🔥 Burn Fat Fast. Discover How! 💪

𝐂𝐘𝐁𝐄𝐑 𝐢𝐧𝐯𝐞𝐬𝐭𝐢𝐠𝐚𝐭𝐨𝐫 𝟐.𝐎™

Logo of telegram channel cyber_investigator — 𝐂𝐘𝐁𝐄𝐑 𝐢𝐧𝐯𝐞𝐬𝐭𝐢𝐠𝐚𝐭𝐨𝐫 𝟐.𝐎™ 𝐂
Logo of telegram channel cyber_investigator — 𝐂𝐘𝐁𝐄𝐑 𝐢𝐧𝐯𝐞𝐬𝐭𝐢𝐠𝐚𝐭𝐨𝐫 𝟐.𝐎™
Channel address: @cyber_investigator
Categories: Cryptocurrencies
Language: English
Subscribers: 193

Ratings & Reviews

3.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

1

3 stars

0

2 stars

1

1 stars

0


The latest Messages 3

2021-09-05 07:36:28 HAPPY TEACHER'S DAY

We are grateful to you today and every day! Happy Teachers' Day!

Test CIDHUB09052021

Topic= Cryptography

1. What Is Rsa?

2. What Is The Secure Hash Algorithm (sha And Sha-1)?

3. What is the Public Key Infrastructure (PKI)?

4. What are the key differences between asymmetric and symmetric cryptography?

5. What is the name of the issuer of public key infrastructure certificates?

6. What is the inclusion of a secret message in otherwise unencrypted text or images called?

7. What is the name of the encryption/decryption key known only to the party or parties that exchange secret messages?

8. What is difference between DSA and RSA?

9. What is Shipjack?

10. Decrypt the following encrypted message .
Hint= Smallest to Largest

]LBzdtFj*N?Bi[YXh:.bCd<@oKg&,+UV&U~G/ptXp7__iOPUo<,*[#G9*IpwLU=q^yyupd,3u#gkYc6GcyU
Note= Don't submit answers anywhere , this test is just for practice .Match your answers
at 9 pm in @cidhub chatgroups .

Regards=@Its_me_kali
3 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 04:36
Open / Comment
2021-09-04 09:26:23 2021 - Learn Full Kotlin From Scratch Step By Step imk

Learn Kotlin from scratch! Grasp object-orientation and idiomatic Kotlin to realize coding projects and Android apps!

Link=https://drive.google.com/folderview?id=0By6kYdZ8joOUYnVNSktaVVRuYWc imk

Regards=@its_me_kali

The Complete 2021 Flutter Development Bootcamp with Dart

By the end of this course, you will be fluently programming in Dart and be ready to build your own Flutter apps and become a fully fledged Flutter developer.

Projects=https://play.google.com/store/apps/details?id=com.kottland.flutterprojectdirectory imk

Link=https://mega.nz/folder/Ko4y3Awa#5uJvCVjR5gAFXGCAYEr82g

Regards=@its_me_kali
13 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 06:26
Open / Comment
2021-09-03 08:56:10 𝐌𝐀𝐘𝐀 𝟑𝐃 𝟐𝟎𝟐𝟏 𝐂𝐎𝐔𝐑𝐒𝐄

𝐀𝐮𝐭𝐨𝐝𝐞𝐬𝐤 𝐌𝐚𝐲𝐚 𝟐𝟎𝟐𝟏 𝐢𝐬 𝐚 𝐟𝐮𝐥𝐥𝐲-𝐟𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐟𝐞𝐬𝐬𝐢𝐨𝐧𝐚𝐥 𝟑𝐃 𝐦𝐨𝐝𝐞𝐥𝐢𝐧𝐠, 𝐚𝐧𝐢𝐦𝐚𝐭𝐢𝐨𝐧, 𝐫𝐞𝐧𝐝𝐞𝐫𝐢𝐧𝐠 𝐚𝐧𝐝 𝐜𝐨𝐦𝐩𝐨𝐬𝐢𝐧𝐠 𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧 𝐭𝐡𝐚𝐭 𝐩𝐫𝐨𝐯𝐢𝐝𝐞𝐬 𝐚 𝐰𝐢𝐝𝐞 𝐯𝐚𝐫𝐢𝐞𝐭𝐲 𝐨𝐟 𝐟𝐞𝐚𝐭𝐮𝐫𝐞𝐬 𝐚𝐧𝐝 𝐝𝐲𝐧𝐚𝐦𝐢𝐜 𝐭𝐨𝐨𝐥𝐬 𝐭𝐨 𝐬𝐢𝐦𝐮𝐥𝐚𝐭𝐞 𝐟𝐥𝐮𝐢𝐝𝐬, 𝐜𝐥𝐨𝐭𝐡, 𝐩𝐚𝐫𝐭𝐢𝐜𝐥𝐞𝐬 𝐚𝐧𝐝 𝐡𝐚𝐢𝐫.

