 0%;">
</span></span></span></span><span style="color: #505050;"><span style="font-size: small;"><span style="background: rgb(255, 255, 255) none repeat scroll 0% 0%;">“</span></span></span><span style="color: black;"><span style="font-size: small;"><span style="background: rgb(255, 255, 255) none repeat scroll 0% 0%;">Next”
under the “Business” account type.</span></span></span></p><p style="margin-bottom: 0.14in;"><span style="color: black;"><span style="font-size: small;"><span style="background: rgb(255, 255, 255) none repeat scroll 0% 0%;"> </span></span></span></p><div class="separator" style="clear: both; text-align: center;"><span style="color: black;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRBAf9_gs3KBhqaiCwtaGMGhx_qZ5KDWe3WewuyKCgU5O-QNP7tfN2iQvpK5QYPvylmJrM7lIuyFSaPY01JgYkFIbbwlj53prpy-UlOKdXmxp15GkH1-Nr2ZpM3x2ht-sXivZac-KQ3w/s1024/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-3.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1024" data-original-width="532" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRBAf9_gs3KBhqaiCwtaGMGhx_qZ5KDWe3WewuyKCgU5O-QNP7tfN2iQvpK5QYPvylmJrM7lIuyFSaPY01JgYkFIbbwlj53prpy-UlOKdXmxp15GkH1-Nr2ZpM3x2ht-sXivZac-KQ3w/s320/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-3.webp" width="166" /></a></span></span></div><span style="color: black;"><span style="font-size: small;"><br /></span></span><p></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><b>Step
5</b></span>: <span style="font-size: small;">Select the
category that best describes your company. You can view more
categories by scrolling down the list.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUNKekcKq0YRLU82KSjCAMQhkcy7ca7OuV6orVgIndwiakeggZb2xBv1rFjJuJ9J1U3quwVCKABv2MvVdTBsDG2yJB9bRgOG53TWy2YN1vkb05QYh1sTbnqtVSs3OO3ncRW4L9yLG9Ug/s1024/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-4.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1024" data-original-width="530" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUNKekcKq0YRLU82KSjCAMQhkcy7ca7OuV6orVgIndwiakeggZb2xBv1rFjJuJ9J1U3quwVCKABv2MvVdTBsDG2yJB9bRgOG53TWy2YN1vkb05QYh1sTbnqtVSs3OO3ncRW4L9yLG9Ug/s320/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-4.webp" width="166" /></a></span></div><span style="font-size: small;"><br /></span><p></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><b>Step
6</b></span><span style="font-size: small;">: At the bottom of
the screen, click "Next."</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqJEPbBKHPs1g9wVHwS-DnUh4rXNw7iVoZFw9uQ-9TOZNoVohVT3By8zQYJgyPgNWff5RGe6aVaBtg2jCYL19O5oqJXcboCEgDMGbTZYA7U139uZ8Yi4wOQQbCNG7YoDmq0nEYhLLidQ/s1024/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-5.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1024" data-original-width="529" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqJEPbBKHPs1g9wVHwS-DnUh4rXNw7iVoZFw9uQ-9TOZNoVohVT3By8zQYJgyPgNWff5RGe6aVaBtg2jCYL19O5oqJXcboCEgDMGbTZYA7U139uZ8Yi4wOQQbCNG7YoDmq0nEYhLLidQ/s320/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-5.webp" width="165" /></a></span></div><span style="font-size: small;"><br /> </span><p></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;">Once
you set up a business tiktok account you will be presented with a
welcome screen , after this you are able to edit your email and and
add your website.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"><script async="" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script> <br /></span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYfMgt-WuhfJng2dx9ozzUmIVpZbzam-SrQHAafOW4JZ_Z_5kI0azYflYLqr8SPezdPVdVxZoDEkZMzhMpABtJ4kpk_4t5eSjmSNDARVG2S1Y25geCo2vwM97kYB2BHkZim-vgxX4q6g/s640/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-6.webp" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="438" data-original-width="640" height="274" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYfMgt-WuhfJng2dx9ozzUmIVpZbzam-SrQHAafOW4JZ_Z_5kI0azYflYLqr8SPezdPVdVxZoDEkZMzhMpABtJ4kpk_4t5eSjmSNDARVG2S1Y25geCo2vwM97kYB2BHkZim-vgxX4q6g/w400-h274/HOW+TO+SET+UP+A+BUSINESS+TIKTOK+ACCOUNT-6.webp" width="400" /></a></span></div><span style="font-size: small;"><br /></span><p></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;">
</span></p><p style="margin-bottom: 0.14in;">
<span style="color: #365f91;"><span style="font-size: large;"><b>Benefits
</b></span><span style="font-size: large;"><b>T</b></span><span style="font-size: large;"><b>o
</b></span><span style="font-size: large;"><b>S</b></span><span style="font-size: large;"><b>et
</b></span><span style="font-size: large;"><b>U</b></span><span style="font-size: large;"><b>p
</b></span><span style="font-size: large;"><b>A</b></span><span style="font-size: large;"><b>
</b></span><span style="font-size: large;"><b>B</b></span><span style="font-size: large;"><b>usiness
</b></span><span style="font-size: large;"><b>Tiktok</b></span><span style="font-size: large;"><b>
</b></span><span style="font-size: large;"><b>A</b></span><span style="font-size: large;"><b>ccount:</b></span></span></p><p>
</p><p style="margin-bottom: 0.14in;">
<span style="font-size: small;">As I said before, tiktok has
over 1 billion users worldwide .it is a huge platform and it also
seems <b>easy to create a video content that goes viral</b> and reaches
thousands of views.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;">
</span></p><h3 class="western" style="text-align: left;"><span style="color: #365f91;">
International Marketing:</span></h3>
<p style="margin-bottom: 0.14in;"> <span style="font-size: small;">If
you are looking for an international marketing then tiktok is the
best option . The platform's popular videos can be seen all over the
world. TikTok is an effective medium for engaging with new audiences
in other nations if you want’</span><span style="font-size: small;">s</span><span style="font-size: small;">
to reach international markets.</span></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><style type="text/css">h1 { margin-top: 0.33in; margin-bottom: 0in; direction: ltr; color: #365f91; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h1.western { font-family: "Cambria", serif; font-size: 14pt; font-weight: bold }h1.cjk { font-family: ; font-size: 14pt; font-weight: bold }h1.ctl { font-family: ; font-size: 14pt; font-weight: bold }p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent </style></span></p><h3 class="western" style="text-align: left;"><span style="color: #365f91;">
Video Marketing:</span></h3>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;">According
to a recent research, 93 percent of marketers consider video to be a
significant aspect of their marketing strategy, and 78 percent
believe video marketing has helped their company's bottom line. With
the level of competition in today's digital are</span><span style="font-size: small;">a.</span><span style="font-size: small;">
</span>
</p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;">if
you or your digital marketing firm aren't using video now, your
company is missing out on significant potential.</span><span style="font-size: small;">Sales
and traffic both increased as a result of the video </span><span style="font-size: small;">marketing
on tiktok business account</span><span style="font-size: small;">.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;">
</span></p><h3 class="western" style="text-align: left;">
<span style="color: #365f91;">Connect With Audience Through TikTok:</span></h3>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;">Launch
a hashtag challenge to advertise your business and reach a wider
audience</span><span style="font-size: small;">s</span><span style="font-size: small;">.
You can choose a concept or topic, then encourage viewers to produce
or recreate videos using a custom hashtag you've created. It's a
great method to get more people talking about your brand and drive
</span><span style="font-size: small;">into</span><span style="font-size: small;">
collaboration.</span></p>
<h3 class="western" style="text-align: left;"><span style="color: #365f91;">Conclusion:</span></h3>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;">For
your business, TikTok can be a goldmine of engagement. The average
TikTok user spends 52 minutes per day on the app, which means that
advertisers have plenty of opportunities to reach their target
audience. Despite the fact that it is less expensive than more
established platforms, it is still relatively easy for lesser-known
brands to gain organic reach without breaking the bank. It offers a
variety of ad formats, such as a branded hashtag challenge, a branded
lens</span>, and so on.</p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><style type="text/css">h1 { margin-top: 0.33in; margin-bottom: 0in; direction: ltr; color: #365f91; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h1.western { font-family: "Cambria", serif; font-size: 14pt; font-weight: bold }h1.cjk { font-family: ; font-size: 14pt; font-weight: bold }h1.ctl { font-family: ; font-size: 14pt; font-weight: bold }p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }</style> <br /></span></p>
<p style="margin-bottom: 0.14in;"><span style="font-size: small;"><style type="text/css">h1 { margin-top: 0.33in; margin-bottom: 0in; direction: ltr; color: #365f91; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h1.western { font-family: "Cambria", serif; font-size: 14pt; font-weight: bold }h1.cjk { font-family: ; font-size: 14pt; font-weight: bold }h1.ctl { font-family: ; font-size: 14pt; font-weight: bold }p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }</style></span></p>
<p style="margin-bottom: 0.14in;"><span style="color: #1f497d;"><span style="font-size: large;"><style type="text/css">p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }</style> <br /></span></span></p><p style="margin-bottom: 0.14in;"><span style="color: #1f497d;"><span style="font-size: large;"> </span></span></p>
<p class="western" style="text-align: left;"><span style="font-size: small;"><style type="text/css">p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }</style></span></p>
<p><style type="text/css">h1 { margin-top: 0.33in; margin-bottom: 0in; direction: ltr; color: #365f91; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h1.western { font-family: "Cambria", serif; font-size: 14pt; font-weight: bold }h1.cjk { font-family: ; font-size: 14pt; font-weight: bold }h1.ctl { font-family: ; font-size: 14pt; font-weight: bold }p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }</style></p>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-66188917073835943022021-09-23T12:47:00.011-07:002021-09-23T12:50:47.251-07:00HOW TO RESET GMAIL PASSWORD WITHOUT PHONE NUMBER<p>
</p><h1 class="western">
“HOW TO RESET GMAIL PASSWORD WITHOUT PHONE NUMBER”</h1><p class="western" style="text-align: left;">
</p><p>
<span style="font-size: small;">One of the most typical
problems with today's generation's email accounts is password
recovery. With so many accounts and passwords to remember every day,
it's understandable if we forget some of them. Many people get their
accounts deactivated since they have not logged in for more than 30
days. </span><span style="font-size: small;">As a result,
users should always check their accounts on a regular basis.</span></p><p><span style="font-size: small;">Gmail
is protected by multiple levels of security to keep users' accounts
safe and secure. As a result, you will be given a set of instructions
to follow in order to successfully recover your account. You can
recover it using a phone number, an alternate email account, or
security questions, for example. It is also possible to recover your
Gmail account without a phone number if you are curious to know "<b>how
to recover your Gmail account without phone number".</b></span> <span style="font-size: small;">We've
compiled a list of simple steps for you to follow.</span>
</p><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Let's
get started:</span></p>
<p style="margin-bottom: 0.14in;"> <span style="background: rgb(255, 255, 255) none repeat scroll 0% 0%;"> </span></p><h3 style="margin-bottom: 0.14in; text-align: left;"><span style="background: rgb(255, 255, 255) none repeat scroll 0% 0%;">1. <b><span style="color: #365f91;">Go to
Google Account Recovery</span></b></span>
</h3><ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Remember:
If you're already logged into your Gmail or Google account, this
instruction will only work for you.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">To
begin, browse to the Google Account Recovery page</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">If
you need to retrieve your Gmail or Google account, Google recommends
using this method.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">To
begin, go to Google on a computer and type in "Google
recovery."</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Then,
on the first search result that says "<b>Google Account Recovery</b>,"
click on it.</span></p>
</li></ul>
<p style="margin-bottom: 0.14in; margin-left: 0.53in;"><img alt="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-1.png?resize=768%2C273&ssl=1" src="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-1.png?resize=768%2C273&ssl=1" /></p><p style="margin-bottom: 0.14in; margin-left: 0.53in; text-align: center;">
<br />
</p><h1 class="western">2. Enter your email <br /></h1><ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You
can recover your Google or Gmail account using several techniques on
the Google Account Recovery website.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">The
Gmail app, your recovery email, and your phone number are some of
the options.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You
must skip both of these options because you do not have a recovery
email or phone number.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"> </span></p><p style="margin-bottom: 0.14in;"><script async="" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You
must, however, enter your email or phone number before you can
recover your Google account.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">To
begin, fill in the “Email or phone” field with your email
address or phone number.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Then,
to move on to the next step, click on "Next."</span></p>
</li></ul>
<h1 class="western">3. Select “Try another way to sign in”</h1>
<ul style="text-align: left;"><li><p style="margin-bottom: 0.14in;">You'll be sent to the "Try
another way to sign in" page after entering your email address.</p><p style="margin-bottom: 0.14in; text-align: center;"><img alt="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-4edit.jpg?w=505&ssl=1" src="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-4edit.jpg?w=505&ssl=1" /> <br /></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">You'll find three options for
logging into your Gmail or Google account on this page.</p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">“Enter your password,” “Get
a verification code,” and “Try another way to sign in” are all
examples of this.</p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">You won't see the "Get a
verification code" method if you don't have a recovery email.</p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">Click on "Try another way
to sign in" if you don't know your password and don't have a
recovery email.</p>
</li></ul>
<h1 class="western">4. Click on “Try another way”</h1>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You'll
be sent to the phone verification method after clicking "Try
another way to sign in."</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">If
you have access to your phone, choose "Yes" to get a
verification code as a notice from Google.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Then,
to confirm your identity, you must input the verification code</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You
won't be able to utilize this technique if you haven't linked your
phone or don't have access to it.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">If
this is the case, select "Try another approach" to go on
to the next option.</span></p>
</li></ul>
<h1 class="western"> 5. Click on “Try another way” again</h1>
<p style="margin-bottom: 0.14in;"><br /></p><p style="margin-bottom: 0.14in; text-align: center;">
<img alt="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-4edit.jpg?w=505&ssl=1" src="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-4edit.jpg?w=505&ssl=1" />
</p>
<ul><li><p style="margin-bottom: 0.14in;">You'll be directed to the "Get
a verification code" method after clicking "Try another
way."</p></li></ul><ul><li><p style="margin-bottom: 0.14in;">Instead of a notification,
you'll get a text message with a verification code, as opposed to
the old way.</p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">If you have access to your
phone, press the "Send" button to receive a verification
code.</p></li></ul><ul><li><p style="margin-bottom: 0.14in;">Then you must authenticate your
identity by entering the verification code.</p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">If you don't have access to
your phone, go to the next step by clicking "Try another way"
again.</p>
</li></ul>
<ol start="6"><li><h1 class="western"> Wait for 48 hours</h1>
</li></ol>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Google
will ask you to check your email after 48 hours if you click "Try
another method" again.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv9S2FNPezGsLq7HatC-FDe623T_LpB7i-pNWrFGca6fBKsTwLXTAJhgWTzaZ5ShU3wZX7oU-btJbmSzMNEy3e52o19VNBbAPi5Ls9aN7VxjnM2nlYm_rwPB5ulr9Vlv0O2_9XwCY4AA/s506/Screenshot+from+2021-09-24+00-10-11.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="384" data-original-width="506" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv9S2FNPezGsLq7HatC-FDe623T_LpB7i-pNWrFGca6fBKsTwLXTAJhgWTzaZ5ShU3wZX7oU-btJbmSzMNEy3e52o19VNBbAPi5Ls9aN7VxjnM2nlYm_rwPB5ulr9Vlv0O2_9XwCY4AA/s16000/Screenshot+from+2021-09-24+00-10-11.png" /></a></span></div><span style="font-size: small;"><br /> </span><p></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Google
will send you a link to reset your password after 48 hours.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">This
is because Google requires time to verify that the email address you
provided is yours.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">The
link to reset your password will be sent to the email address you
used to register.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">As
a result, you must be logged into your Gmail or Google account in
order for this to function.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">You won't be able to reset your
password if you aren't logged into your Gmail or Google account
anywhere.</p>
</li></ul>
<ol start="6"><li><h1 class="western"> Check your email for the recovery link</h1>
</li></ol>
<ul><li><p style="margin-bottom: 0.14in;">Check your Gmail inbox on the
device where you're currently logged in.</p><p style="margin-bottom: 0.14in;"><img alt="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-7edit.jpg?resize=594%2C1024&ssl=1" class="shrinkToFit" height="888" src="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-7edit.jpg?resize=594%2C1024&ssl=1" width="515" /> <br /></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;">You must check your email for
the password reset link after 48 hours.</p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">The
link to reset your password will be sent to the email address you
used to register.</span></p>
</li></ul>
<p style="margin-bottom: 0.14in;"><i><span style="font-size: small;">As
a result, you must be logged into your Gmail account.</span></i></p>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">For
example, if you're using the Gmail mobile app to access your Gmail
account, you'll need to open it.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">Next,
look for the password reset link in your mailbox and click it.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">If
the email does not appear in your inbox, try your garbage and spam
folders.</span></p>
</li></ul>
<ol start="6"><li><h1 class="western">Click on “Get started” to rest your
password</h1>
</li></ol>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You'll
see a button to reset your Gmail password after you've clicked on
the email.</span></p><p style="margin-bottom: 0.14in;"><span style="font-size: small;"><img alt="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-8edit.jpg?resize=597%2C1024&ssl=1" class="shrinkToFit" height="888" src="https://i0.wp.com/www.followchain.org/wp-content/uploads/2021/08/recover-gmail-password-without-phone-number-and-recovery-email-8edit.jpg?resize=597%2C1024&ssl=1" width="517" /> <br /></span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">To
reset your Gmail password, click "Get started" and follow
the on-screen instructions.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You'll
have to create a new password and input it again.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">It's
important to note that the link is only valid for 7 days.</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You
won't be able to reset your password if you visit the URL after 7
days</span></p>
</li></ul>
<ul><li><p style="margin-bottom: 0.14in;"><span style="font-size: small;">You've
just figured out how to recover your Gmail password <b>without using a
phone number</b> or a recovery email!</span></p>
</li></ul>
<p style="margin-bottom: 0.14in; margin-left: 0.5in;"><br />
<br />
</p>
<p class="western" style="text-align: left;"><style type="text/css">h2 { margin-top: 0.14in; margin-bottom: 0in; direction: ltr; color: #4f81bd; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h2.western { font-family: "Cambria", serif; font-size: 13pt; font-weight: bold }h2.cjk { font-family: ; font-size: 13pt; font-weight: bold }h2.ctl { font-family: ; font-size: 13pt; font-weight: bold }h1 { margin-top: 0.33in; margin-bottom: 0in; direction: ltr; color: #365f91; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h1.western { font-family: "Cambria", serif; font-size: 14pt; font-weight: bold }h1.cjk { font-family: ; font-size: 14pt; font-weight: bold }h1.ctl { font-family: ; font-size: 14pt; font-weight: bold }p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }a:link { color: #000080; so-language: zxx; text-decoration: underline }a:visited { color: #800000; so-language: zxx; text-decoration: underline }</style></p>
<p><style type="text/css">h1 { margin-top: 0.33in; margin-bottom: 0in; direction: ltr; color: #365f91; line-height: 115%; text-align: left; page-break-inside: avoid; orphans: 2; widows: 2; background: transparent; page-break-after: avoid }h1.western { font-family: "Cambria", serif; font-size: 14pt; font-weight: bold }h1.cjk { font-family: ; font-size: 14pt; font-weight: bold }h1.ctl { font-family: ; font-size: 14pt; font-weight: bold }p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }</style></p>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-85929300351919714022021-02-12T01:30:00.001-08:002021-09-16T23:49:14.754-07:00what is difference between encryption and hashing<h2 style="text-align: center;">Difference Between Encryption And Hashing</h2><p style="text-align: left;">So today's let's discuss about difference between encryption and hashing,This question was asked in interview if you are applying for position like pentester or system engineer.</p><p style="text-align: left;">Let's decrypt the answer</p><h2 style="text-align: left;">What Is Encryption? </h2><p style="text-align: left;">Encryption is a way to scrambling information in a way that only someone with a corresponding key can unscramble and read it.Encryption is a two way function,When you encrypt some information you are doing with intension that after some time you can decrypt it. </p><h2 style="text-align: left;">How Does Encryption Work?</h2><p style="text-align: left;">I am going to encrypt a sentence using mono-alphabetic shift cypher that has ability to replace each letter with one that is sequentially three places ahead of it.</p><p style="text-align: left;"> </p><p style="text-align: center;"> </p><p style="text-align: center;"></p><p style="text-align: center;"><img alt="" class="wp-image-9947" height="207" src="https://www.thesslstore.com/blog/wp-content/uploads/2019/04/Example-Cipher-300x207.png" width="300" /> </p><p style="text-align: left;"> </p><h2>Historical encryption algorithms</h2><p style="text-align: left;">Let’s start by going over some different types of ciphers.</p><p style="text-align: left;"><br /></p><p style="text-align: left;"><strong>Shift Ciphers</strong> – Like the example we discussed above,
two parties determine a number between 1-25, and shift the letters that
number of spaces in the alphabet. The shift number serves as the key.</p><p style="text-align: left;"><strong>Nomenclator ciphers</strong> – A type of substitution cipher
that replaces common plaintext words with symbols to try and throw off a
specific form of cryptanalysis. <br /></p><p style="text-align: left;"> </p><h2>When should encryption be used?</h2><p style="text-align: left;">As we discuss above,encryption is a two way function,You encrypt information with the intension to decrypt it later.it will help you to protect your information , protecting cloud data and transmitting financial information </p><p style="text-align: center;"><br /></p><p style="text-align: center;"><br /></p><script async="" crossorigin="anonymous" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2996176749962436"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script><h2 style="text-align: left;">Key Point</h2><p style="text-align: left;"><b>"Encryption is reversible and hashing is not"</b></p><p style="text-align: left;"><b> </b></p><h2>What is Hashing?</h2><p style="text-align: left;">Hashing is a process to map data of any size into fixed length,this is called hash value,where encryption is two way function hashing is only one way function.</p><p style="text-align: left;">Every hash value is unique. If two different files produce the same
unique hash value this is called a collision and it makes the algorithm
essentially useless.</p><p style="text-align: left;">anyway, here is a example of hashing, let's suppose you want to digitaly sign a software to make it available to download from your website..To do this you need create a hash of the script or executable you’re signing </p><p style="text-align: center;"><img alt="The difference between Encryption, Hashing and Salting" class="wp-image-9978" height="246" src="https://www.thesslstore.com/blog/wp-content/uploads/2018/12/Hashing-Example-1024x492.png" width="512" /> </p><h2>Common Hashing Algorithms</h2><p style="text-align: left;"><strong>MD4</strong> – MD4 is a self-loathing hash algorithm, created in
1990, even its creator, Ronald Rivest, admits it has security problems.