ꜱʏꜱᴛᴇᴍ ʀᴇQᴜɪʀᴇᴍᴇɴᴛꜱ ᴀɴᴅ ᴛᴇᴄʜɴɪᴄᴀʟ ᴅᴇᴛᴀɪʟꜱ

ꜱᴜᴘᴘᴏʀᴛᴇᴅ ᴏꜱ: ᴡɪɴᴅᴏᴡꜱ 7/8/8.1/10
ᴄᴘᴜ: 64-ʙɪᴛ ɪɴᴛᴇʟ ᴏʀ ᴀᴍᴅ ᴍᴜʟᴛɪ-ᴄᴏʀᴇ ᴘʀᴏᴄᴇꜱꜱᴏʀ
ᴍᴇᴍᴏʀʏ (ʀᴀᴍ): 8 ɢʙ ᴏꜰ ʀᴀᴍ (16 ɢʙ ʀᴇᴄᴏᴍᴍᴇɴᴅᴇᴅ)
ʜᴀʀᴅ ᴅɪꜱᴋ ꜱᴘᴀᴄᴇ: 4.5 ɢʙ

Course 2021
https://mega.nz/folder/6BBgAJyJ#nlVQ0M1Lskl0FWRiFaFG2w

𝑅𝑒𝑔𝒶𝓇𝒹𝓈=@its_me_kali
16 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 05:56
Open / Comment
2021-09-02 08:49:50 What if goverment bans VPNs ?

There's a more than 300 vpn apps in playstore with different names ,so its not easy to ban all . Another options are given below by its_me_kali

Can you get banned for using a VPN?

A select few countries ban or heavily restrict the use of VPNs, so check the rules for the specific country that you're in. Although the use of a VPN can hide unlawful activity, such as sharing copyrighted material, if you perform illegal activities online while using a VPN, you could still be charged for them.

Solutions

Method First by IMK
You can use proxy based search engines like given below

https://www.proxysite.com
https://hide.me/en/proxy
https://hide.me/en/proxy
http://kproxy.com
https://hidester.com/proxy/

Method Second For PC by IMK
You can use proxy and socks in your browser , there's a lot of sites provide free proxies you can search on google .

Method Third by IMK
You can use below browsers apps which having inbuilt vpn feature .

Opera
Tenta Private VPN Browser
Epic Privacy Browser
Cake Web Browser
AVG Browser
Brave

Method Fouth by IMK

You can use vpn extensions like astar vpn and other VPNs Extension Based browser for android .

Kiwi
YandeX Beta
Firefox Nightly

Method Fifth
You can use tor
Tor Browser
Tor Browser (Alpha)

Method Sixth
By making gmail of other countries without mobile number.And downloading VPNs through it .
Trick=https://t.me/l000century/41

Regards=@its_me_kali
24 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 05:49
Open / Comment
2021-09-01 10:11:28
LEAKING DEMO OF MY PAID BLACKHAT OSINT COURSE

All About Course
https://osint.tiiny.site

OSINT TOOLS
https://telegra.ph/Best-25-OSINT-Tools-09-22

DOXING GUIDE
https://telegra.ph/ALL-ABOUT-DOXING-11-19

IP HUNTING https://telegra.ph/IP-HUNTING-TRICKS-11-24

INTELLIGENCE
https://telegra.ph/Intelligence-And-Its-Types-By-IMK-08-25

REGARDS=ITS_ME_KALI
33 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 07:11
Open / Comment
2021-08-31 12:33:19 Cryptography Course

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.

Cryptography can be broken down into three different types:

Secret Key Cryptography.

Public Key Cryptography.

Hash Functions.