The 128-bit hashing algorithm made an impact though, it’s influence can
be felt in more recent algorithms like WMD5, WRIPEMD and the WHSA
family.</p><p><strong>MD5</strong> – MD5 is another hashing algorithm made by Ray
Rivest that is known to suffer vulnerabilities. It was created in 1992
as the successor to MD4. Currently MD6 is in the works, but as of 2009
Rivest had removed it from NIST consideration for SHA-3. </p><p>
<strong>TIGER</strong> – A fairly new algorithm that is beginning to
gain some traction with file sharing networks and torrent sites. There
are currently no known attacks that are effective against its full
24-round variant.</p><h3 style="text-align: left;">What is a conclusion of Encryption And Hashing</h3><ul><li>Encryption is a two-way function where information is scrambled in such a way that it can be unscrambled later.</li><li>Hashing is a one-way function where data is mapped to a fixed-length value. Hashing is primarily used for authentication.</li></ul><h2 style="text-align: left;">How to support me?</h2><p style="text-align: left;">if you want more articles then support me it will help me to motivate you can send btc to my wallet</p><p style="text-align: left;"><b>BTC Wallet: </b>3BMm14ZV538N3iUo61PybsxZdYhVTFgp4S <br /></p><p style="text-align: left;"><b> </b></p><p style="text-align: left;"><br /></p>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-58980206675872408342020-11-21T13:36:00.002-08:002020-11-21T13:40:04.676-08:00Ransomware Attack Solution - How ransomware works<h2 style="text-align: center;">Ransomware Attack Solution - How ransomware works</h2><p style="text-align: left;">Ransomware is serious attack ,In this article we will cover all the things related to ransomware and how to prevent from it </p><h3 style="text-align: left;">What Is Ransomware?</h3><p style="text-align: left;">Ransomware is a form of malware that encrypt a victim file,In this type of attack attacker demand ransom from a victim.</p><p style="text-align: center;"> <img src="https://pronto-core-cdn.prontomarketing.com/2/wp-content/uploads/sites/2254/2020/01/Ransomware-Attack.png" /></p><p style="text-align: left;">In this case attacker give instruction about how to pay ransom and where to send most common form of the payment was bitcoin or cryptocurrencies because it was undetectable the cost can be from hundred or thousand of dollars .</p><h3 style="text-align: left;">How ransomware works?</h3><p style="text-align: left;">Attacker can send ransomware via phishing , spamming your email or social engineering , once ransomware was downloaded and installed on your machine it will encrypt all the files on that machine.If you want to know <b><a href="https://www.mubassirkamdar.com/2020/11/how-to-detect-bitcoin-miner-malware.html" target="_blank">how to detect malware or ransomware</a></b> then check out my article.There are also some threat in which we saw that if you are a victim of ransomware attack and you are addicted to pornography attacker can blackmail you and ask for charge's or you can say a fine for watching porn if you don't give it to them attacker can leak screenshot or photo's but this was very rare case.</p><p style="text-align: center;"><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script></p><h3 style="text-align: left;">Who can be targeted by ransomware attack?</h3><div style="text-align: left;">Most often they choose a big organizations because they tend to have a good employ numbers.if they are able to manipulate only one employ of that company they can make a huge profit from it so if you want to learn how to train your employs about social engineering or cyber threats you can check my article about <b><a href="https://www.mubassirkamdar.com/2020/11/pentesting-cost.html" target="_blank">what is pentesting</a></b></div><div style="text-align: left;"><b> </b></div><div style="text-align: left;">On the other hand we saw that ransomware target a organization who can pay quick money to attacker for example government<b>,</b>medical institute or law firms,because they have sensitive information if that sensitive information was leaked they can face a huge loose.</div><div style="text-align: left;"><br /><b></b></div><div style="text-align: left;"><h2>Solution for ransomware attack?</h2><div style="text-align: left;">if your computer is infected by ransomware attack you can check out this video.</div><div style="text-align: left;"> </div><div style="text-align: center;"> <iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/kJuibb9QaWk" width="560"></iframe> <br /></div></div><div style="text-align: left;"><br /></div><div style="text-align: left;">This video has all the details , but the main points are:</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><ol style="text-align: left;"><li>reboot windows to <b>safe mode</b></li><li>install a software that <b><a href="https://transactions.sendowl.com/stores/9458/198191">detect malware or ransomware</a></b></li><li><a href="https://transactions.sendowl.com/stores/9458/198191"><b>scan the system</b></a> from ransomware </li><li>restore the computer to previous state</li></ol><p>But here is a important point which you need to keep in mind that from this step you are able to remove the ransomware but you are not able to decrypt your important file's because there is 50% chances to recover from ransomware attack if you want to decrypt ransomware file's you need a smart guy with that particular skills for this type of <a href="https://www.mubassirkamdar.com/p/contact-me.htmlhttps://www.mubassirkamdar.com/p/contact-me.html" target="_blank"><b>service you can contact me</b></a> <br /></p></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-3701074745615118062020-11-17T11:49:00.004-08:002020-11-21T00:49:42.846-08:00how to detect crypto mining malware<div style="text-align: center;"><br /></div><h2 style="text-align: center;">How To Detect Crypto Mining Malware</h2><p style="text-align: left;">A <b>crypto mining malware</b> uses your computer, laptop, mobile device and smart phone for mining of cryptocurrencies.</p><p style="text-align: left;"><b>bitcoin miner malware</b> or you can say crypto mining malware uses your machine to mine cryptocurrencies,in worst case's this type of malware destroyed victum machine due to heavy load<br /></p><p style="text-align: left;">if you don't want to go through whole article you can get this product and after this you are able to detect bitcoin miner malware,i will recommend this product because it was best product to detect crypto mining malware <a href="https://transactions.sendowl.com/stores/9458/198191" target="_blank"><b>Click Here</b></a> To Download<br /></p><p style="text-align: center;"><a data-pin-board-width="400" data-pin-do="embedUser" data-pin-scale-height="240" data-pin-scale-width="80" href="https://www.pinterest.com/securityteacher/"></a></p><p style="text-align: left;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://transactions.sendowl.com/stores/9458/198191" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img border="0" data-original-height="423" data-original-width="462" height="366" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGvUjd7B1V2fDr85_WXB5fTMXefLGP2xxestJt6zMBxgoBc87y8YdDLRCQv1NMeuBYwcyRJVbh4h_AO61VFEcr860n22KCQC_ggYLPi8JeCaaMlSe-SJ8290EanK0vNQUGT_kbXtHu3w/w400-h366/how+to+detect+bitcoin+miner+malware.png" width="400" /> </a></div><div class="separator" style="clear: both; text-align: center;"> </div><div class="separator" style="clear: both; text-align: left;"> </div><p style="text-align: left;">Hacker's use bitcoin mining malware very rapidly because they can make a good amount of income using your machine.</p><h3 style="text-align: left;">How To Detect Bitcoin Miner Malware</h3><p style="text-align: left;"><b>Symptoms of BitCoin Miner Malware:</b></p><ol style="text-align: left;"><li>Over usage of your machine or GPU<br /></li><li><b> </b>Over heating of machine</li><li>Slow down performance of your system or machine</li><li>if hacker's mining continuously using crypto mining malware your pc part's can be break</li></ol><h3 style="text-align: left;">How BitCoin Miner Malware Spread</h3><div style="text-align: left;">Crypto mining malware can be spread using numerous way's such as email attachment or if hacker is good he can embedded malware in compromised web.It can also be spread through ethernal blue vulnerability which was found in windows.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><h3 style="text-align: left;">how to detect crypto mining malware</h3><div style="text-align: left;">it is very hard to detect crypto mining malware because it was fileless malware,Traditional antivirus software can't detect it because it was new concept to mine cryptocurrencies using victum machine , to detect this type of malware you need a <a href="https://transactions.sendowl.com/stores/9458/198191" target="_blank"><b>highly capable antivirus</b></a><b>.</b>you can detect this malware manual but for this you need to check the programs that are running on your pc for this you need to go to task manager and check file's manually,I know it's very <b>complicated</b> and <b>sensitive</b> act. </div><div style="text-align: left;"> </div><div style="text-align: left;">you need <a href="https://transactions.sendowl.com/stores/9458/198191" target=""><b>highly capable antivirus</b></a><b> </b>solution which can detect and remove fileless malware.</div><div style="text-align: left;"><br /><b></b></div><div style="text-align: left;"><br /><b></b></div></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-24804244447342661112020-11-16T09:10:00.004-08:002020-11-21T00:51:05.155-08:00How Much Does Pentesting Cost<h2 style="text-align: center;"> How Much Does Pentesting Cost</h2><p style="text-align: left;">In this article we gonna discuss about pentesting cost and will learn some new things about pentesting.before taking start let me give you introduction about me</p><h3 style="text-align: left;">Introduction:</h3><p style="text-align: left;">Mubassir
Kamdar is an Ethical Hacker And Security Researcher from
Karachi,Pakistan.With over years of experience in cyber security,
Mubassir Kamdar identified major security flaws in world's well known
companies. This includes Eset, Facebook, Uber, Sony and many others. A
huge number of Halls of Fame and Certificates were rewarded as a token
of appreciation from these companies.</p><p style="text-align: center;"><a data-pin-board-width="400" data-pin-do="embedUser" data-pin-scale-height="240" data-pin-scale-width="80" href="https://www.pinterest.com/securityteacher/"></a></p><p style="text-align: left;">I also provide
the best solution to tackle the exploit and defend your application
from widespread abuse. Moreover, I especially target critical bugs, like
account takeover, database manipulation, and many more. If you need any
<b> service</b> of mine you can contact me via these <b><a href="https://www.mubassirkamdar.com/p/contact-me.html">Contact page</a>.</b></p><p style="text-align: left;"><b></b></p><div class="separator" style="clear: both; text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrm8RtzuDW6DUdJjt7SIIb4Y6SlCChLdKdhUZPQHHfRZqiz9V-jQgzVBtGGoMAuRAA8T5MeB67O7UJOlwEQ22STHswx5wRtnGfDZNGgWDeF7-QDV0-_9Ig_TcTpGPkg6CycuIHJx-FIA/s1080/50%2525OFF+for.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1080" data-original-width="1080" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrm8RtzuDW6DUdJjt7SIIb4Y6SlCChLdKdhUZPQHHfRZqiz9V-jQgzVBtGGoMAuRAA8T5MeB67O7UJOlwEQ22STHswx5wRtnGfDZNGgWDeF7-QDV0-_9Ig_TcTpGPkg6CycuIHJx-FIA/w400-h400/50%2525OFF+for.png" width="400" /></a></b></div><b><br /> </b> <br /><p></p><h3 style="text-align: left;"><span style="font-weight: normal;"><span class="smoove" data-move-y="102%"><b>what is pentesting?</b><br /></span></span></h3><p style="text-align: left;"><span class="smoove" data-move-y="102%">pentesting stands for penetration testing,in pentesting white hat hacker's focuses on security </span><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">assessment and threat detection to eliminate weaknesses or bugs with in the structure.</span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">pentesting is a key part of vulnerability assessment and penetration testing in short it called (<b>VAPT</b>)</span></span></p><h3 style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium">What is </span></span><span class="smoove" data-move-y="102%"><span class="thz-font-medium">vulnerability assessment?</span></span></h3><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><b>VA </b>is a practice in which every company need to engage in.While in </span></span><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">vulnerability assessment white hat hacker describe the way that how he finds the </span></span></span></span><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">vulnerability and what is the key impact of this v</span></span></span></span></span></span></span></span><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">ulnerability and how hacker's can use this vulnerability to exploit the company structure which can lead to <b>reputation loss</b>.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><h3 style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b>Why you need penetration testing and what is the pentesting cost?</b></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></h3><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">Cyber crime cost us enterprises and businesses $3.5 billion in 2019.according to this FBI receive 1,300 complaints every day.It is expected that till 2025 cyber crime will cost around $10.5 trillion annually.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">So now it's up to you that if you want to be secure or not</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">now come to the pentesting cost</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">the simple and easy answer of pentesting cost is "<b>IT DEPEND'S</b>" price of pentesting is depend on your aim to accomplish.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">you can say it depends on how much assets you want to test in other words it depend's on the scope of application and how much information you give to hacker's there are two type's of pentesting.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><ul style="text-align: left;"><li><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">black box testing</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></li></ul><ul style="text-align: left;"><li><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">white box testing</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></li></ul><h3 style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b>Scope</b></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></h3><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="MuiTypography-root" id="inputElements~4d0f64e1907554ad">The initial step of infiltration testing is to characterize the underlying extent of testing.</span>It is characterized by the way of the testing as the entrance testing is further separated in two sub classifications. <br /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><div><h3 style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b>Black Box Testing?</b></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></h3><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">Now your question is what is black box testing?</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b> </b>here is a simple answer,<b>Black Box Testing </b>is a method of testing in which you test application without knowing it's internal structure or code , </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">implementation details and internal paths.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b>White Box Testing?</b></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">Now it's about <b>White Box Testing</b>,in this testing method you give pentester an application and all the information like what the paths , internal routes , ip's and code to identify application flaws.<br /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><div><div><h3 style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b>Best answer for Pentesting Cost?</b></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></h3><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;">scope and duration of </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span><span style="font-weight: normal;">engagement, test concept and mainly the experience of Pentester will decide the pentesting cost</span></p><h1 style="text-align: left;"><a href="https://www.mubassirkamdar.com/p/contact-me.html" target="_blank"><span style="font-weight: normal;">Hire Me</span><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><b> </b></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></a></h1><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"> </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"> </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"> </span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p><p style="text-align: left;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><span class="smoove" data-move-y="102%"><span class="thz-font-medium"><span class="smoove" data-move-y="102%"><span class="thz-font-medium" style="font-weight: 400;"><br /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></p></div></div></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-18240232065244905052020-11-15T01:31:00.002-08:002020-11-15T01:31:50.990-08:00Web Security Tool<p> </p><h2 style="text-align: center;">Web Security Tool</h2><p style="text-align: left;">In this article we will discuss about tools which helps you in securing your website and to identify some security threats in them Sucuri,Getastra,Detectify,siteguarding</p><h3 style="text-align: left;">Introduction:</h3><h3 style="text-align: left;"> <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUVNkBQ0gE-P3pHpTi8xlgX2onTf30jlP5S6-BeYqN3DD-uvzlmm5lC6TDz2wQwAC7oEheQnIX0ZqyKNV5r4zd0mOGKTbmhP54EQMxEM07H7udcReaGZV2LNjPpXWg3MaosSikoS7EzQ/s1080/hUMAN+MIND+CAN+NEVER+BE+REPLACED+BY+TOOLS.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1080" data-original-width="1080" height="416" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUVNkBQ0gE-P3pHpTi8xlgX2onTf30jlP5S6-BeYqN3DD-uvzlmm5lC6TDz2wQwAC7oEheQnIX0ZqyKNV5r4zd0mOGKTbmhP54EQMxEM07H7udcReaGZV2LNjPpXWg3MaosSikoS7EzQ/w416-h416/hUMAN+MIND+CAN+NEVER+BE+REPLACED+BY+TOOLS.png" width="416" /></a></div><br /><br /></h3><p style="text-align: left;">Now a day's web security is trending topic in IT,Today there are hundreds of thousand of vulnerabilities that are affecting consumers.I saw a people always talks about <a href="https://www.mubassirkamdar.com/2020/11/Getresponse-vs-Aweber-2021.html"><b>SEO</b></a>,Content Creation , and <a href="https://www.bluehost.com/track/mubassir/"><b>Best Hosting,</b></a> But they never take security seriously , any one who suffered from data breach can tell you about importance of web application security.So before coming to the best web security best tool let me tell you one thing that tool can't fully pentest your web application.For this you need a <a href="https://www.upwork.com/o/profiles/users/~014b62a1437ef397e0/"><b>Pentester</b></a> because human mind and logic can never be replaced with tools.</p><p style="text-align: left;">So Let's start discussing the top demanding web security tool</p><h3 style="text-align: left;">Sucuri </h3><h3 style="text-align: left;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Apk6cRB1Y3hmQTvdQZIpcTGAf4vWYWlWOkY1oX1VY22DIek1NGRqeLIzVAOUrPvnKRtqfkXWv_TOZUetGa_q8OFEsDTuBAFnfbvYr-PG2I-pUn8WkCvkT2nYuXDffLqHbEFniFtdhA/s1349/Screenshot+from+2020-11-14+21-32-31.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="658" data-original-width="1349" height="195" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Apk6cRB1Y3hmQTvdQZIpcTGAf4vWYWlWOkY1oX1VY22DIek1NGRqeLIzVAOUrPvnKRtqfkXWv_TOZUetGa_q8OFEsDTuBAFnfbvYr-PG2I-pUn8WkCvkT2nYuXDffLqHbEFniFtdhA/w400-h195/Screenshot+from+2020-11-14+21-32-31.png" width="400" /></a></div><br /> </h3><p style="text-align: left;"><a href="https://sucuri.net/"><b>Sucuri</b></a> can perform various type's of web security scan such as identifying security risks remediating them , you can configure this tool for continue inspection, configure performance optimization etc.sucuri is much useful for identifying malware in web application like shells and etc, Sucuri web site security scanner scan through the server and collect all information and identify the flaws in it and can help in recovering Hacked websites.SUCURI has it own firewall which can give your web application protection against DDOS , Bruteforce attack.</p><p style="text-align: left;"> </p><h3 style="text-align: left;">Getastra Or Astra Security<br /></h3><h3 style="text-align: left;"> </h3><p style="text-align: left;">astra security is best for web application security because what I have seen in this product is like plug and hunt they support every cms like wordpress,drupal,magento,opencart and joomla etc.I now what you are thinking that astra security only give security to popular CMS or they support any other frameworks like Laravel,CodeIgniter, Yii etc.yes,They have build there own libraries which can be used in any project.