Cryptography-Test
https://imk.tiiny.site


Tools

https://play.google.com/store/apps/details?id=com.nitramite.cryptography
https://www.101computing.net/enigma-machine-emulator/
https://www.dcode.fr/all-tools
https://cryptii.com
https://www.online-toolz.com/tools/text-encryption-decryption.php

Pass=@its_me_kali
37 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 09:33
Open / Comment
2021-08-30 08:50:18 HAPPY JANMASHTAMI 2021

PROGRAMMING पुराण (Videos)

GOlang
Ruby
Python
Php
MySql
Aiml
C++
C#
CSS
Django
Elm
Java
Jenkins
Jquery
Matlab
Kotlin
MongoDb
Perl
Rpython
Scala
Swift
Sql
Shell
Git

https://mega.nz/folder/3hh22RpI

Key=@kalingraajworld

App For practice coding in android
https://play.google.com/store/apps/details?id=com.paprbit.dcoder

Regards=@its_me_kali
41 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 05:50
Open / Comment
2021-08-29 06:45:46 2021 WEB-H4CKING GUIDE

Top techniques which hackers use for web hacking :

SQL Injection attacks
Cross Site Scripting (XSS)
Denial of Service (DoS/DDoS)
Cross-site request forgery (CSRF or XSRF)
DNS Spoofing (DNS cache poisoning)
Social engineering techniques
By Itsmekali
Phishing
Baiting
Pretexting
Dorking


https://mega.nz/folder/5OxWGCQS#q7R_62r30NZI_aavJoeplQ

https://drive.google.com/folderview?id=10NQBRdP3ddUWUlK4zY6ZdrZWZiLkuKe-

Regards=@its_me_kali
41 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 03:45
Open / Comment
2021-08-28 12:20:48 ALL ABOUT PORTS 2021

https://telegra.ph/Port-Forwarding-without-router-01-30


WHAT IS PORT ?


We can say that A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.
A port number uniquely identifies a network-based application on a computer.A port number is the logical address of each application or process that uses a network or the Internet to communicate. In a server, more than one user process can use TCP at the same time. To identify the data associated with each process, port numbers are used. Port numbers are 16-bit, and numbers up to 65535 are possible.

Here are some Important port number for you :

 

20:                              File Transfer Protocol (FTP) Data Transfer

21:                              File Transfer Protocol (FTP) Command Control

22:                              Secure Shell (SSH) Secure Login

23:                              Telnet remote login service, unencrypted text messages

25:                              Simple Mail Transfer Protocol (SMTP) E-mail routing

53:                              Domain Name System (DNS) service

67and 68:                 Dynamic Host Configuration Protocol (DHCP) servers use UDP port 67 to listen for requests while DHCP clients communicate on UDP port 68.

69:                        TFTP(Trivial File Transfer Protocol) TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP

80:                              Hypertext Transfer Protocol (HTTP) used in the World Wide Web

88:                         The Xbox Live Internet gaming service uses several different port numbers including UDP port 88.

110:                            Post Office Protocol (POP3)

119:                            Network News Transfer Protocol (NNTP)

123:                            Network Time Protocol (NTP)

137/138/139              NetBIOS

143:                         Internet Message Access Protocol (IMAP) Management of digital mail

161and 162:              Simple Network Management Protocol (SNMP)

194:                           Internet Relay Chat (IRC)

389                            Lightweight Directory Access Protocol (LDAP)

443:                           HTTP Secure (HTTPS) HTTP over TLS/SSL

The registered ports are those from 1024 through 49151. IANA maintains the official list of well-known and registered ranges. The dynamic or private ports are those from 49152 through 65535. One common use for this range is for ephemeral ports.

REGARDS=@its_me_kali
41 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 09:20
Open / Comment
2021-08-27 10:13:39 OS DESIGNING GUIDE 2021

Following are some of important functions of an operating System.

Memory Management
Processor Management
Device Management
File Management
Security
Control over system performance
Job accounting
Error detecting aids
Coordination between other software and users

Article
https://telegra.ph/OS-DESIGNING-BY-KALINGRAAJ-02-17

Top Os

Kali Os
https://bit.ly/3gBqx54
Tail Os
https://bit.ly/38eUO4U
Cerebus Os
https://bit.ly/38ohIGV
Digi77 Os
https://bit.ly/3DoSkPS
Whonix
https://bit.ly/2WmYL5q
Ubuntu Os
https://bit.ly/3gEmZPr
TraceLab Os
https://bit.ly/3ygcB6k
Garuda Os
https://bit.ly/3mDrNIK
Qube Os
https://bit.ly/3sOILVv
Other Os
https://bit.ly/3BgBmkF
https://bit.ly/2XWD3Fz

Regards=@ITS_ME_KALI
42 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 07:13
Open / Comment