</p><h3 style="text-align: left;">Can Astra Security clean hacked/malware infected websites? </h3><p style="text-align: left;">Yes,They have highly skilled professionals they can make your website clean from malware or shell in <a href="https://www.getastra.com/?secure=muhammadmubassir" target="_blank"><b>just one day</b></a></p><h3 style="text-align: left;"><b>Now talk about Astra Security features</b></h3><p style="text-align: left;"><b>Firewalls</b></p><p style="text-align: left;"><a href="https://www.getastra.com/?secure=muhammadmubassir"><b>Astra Security</b></a> provide you 24/7 firewall protection which can protect you from attacks like sql injection , xss , injection attacks , remote code execution , Bad bots ,spamming , fuzzing your website directory with that much protection I think only real user can access your website</p><p style="text-align: center;"><a href="https://s.getastra.com/trial/black-friday?secure=muhammadmubassir" rel="nofollow" target="_BLANK"><img border="0" src="https://static.tapfiliate.com/5fae538f357aa085232599.png?a=83678-a2b42e&s=1237663-74d218" /></a> <br /></p><h4 style="text-align: left;">IP and Country Blocking</h4><p style="text-align: left;">With Astra Security you can block malicious user , IP , Country in just one click </p><p style="text-align: left;"><b>Now the best part</b></p><h3 style="text-align: left;"><b>Tracking Attacker</b></h3><p style="text-align: left;">Using this plugin you can track attacker profile and can get a attacker details like his country from where the attack is performing his IP address and it will help you to easily take protective measures</p><h3 style="text-align: left;">Control files which are uploading on your website </h3><p style="text-align: left;">You don't need to set a filter or mime type on server side to proper validate a file which is uploading on your server with astra security it's firewall will do file check automatically</p><p style="text-align: left;">They have many more features mentioned on there profile you can visit it from <a href="https://www.getastra.com/?secure=muhammadmubassir"><b>HERE</b></a></p><p style="text-align: left;"><b> </b><span style="color: #0000ee;"><u><a href="https://www.getastra.com/s/wordpress-security-course/?secure=muhammadmubassir" rel="nofollow" target="_BLANK"><img border="0" src="https://static.tapfiliate.com/5d664a4f6ca13.png?a=54878-600116&s=1237663-74d218" /></a></u></span><br /></p><p style="text-align: left;"><b> </b><br /></p><h3 style="text-align: left;"><b> </b>Detectify </h3><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicowqNpzVazdYWyoQkSBgERfpvPUuxUug3MHTza-UGHSySw1bgdkZ1TMOsAepB2GV1fy0RIrRCef30p9GOKWUTUt5Y2D7-JJa89SIMMwrffeGwV2Imgo2qIvow43i6tElNr1YiPLg2Zg/s1919/Screenshot+from+2020-11-14+23-38-58.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="469" data-original-width="1919" height="98" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicowqNpzVazdYWyoQkSBgERfpvPUuxUug3MHTza-UGHSySw1bgdkZ1TMOsAepB2GV1fy0RIrRCef30p9GOKWUTUt5Y2D7-JJa89SIMMwrffeGwV2Imgo2qIvow43i6tElNr1YiPLg2Zg/w400-h98/Screenshot+from+2020-11-14+23-38-58.png" width="400" /></a></div><br /><h3 style="text-align: left;"><br /></h3><p style="text-align: left;"><a href="https://detectify.com/"><b>Detectify</b></a> was found in 2013 by Rickard Carlsson , detectify has received worldwide recognition for there security research.</p><p style="text-align: left;">They mainly work on two products </p><ul style="text-align: left;"><li>Asset Monitoring</li><li>Deep Scan</li></ul><h3 style="text-align: left;">Asset Monitoring </h3><p style="text-align: left;">This tool monitor assets of application which attacker can exploit to hack your website or application there are many asset which developer forgot to remove from web like directory listing , open ports which should not be opened , sensitive files like .git </p><p style="text-align: left;">also this tool can do web application pentesting using OWASP top 10 vulnerabilites </p><p style="text-align: left;">like xss , csrf , rce,lfi and path traversal etc.</p><p style="text-align: left;"> </p><h3 style="text-align: left;"><b>Deep Scan</b></h3><p style="text-align: left;">Deep scan discover latest vulnerabilites and also patch them accordingly,Deep Scan test beyond cve this means deep scan can test logical flaws and those bugs which bots / web security tools can't find</p><p style="text-align: left;"> </p><h3 style="text-align: left;">Siteguarding</h3><h3 style="text-align: center;"><a href="https://www.siteguarding.com/en/affiliate?partner_id=20385"><img alt="Website security, detecting malwares on the website and removal services, website backup services, daily website file scanning and file changes monitoring" border="0" src="https://www.siteguarding.com/images/affiliate/siteguarding-300x250.jpg" title="SiteGuarding Professional Website Security Services" /> </a></h3><p style="text-align: left;"> <a href="https://www.siteguarding.com/en/affiliate?partner_id=20385"><b>Siteguard</b></a> has a very good amount of features malware removal services,secure hosting,antivirus scanner , blacklist monitoring , file change monitoring , available monitoring , full backup , geo protection , website firewall (WAF) , bad bot protection , ssl certificate , bruteforce protection , password page protection , server performance , outbound link scanner <br /></p><p style="text-align: left;"> </p><p style="text-align: left;"> <br /></p><p style="text-align: left;"><br /></p><h3 style="text-align: left;"> </h3><p style="text-align: left;"> </p>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-55043665881524474562020-11-14T14:09:00.007-08:002020-11-14T14:57:42.155-08:00What do you use? Getresponse vs Aweber vs Mailchimp 2021 <h2 style="text-align: center;">What do you use? Getresponse vs Aweber vs Mailchimp 2021 </h2><p style="text-align: left;">With so many email marketing tools to choose from, choosing the best online email service can be a confusing task. </p><p style="text-align: left;"><a href="https://bit.ly/2Uip9sv" target="_blank">GetResponse</a> or Mailchimp or Aweber?</p><p style="text-align: left;"> </p><p style="text-align: left;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3IJORBC6e1NDof4GLF7P3kDjMnxflCw_7OqtnFUmVZr-B6rSJwqsxReko69v2vcBkbtX95Fln7r1J49V27B7-TAXpiDY4vyTaQYOBjWrkq6tly2pjc77Pp2jezUzWt8bF0QElnGLl_Q/s1080/fREE+TRIAL.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1080" data-original-width="1080" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3IJORBC6e1NDof4GLF7P3kDjMnxflCw_7OqtnFUmVZr-B6rSJwqsxReko69v2vcBkbtX95Fln7r1J49V27B7-TAXpiDY4vyTaQYOBjWrkq6tly2pjc77Pp2jezUzWt8bF0QElnGLl_Q/w400-h400/fREE+TRIAL.png" width="400" /></a></div><br /><div class="separator" style="clear: both; text-align: center;"><br /></div><br /> <p></p><p style="text-align: left;"><b>Which one do you pick?</b><br /><br />For an extended period of time, I have personally used all three email marketing platforms and discovered out about each platform that you might not know from reading feedback or their website. </p><p style="text-align: left;">I'm going to share with you these things,so you're not going through the same pitfalls.<br /><br />If you don't want to read through the whole analysis, you can click on the Advertisment below to find out my personal preference for email marketing and get a 30-day <b>FREE trial</b>. </p><p style="text-align: center;">
</p><p style="text-align: center;"></p><p style="text-align: center;"></p><p style="text-align: center;"><a href="https://affiliates.getresponse.com/material/hit/565/MqXYFenMR9"><img alt="Pricing: Save 18% with an annual plan" src="https://affiliates.getresponse.com/material/view/565/MqXYFenMR9" /></a> <br /></p><p style="text-align: left;">Let's start now! </p><h3 style="text-align: left;">Did you want to know why you need getresponse , aweber and mailchimp?</h3><p style="text-align: left;">just as easily send out your regular or weekly emails from your business email or Gmail account to your subscriber base on you nich. </p><p style="text-align: left;">But more than just sending the odd text, these email marketing services offer more. </p><p style="text-align: left;">now a day's email marketing services isn't free as you already know.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjdrdA_yVid-z_NwkbsBBeFNXoVTTg0PYySW4SLbd52i5cVfFOsL6N6j3VwwylTTq4dPoYAKvY3qa7hRuoVqNjvh1hOF8vjrj_OKfPQguKm9VwyvylojAvHBYDU_yPUGh1qp9lDY_3nw/s1080/Cyber+Monday+Flash+Sales%2521.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1080" data-original-width="1080" height="412" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjdrdA_yVid-z_NwkbsBBeFNXoVTTg0PYySW4SLbd52i5cVfFOsL6N6j3VwwylTTq4dPoYAKvY3qa7hRuoVqNjvh1hOF8vjrj_OKfPQguKm9VwyvylojAvHBYDU_yPUGh1qp9lDY_3nw/w412-h412/Cyber+Monday+Flash+Sales%2521.png" width="412" /> </a></div><div class="separator" style="clear: both; text-align: center;"> </div><div class="separator" style="clear: both; text-align: left;"><h3 id="t-1595653619664"><b>Getresponse Email Marketing Tool</b></h3><p id="t-1595653619664" style="text-align: left;"><a href="bit.ly/2Uip9sv"><b>GetResponse</b></a> makes it a breeze to build emails. It's all drag and drop, which means thatyou don't need any coding skills or experience.It's basically made for ordinary people,like you and me to use. </p><p id="t-1595653619664" style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvZQX_KdeS7xUN06CLjd0VEylUKCoZIowFQWmdSVmOXx0R5-nDuBohvpBDvbXhHjgBelsTrSGtqWL38QiKWSISpJ6ajMZ2raS64uodA_6FO4Jio2Mgm77YP8V96r_yWvCBXYT6lQQnHg/s768/Email-Newsletter-BETA-768x358.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="358" data-original-width="768" height="248" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvZQX_KdeS7xUN06CLjd0VEylUKCoZIowFQWmdSVmOXx0R5-nDuBohvpBDvbXhHjgBelsTrSGtqWL38QiKWSISpJ6ajMZ2raS64uodA_6FO4Jio2Mgm77YP8V96r_yWvCBXYT6lQQnHg/w533-h248/Email-Newsletter-BETA-768x358.jpg" width="533" /></a> <br /></p><p id="t-1595653619664" style="text-align: left;">You cannot change the email builder if youcreate your emails with the 'Create newsletter' button.</p><p id="t-1595653619664" style="text-align: left;"><br />Why is this an issue?<br /> </p><p id="t-1595653619664" style="text-align: left;">The email builder "Build Newsletter" is their older version, which is clunky, buggy, and has half of the functionality that you will need and use compared to the version of BETA.I know this because I myself made this mistake. </p><p id="t-1595653619664" style="text-align: left;">You have a wide variety of design choices once you're within the email builder, which are categorised for whatever you need. You can build your own email from a blank slate if you do not like or do not want to use any of those models. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiun1au7quSHCFEwPZVEponW-q4lNzptnbo5HSGaP5rX_pM1yLNxJ0OUzXGQhg2CwjNQa6R6AnNn6TVwYu-h5CbyPWSD7gjOxMoe-vW98LDTDSkpcwoCaVCkyRFKkLaUpc7jdB_MpXMlw/s768/getresponse+templates.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="328" data-original-width="768" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiun1au7quSHCFEwPZVEponW-q4lNzptnbo5HSGaP5rX_pM1yLNxJ0OUzXGQhg2CwjNQa6R6AnNn6TVwYu-h5CbyPWSD7gjOxMoe-vW98LDTDSkpcwoCaVCkyRFKkLaUpc7jdB_MpXMlw/w568-h243/getresponse+templates.jpg" width="568" /></a></div><p id="t-1595653619664" style="text-align: left;">You have a plethora of editing options from adding columns, a wide range of drag<br />and drop blocks, such as images, video, and custom HTML, once you've selected your template.</p><p id="t-1595653619664" style="text-align: left;">one's you start sending email to your subscriber's you can enable a function call getresponse autoresponder </p><h3 id="t-1595653619664" style="text-align: left;">What is getresponse autoresponder?</h3><p id="t-1595653619664" style="text-align: left;">Getresponse autoresponder is a function which enable you to give a quick reply to your subscriber if they have any queries.</p><h3 id="t-1595653619664" style="text-align: left;"><b>How to use getresponse autoresponder? </b></h3><p id="t-1595653619664" style="text-align: left;">here is a quick video which will guide you about getresponse autoresponder</p><p id="t-1595653619664" style="text-align: center;"><b><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/e4G2US_94c0" width="560"></iframe> </b></p><p id="t-1595653619664" style="text-align: left;"><b> Now let's discuss about Aweber Email Marketing tool</b></p><p id="t-1595653619664" style="text-align: left;">The email builder for Aweber is very close to the email builder for <a href="https://www.getresponse.com/?a=MqXYFenMR9" target="_blank"><b>Getresponse</b></a>.For each template, you have a large arrayof models to choose from with different colours.<br />Getting started couldn't be simpler either.Simply find the drop-down menu for messages and click on 'email template manager.' From there you can launch a new template email with a single click. <b></b><br /></p><div class="separator" style="clear: both; text-align: left;"> <br /></div><p id="t-1595653619664" style="text-align: left;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtXPuAqenYE-Jc896d11EBpiqKxO1LnRyT1gj1JIJtuokHD-rScl-sqzSm8J_6R7BSBkzcXdbl5hIddgDN0RuR8LH4jlLXY1GUUyyDQk_RZ9bOC_qVnUOtVNIhE9-CFiyt8wO2GSHeag/s768/Aweber-Email-Newsletter-Tempaltes-768x355.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="355" data-original-width="768" height="251" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtXPuAqenYE-Jc896d11EBpiqKxO1LnRyT1gj1JIJtuokHD-rScl-sqzSm8J_6R7BSBkzcXdbl5hIddgDN0RuR8LH4jlLXY1GUUyyDQk_RZ9bOC_qVnUOtVNIhE9-CFiyt8wO2GSHeag/w542-h251/Aweber-Email-Newsletter-Tempaltes-768x355.jpg" width="542" /> </a></div><div class="separator" style="clear: both; text-align: center;"> </div><div class="separator" style="clear: both; text-align: left;">once's you are logged you have all the same function's which Getreponse have but i prefer using <a href="https://www.getresponse.com/?a=MqXYFenMR9"><b>Getresponse</b></a> rather then aweber because getreponse have autoresponder feature</div><div class="separator" style="clear: both; text-align: left;"><h3><br /></h3></div><div class="separator" style="clear: both; text-align: left;"><h3>Now come to next tool which is Mailchimp Email Marketing Tool?</h3><p style="text-align: left;">Since up to 2000 subscribers at Mailchimp are fully free, you can understand why you don't get access to anything. You will only be able to pick from the first two on the left when it comes to email templates. The other three are only usable if your package is updated. </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg159czR9gm8Ow5trxOLuE8EVjr-_ZDningoSYXwMoF5mdPCWvFOvYdN5e8uxBf3hKnB83ze5XcCcD8TP6beXI-v1fCk5vV0E8EvIDTLs7tryquPnpBrTFvvOrpe8WeYvzkP-nuA0APNQ/s768/Mailchimp-Email-Templates-768x359.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="359" data-original-width="768" height="247" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg159czR9gm8Ow5trxOLuE8EVjr-_ZDningoSYXwMoF5mdPCWvFOvYdN5e8uxBf3hKnB83ze5XcCcD8TP6beXI-v1fCk5vV0E8EvIDTLs7tryquPnpBrTFvvOrpe8WeYvzkP-nuA0APNQ/w528-h247/Mailchimp-Email-Templates-768x359.jpg" width="528" /> </a></div><div class="separator" style="clear: both; text-align: center;"> </div><div class="separator" style="clear: both; text-align: left;">Now, Mailchimp's models are not like the ones on Getresponse and Aweber. They are rather simplistic and will take a lot of inventive work to spice up. </div><div class="separator" style="clear: both; text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: left;">in my opinion <b>GetResponse</b> is a winner of today article</div><div class="separator" style="clear: both; text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: left;">So What are you waiting for go for <b>getresponse</b> and also win <b>40+ way's to create a email list</b></div><div class="separator" style="clear: both; text-align: left;"><b> </b></div><div class="separator" style="clear: both; text-align: left;"><b> </b><br /></div></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; text-align: left;"><div style="text-align: center;"><form action="https://bit.ly/2Uip9sv" method="get">
<a href="bit.ly/2Uip9sv"><input id="frm1_submit" name="Submit" type="submit" value="GetResponse Free Trial" /></a>
</form></div>
<br /></div><div class="separator" style="clear: both; text-align: left;"><p style="text-align: left;"><br /></p></div><br /><b></b><p></p></div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-2251688473673321602020-07-06T12:40:00.006-07:002020-11-11T23:21:37.491-08:00Account Takeover Poc<div style="text-align: center;"><font size="6"><b>Account Takeover Poc</b></font></div><div style="text-align: center;"><font size="6"><b><br /></b></font></div><div style="text-align: left;"><br /><div style="text-align: left;">
Hi,This is <span style="color: black;"><a href="https://www.facebook.com/mubassir.py" target="_blank">Mubassir Kamdar</a></span>
how are you all hope doing great work and making good money.So
today i will discuss on my last month finding in which I was able to takeover any account on private program</div><div style="text-align: left;"><br /></div><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj83X6jZQUsKSdNr8-KCxs1UKhMrU2TuBeh8SysXNYYo7oeX2eHvuziiNvs5aJIX5RfF8ckiGx_k6cO7-PkTglIIOBCQl4nXqROhQ5hzKRYhMQdDEEl0FJTm2eYIwgBrUno-MDDs_WI8w/s800/Account-Takeover.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="514" data-original-width="800" height="322" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj83X6jZQUsKSdNr8-KCxs1UKhMrU2TuBeh8SysXNYYo7oeX2eHvuziiNvs5aJIX5RfF8ckiGx_k6cO7-PkTglIIOBCQl4nXqROhQ5hzKRYhMQdDEEl0FJTm2eYIwgBrUno-MDDs_WI8w/w500-h322/Account-Takeover.jpg" width="500" /></a></div><br /><a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEhghQKidCfraIe7B6me4BPs8r7xy7jB3IbF5FABtOosxSylB0Vy_6-vlgl0YB8q2fLDZOwnxBf7TNu5QWxmZqUXzU17vkFXbeT5azSy-SVjKXyewvTuVSrDFtmsBv1Y1Cq91gGj8v-shqS2sFfr7nCiRKzv7WQi02Oshw=s478" style="margin-left: 1em; margin-right: 1em;"><br /></a></div><div style="text-align: left;"><br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;">So I started my hunt by doing subdomain enumeration for doing subdomain enumeration I go with tools like aqautone , sublister and knockpy ... so after finding some subdomains of target web let's check the for the vulnerability name Subdomain Takeover but un luckily i did't find any</div><div style="text-align: left;"><br /></div><div style="text-align: left;">now i came to main target.com and try to enumerate all functions by going to target.com help center which is help.target.com and wrote down all functions in my dairy .. after reading and understanding all functionality of target.com let's just simply create an account ...</div><div style="text-align: left;"><br /></div><div style="text-align: left;">then i check all the functions for CSRF And IDOR vulnerability but did't get any success</div><div style="text-align: left;"><br /></div><div style="text-align: left;">now after some disappointment i simply go to logout and logout my account on target.com <br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;">after taking some break i again open my laptop but this time i forgot my <b>account password </b>now i simply come to reset password option and put my email there and intercept the request using proxy tool <br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;">the request was like this : <a href="https://target.com/identity/v2/auth/password?api=somesortofkey&resetPasswordUrl=http://target.com">https://target.com/identity/v2/auth/password?api=somesortofkey&resetPasswordUrl=http://target.com</a></div><div style="text-align: left;"><br /></div><div style="text-align: left;">I try Host Header injection and X-Forwarded-Host: header in it but unluckily i did't receive a reset password token with my malicious host</div><div style="text-align: left;"><br /></div><div style="text-align: left;">if you check the link which i showed you above you can see that there is a suspicious looking parameter name resetPasswordUrl=http://target.com i just change resetPasswordUrl=http://target.com to resetPasswordUrl=http://www.mubassirkamdar.com/</div><div style="text-align: left;"><br /></div><div style="text-align: left;">and forward the request <br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;">when i saw my email , I saw that http://www.mubassirkamdar.com/ was replaced with http://target.com and the token was like http://www.mubassirkamdar.com/auth/password/new?token=xyzxyzxyzxyz</div><div style="text-align: left;"><br /></div><div style="text-align: left;">Reported the issue</div><div style="text-align: left;"><br /></div><div style="text-align: left;">reply : we are looking into it</div><div style="text-align: left;"><br /></div><div style="text-align: left;">Bounty: still waiting for it hope it will be a good $$$$<br /></div><div style="text-align: left;"><a href="https://target.com/identity/v2/auth/password?api=somesortofkey&resetPasswordUrl=http://target.com"><br /></a></div>
</div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com2tag:blogger.com,1999:blog-4999009455284363292.post-19754828920407521442019-06-01T18:37:00.003-07:002020-11-14T14:59:21.963-08:00Expose all registerd user email address of private program<h2 style="text-align: center;">
Expose all registerd user email address of private program</h2>
<h2 style="text-align: center;">
</h2>
<div style="text-align: left;">
Hi,This is <a href="https://www.facebook.com/mubassir.py" target="_blank">Mubassir Kamdar</a> how are you all doing hope doing great work and making good money.So today i will discuss on my last month finding in which I was able to expose millions of users emails of private program</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRqf4hRgNLyf2pmJwDLrDbQrksyOy7AHZYMqy_VDo0iPn1VK2grrmfT444Ynb_DRHmSaZMi8EsxoHpQtO1NDsutoQ_Y8JVDknvKPyzbxcXLPhnke5S5lqkLn018ECyvEnY6w6g9Z4CDA/s1600/84505337_thumbnail-960x672.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="672" data-original-width="960" height="448" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRqf4hRgNLyf2pmJwDLrDbQrksyOy7AHZYMqy_VDo0iPn1VK2grrmfT444Ynb_DRHmSaZMi8EsxoHpQtO1NDsutoQ_Y8JVDknvKPyzbxcXLPhnke5S5lqkLn018ECyvEnY6w6g9Z4CDA/s640/84505337_thumbnail-960x672.jpg" width="640" /></a></div>
<div style="text-align: left;">
<br /></div>
<h3 style="text-align: left;">
Let's Talk About What Private Program Do:</h3>
<div style="text-align: center;">
"This website is basically for managment of some kind of payment's :) "</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
So by using google dorks i am trying to find some payment gateways website and luckily i got one so i messaged to Website support and ask them if they have bounty program and my next luck is they have private bug bounty program.I started my hunt by doing recon</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
For recon i use <a href="https://github.com/haroonawanofficial/reconcobra" target="_blank">reconcobra</a></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: center;">
"Reconcobra is Foot printing software for Ultimate Information Gathering"</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: left;">
Reconcobra is coded by MR . <a href="https://www.facebook.com/haroon.awan.01" target="_blank">Haroon Awan</a> in collaboration with <a href="https://www.facebook.com/Mubassir.World/" target="_blank">Mubassir Kamdar</a> </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
So i started my recon using recon cobra and try to find out all subdomains after finding all subdomains i try to find out that any of subdomain is possible to take over but this time my luck was not working and i disappointed after this I go for Bike ridding and after 1 hour i came to home and check all subdomain list again and I find api,web.com </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
So i try to test api.web.com and created account on web.com and test all api endpoint but i found nothing intrasting rather then xss on invite friend option and this help's me to motivate for testing more bugs then i come to option invite friend again and this time when i am entering my friend name like "Mub" and it show all account which name start from "Mub" i saw that web give me 3 accounts intercept traffic using proxy tool and check the request i found in reponse this expose all user email address </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Vulnerable parameter : web.com/api/v0.2/user_search/?term=aaa</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Reported</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
reply : Nice Catch </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Bounty: For Digit Dollars $$$$</div>
<div style="text-align: left;">
</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<br /></div>
<h3 style="text-align: left;">
</h3>
<div style="text-align: left;">
<br /></div>
Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-13033799133061811852019-04-06T12:36:00.001-07:002020-11-14T15:00:09.000-08:00Run Commands On Company Machines (CSV Injection)<h2 style="text-align: center;">
Run Commands On Company Machines (CSV Injection)</h2>
<h2 style="text-align: center;">
</h2>
<div style="text-align: left;">
One of the more challenging tasks in web app pentesting is approaching an application that has limited interaction. It’s very easy to give up after trying every common method to exploit something, but putting in the time to understand an application is often rewarding and beneficial to ones personal growth as a hacker.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi15X-T24bSb_LKTfj_j7ISANvrOJjzsNqVTpqCRS0hcS1EqOs_sce74e-T7ZLX6sh0C-sXTufRYYN_E7hRXv8yGFSpI_JF0Fx9PhrlSsVxmuXyfc08dPTwqlps9mccjKDxIyp1dS_yYA/s1600/axx.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="721" data-original-width="1080" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi15X-T24bSb_LKTfj_j7ISANvrOJjzsNqVTpqCRS0hcS1EqOs_sce74e-T7ZLX6sh0C-sXTufRYYN_E7hRXv8yGFSpI_JF0Fx9PhrlSsVxmuXyfc08dPTwqlps9mccjKDxIyp1dS_yYA/s1600/axx.png" /></a></div>
</div>
<div style="text-align: left;">
<br /></div>
<h3>
Introduction:</h3>
Let's follow a privacy of web and name a web redacted.com so after my recon I started to hunt web first i check subdomains for Subdomain takeover bug but i did't find any so i created an account on this web and check for low hanging fruits like session issues ,xss , csrf bypass and many other but i did't find any of this bug because of law interaction i have less hope to give it a try more but then i go to redacted.com/signup and create my account on this web and check all functions i found that if I attempt a fail login of my account then user agent and ip goes to my account activity log and admin has option to download this log file in csv format..So some thing clicks in my mind that if any how i was able to change user agent to my custom user agent i can send commands to admin panel and when admin download this log as csv my command was also download<br />
<br />
<h3>
Steps:</h3>
1) <a data-saferedirecturl="https://www.google.com/url?q=https://placemail-online.domo.com/auth/index?redirectUrl%3D%252F&source=gmail&ust=1554663167199000&usg=AFQjCNGMYKbGMAJf21X4uQ1SkAgU7YKzhw" href="https://redacted.com/login/index?redirectUrl=%2F" target="_blank">https://redacted.com/login/index?redirectUrl=%2F</a><br />
<br />
2) just type a company email whom Computer You want to hack<br />
<br />
3) and put random password<br />
<br />
4) intercept request <br />
<br />
5)
change user agent to any excel formula "=1+1" i am using this because i
am tester not attacker you can use "=cmd|' /C calc'!A0" this will<br />
<br />
open calculator on victum machine<br />
<br />
6) Forward the request<br />
<br />
7) if company owner check activity log and export activity log and download it<br />
<br />
8) excel formula run on Company owner computer and a calculator will run on victum machine<br />
<br />
<img border="0" data-original-height="289" data-original-width="320" height="360" src="https://media.giphy.com/media/I5xVnGJRHZZf2/giphy.gif" width="400" /> Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0tag:blogger.com,1999:blog-4999009455284363292.post-68971347027693589672017-09-03T17:42:00.003-07:002021-10-05T03:59:01.109-07:00How to root a android device easily using kingroot.net<h2 style="background-color: white; box-sizing: border-box; line-height: 28px; margin: 0px; padding: 0px; text-align: center; width: calc(100% - 36px);">
<span face=""montserrat" , sans-serif" style="color: #333333;"><span style="font-size: 21px; font-weight: normal;">How to root a android device easily using kingroot net</span></span></h2>
<div>
<span face=""montserrat" , sans-serif" style="color: #333333;"><span style="font-size: 21px; font-weight: normal;"><br /></span></span></div>
<div style="text-align: center;">
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXRMY7xIET8nHfIlSn3QqdrtRaKp_odN3HQztkV5MXV8VwduKx2pYGm3oHDgcVmom1lQ75kELUUmNLFWiiyT2pLZAAQrta1r8HNvzhiPxZKU7NNnPnCkdEGyihDfB4M_ATaPhpnqQ5w/" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="630" data-original-width="1184" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXRMY7xIET8nHfIlSn3QqdrtRaKp_odN3HQztkV5MXV8VwduKx2pYGm3oHDgcVmom1lQ75kELUUmNLFWiiyT2pLZAAQrta1r8HNvzhiPxZKU7NNnPnCkdEGyihDfB4M_ATaPhpnqQ5w/w559-h297/How+to+root+a+android+device+easily+using+kingroot.net.jpg" width="559" /></a></div><br /><br /></div><div style="text-align: center;">
<h3 style="text-align: start;">
<span face=""montserrat" , sans-serif" style="color: #333333;"><span style="font-size: 21px;">What is root?</span></span></h3>
</div>
<div>
Many of you must heard this word before,But the actual meaning of "Root" is to gain an admin or highest peak of authority in any device means full control on internal or built in apps which you can not delete or manage using without root</div><div><br /></div><div><p style="text-align: center;"></p></div>
<div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- SIDE -->
<ins class="adsbygoogle"
style="display:block"
data-ad-client="ca-pub-2996176749962436"
data-ad-slot="2037095113"
data-ad-format="auto"
data-full-width-responsive="true"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script></div>
<h3><br /></h3><h3>
How to root android device using kingroot.net?</h3>
<div>
<br /></div>
<div>
So here is the most awaiting part of an article that <b>How to root android device using kingroot.net </b></div>
<div>
<br /></div>
<div>
Before you root your android device, better do this things to keep it better.</div>
<div>
<br /></div>
<div>
1)Backup your android device</div>
<div>
2)atleast 70% of your mobile battery must charge<br />
<br /></div>
<div>
<br /></div>
<h4>
Root your android device using Kingroot</h4>
<div>
<br /></div>
<div>
1)Install kingroot from kingroot.net click <b><a href="https://kingroot.net/thank-you-for-downloading-kingroot-for-android/">Here</a></b> to download kingroot for android</div>
<div>
2)if you see "R<span face=""source sans pro" , sans-serif" style="background-color: white; color: #333333; font-size: 16px;">oot access is unavailable</span>" that means your device is not rooted </div>
<div>
3)after that click on START ROOT button but wait you must <b>connect to internet</b> for rooting your phone</div>
<div>
<br /></div>
<div style="text-align: center;">
<img alt="Kingroot start rooting" src="https://rahulmukati.com/wp-content/uploads/2017/09/kingroot-start-rooting-219x374.png" /></div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: left;">
4)After successful procedure you will see a big tick mark and a dialogue saying Root Successfully</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Now at the end your device is rooted to check your device is correctly Rooted you can download an app from google play by typing a app name "root checker"<br />
<br />
Check More : <span style="color: #3d85c6;"><a href="https://joyofandroid.com/how-to-root-android/" target="_blank">https://joyofandroid.com/how-to-root-android/ </a></span></div>
<div>
<br /></div>
Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com47tag:blogger.com,1999:blog-4999009455284363292.post-3890006598524052182017-08-19T08:27:00.005-07:002021-10-05T04:03:14.290-07:00Who Am I? And What Is Ethical Hacking?<h2 style="height: 0px; text-align: center;">
Who Am I? And What Is Ethical Hacking?</h2>
<div>
<br /></div>
<div>
<br /></div>
<div style="text-align: center;">
<img height="250" src="http://cdn.whatismyipaddress.com/images-v4/hacking.png" width="400" /></div>
<div style="text-align: center;">
<br /></div>
<div>
<br /></div>
Mubassir Kamdar is an Ethical Hacker And Security Researcher from Karachi,Pakistan.<br />
With over years of experience in cyber security, Mubassir Kamdar identified major security flaws in world's well known companies. This includes Eset, Facebook, Uber, Sony and many others. A huge number of Halls of Fame and Certificates were rewarded as a token of appreciation from these companies.<br />
<br />
<h3>
<br />How To Become An Ethical Hacker On Your Own:-</h3>
First I want tell that before starting you carrier as Ethical Hacker you need to have some basic knowledge about programming there are some type's of Ethical Hackers<div><br /></div><div><script async="" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!--SIDE-->
<ins class="adsbygoogle" data-ad-client="ca-pub-2996176749962436" data-ad-format="auto" data-ad-slot="2037095113" data-full-width-responsive="true" style="display: block;"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script><br />
<br />
<br />
<b>1)<span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;">Script Kiddie</span></b><br />
<span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;"><b><br /></b></span>
<span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;">Script Kiddies normally don't care about hacking (if they did, they'd be Green Hats....</span><br />
<span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;"><br /></span>
<b><span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;">2)</span><span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;">White Hat</span></b><br />
<b><span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;"><br /></span></b>
<span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;">Also known as ethical hackers, White Hat hackers are the good guys of the hacker world.They hack to secure things and for profit also....</span><br />
<span face=""arial" , sans-serif" style="background-color: white; color: #222222; font-size: 16px;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://media.giphy.com/media/l0HlIvLpzz624GAUM/giphy.gif" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="600" height="300" src="https://media.giphy.com/media/l0HlIvLpzz624GAUM/giphy.gif" width="400" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<h3 style="background-color: white; box-sizing: border-box; color: #1d2129; direction: ltr; font-family: Georgia, serif; font-size: 36px; font-weight: normal; line-height: 38px; margin: 52px auto 28px; overflow-wrap: break-word; padding: 0px; white-space: pre-wrap; width: 700px; word-wrap: break-word;">
<span class="_4yxo" style="font-family: inherit; font-weight: bold;">Resources!</span></h3>
<div style="background-color: white; box-sizing: border-box; color: #1d2129; direction: ltr; font-family: Georgia, serif; font-size: 17px; margin: 0px auto 28px; overflow-wrap: break-word; white-space: pre-wrap; width: 700px; word-wrap: break-word;">
Basically I What I’m sharing here is a Collection of Different Blogs About Penetration testing & Reverse Engineering That I have Picked from Google and Now Wanna Share With you all.., Along with Some Blogs Links......</div>
<div style="background-color: white; box-sizing: border-box; color: #1d2129; direction: ltr; font-family: Georgia, serif; font-size: 17px; margin: 0px auto 28px; overflow-wrap: break-word; white-space: pre-wrap; width: 700px; word-wrap: break-word;">
<br /></div>
<div style="text-align: left;">
<span style="color: #1d2129; font-family: "georgia" , serif;"><span style="font-family: inherit; white-space: pre-wrap;">http://bugbountypoc.com/</span></span></div>
<div style="text-align: left;">
<span style="font-family: inherit;"><span style="color: #1d2129; font-family: "georgia" , serif;"><span style="font-size: 17px; white-space: pre-wrap;"><br /></span></span><span style="color: #1d2129; font-family: "georgia" , serif;"><span style="white-space: pre-wrap;">http://www.shawarkhan.com/</span></span></span></div>
<div style="text-align: left;">
<span style="font-family: inherit;"><span style="color: #1d2129; font-family: "georgia" , serif;"><span style="font-size: 17px; white-space: pre-wrap;"><br /></span></span><span style="color: #1d2129; font-family: "georgia" , serif;"><span style="white-space: pre-wrap;">https://ngailong.wordpress.com/</span></span></span></div>
<div style="text-align: left;">
<span style="color: #1d2129; font-family: "georgia" , serif;"><span style="font-size: 17px; white-space: pre-wrap;"><br /></span></span>https://hackernoon.com/</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
http://blog.pentestnepal.tech/</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
https://hackerone.com/hacktivity</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
http://danlec.com/blog</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
https://blog.detectify.com/</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
https://whitton.io/</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
https://respectxss.blogspot.com/</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
https://www.gracefulsecurity.com/</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
and many more</div>
<h3 style="text-align: left;">
<br />My Advice:</h3>
<div>
<br /></div>
<div>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"> I would like to tell all </span><span style="color: #1d2129; font-family: "georgia" , serif;"><span style="font-size: 17px; white-space: pre-wrap;">beginners to focus on </span></span><span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;">self study and learn things by themselves as everything is possible all you need is the passion of taking a step after that you can achieve anything. Nothing is impossible to achieve. </span></div>
<div>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span></div>
<div>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span></div>
<h3>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;">Note:</span></h3>
<h2>
Think out of boundary </h2>
<div>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span></div>
<div>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span></div>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span>
<span style="background-color: white; color: #1d2129; font-family: "georgia" , serif; font-size: 17px; white-space: pre-wrap;"><br /></span>
<br />
<div>
<br /></div>
<div>
<br /></div>
</div>Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com2tag:blogger.com,1999:blog-4999009455284363292.post-89180749239742729972017-08-15T17:29:00.004-07:002020-11-14T15:00:45.516-08:00Session Issue In Facebook 2016<h2 style="clear: both; text-align: center;">
Session Issue In Facebook</h2>
<div class="separator" style="clear: both; text-align: center;">
My name is <a href="https://www.facebook.com/mubassir.py">Mubassir Kamdar</a> this is my blog an I am here to explain how I found Session Issue in Facebook </div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF1gTlhW1lrBlCIkJnv0K_93Lx3lXvcRy8Upcdjh2vvyUPK8Xhu_n4OhVW5sBqcsCZ6ap-Zb6T_4EqhKMkGGF_Q-IS3Qw-mMCYfx1d24MEBD70TIsaNNlFDkCj3Vd2_uV7octkY1alULA/s1600/facebook-hacking.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="598" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhF1gTlhW1lrBlCIkJnv0K_93Lx3lXvcRy8Upcdjh2vvyUPK8Xhu_n4OhVW5sBqcsCZ6ap-Zb6T_4EqhKMkGGF_Q-IS3Qw-mMCYfx1d24MEBD70TIsaNNlFDkCj3Vd2_uV7octkY1alULA/s1600/facebook-hacking.png" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
So in 2016 I started Bug Hunting after that when I learn enough about Web Hacking and Security from <a href="https://www.owasp.org/index.php/Main_Page">OWASP</a> ,Now I want to test my skills and I select my target facbook.com to test a bugs for some fun and profit to.....</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://media.giphy.com/media/xTiTnqUxyWbsAXq7Ju/giphy.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="478" data-original-width="398" src="https://media.giphy.com/media/xTiTnqUxyWbsAXq7Ju/giphy.gif" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
I want to facebook and try some xss issues csrf and many other but i am unlucky to test my bug hunting skills and after wasting two or three hours <b>successfully.</b>I am feeling tired but I don't lost my <b>Hope. </b>and now I think I should try something different and suddenly a Session Issues come's in my mind now when I am playing with facebook login and logout buttons to find some interesting thing I found nothing and i was like</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://media.giphy.com/media/27npJ7KfvMsoM/giphy.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="287" data-original-width="497" src="https://media.giphy.com/media/27npJ7KfvMsoM/giphy.gif" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
Now on my account there is a Login Approval is on so no one can hack my account,I again want to check facebook now this time i login into my account and i saw a login approval page first i tried to brute force my login approval and i was failed then something caught my eyes I saw a logout button on the top right side I click on it and then i go to main page of facebook.com and then i press <b>back button </b>in browser and after that i shocked to see that i come to login approval page and here it ask me to put a code i put a code to test and my account is logged in i was like </div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://media.giphy.com/media/I5xVnGJRHZZf2/giphy.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="289" data-original-width="320" src="https://media.giphy.com/media/I5xVnGJRHZZf2/giphy.gif" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
Through this I found my first 2016 Hall Of Fame of facebook and this cause facebook to pay me 500$ bounty</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<h3 style="clear: both; text-align: left;">
Note: </h3>
<div style="clear: both; text-align: left;">
If you like my article share it with your friend and stay tuned to get more interesting poc</div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />Mubassirhttp://www.blogger.com/profile/15729367147866111717noreply@blogger.com0 Warning: fread(): SSL operation failed with code 1. OpenSSL Error messages:
error:0A000126:SSL routines::unexpected eof while reading in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 845