InstaBrute - Instagram bruteforce exploit module.

a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.

Nimechukua tu hicho kipengele. Unakataaje skills zingine wakati hicho kipengele kinachoongelea maana ya hacker kinataja technical knowledge?
Halafu mbona unamsemea na kumtetea sana badala ya kumwacha mwenyewe aseme au ndio mambo ya multiple accounts? Honestly ninachokiona ni arrogance kwenye majibu yako. Jaribu kujibu basi kama expert ambaye unataka kujionesha kuwa ni mmojawapo.

Brute force attack ni shambulio la kuwapata wazembe. Itafanya kazi pale tu kukiwa kuna broken Locking Mechanism. Ukizidisha Quota tuna block account na kumtumia ujumbe owner. Same IP ikiwa inajaribu multiple account tuna i black-list, game over. Ukiwa stubborn, tuna trace IP yako na kukupeleka mbele ya mkono wa sheria. It works that simple!

Mtu anayetaka kutumia brute force attack anapaswa ku fly low na asigundulik jambo litakalochukua muda mrefu ku hack account na unaweza kuta upgrades zilishafanyika ambapo inabidi uanze upya tena. Kiufupi BF attack is reserved for foolish site or exploitation of bugs that break locking mechanism kama ilivyokuwa kwa Insta (soma hapa)
 
By the way watu huwa mnaikuza sana Kali Linux kana kwamba ni dude la ajabu sana. Kali Linux ni distribution tu ya Debian kama Ubuntu et al. Tofauti yake iko outlined kwenye Kali Website na kwa mtaalamu wa Linux unajua hakuna kitu speacial:
  1. Single user, root access by design: Due to the nature of security audits, Kali Linux is designed to be used in a “single, root user” scenario. Many of the tools used in penetration testing require escalated privileges, and while it’s generally sound policy to only enable root privileges when necessary, in the use cases that Kali Linux is aimed at, this approach would be a burden.
My Comment: unaweza kufanya hii kirahisi kwenye Debian au ukaamua kutumia sudo kila wakati ukihitaji elevation. Na single user si unaondoa users wengine na groups ambazo huhitaji.
  1. Network services disabled by default: Kali Linux contains systemd hooks that disable network services by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blacklisted by default.
My Comment: Unaweza kuzi disable pia na ku enable ukitakak
  1. Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless injection.
My Comment: Hili pia kwa anayejua unaweza kufanya. Just download the same place where Kali gets their patched Kernel...done!
  1. A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted to add additional repositories to their sources.list, but doing so runs a very serious risk of breaking your Kali Linux installation.
My Comment: Unaweze ku edit sources kama unavyopenda.

So kiukweli Kali is nothing but custom version of Debian na software zote hizo zinaweza ku run kwenye Debian, Ubuntu, Mint na derivatives zote za Debian. So huwa nawashangaa mnaofanya Kali Linux a big deal...It is not!

Halafu mbona unamsemea na kumtetea sana badala ya kumwacha mwenyewe aseme au ndio mambo ya multiple accounts? Honestly ninachokiona ni arrogance kwenye majibu yako. Jaribu kujibu basi kama expert ambaye unataka kujionesha kuwa ni mmojawapo.

Brute force attack ni shambulio la kuwapata wazembe. Itafanya kazi pale tu kukiwa kuna broken Locking Mechanism. Ukizidisha Quota tuna block account na kumtumia ujumbe owner. Same IP ikiwa inajaribu multiple account tuna i black-list, game over. Ukiwa stubborn, tuna trace IP yako na kukupeleka mbele ya mkono wa sheria. It works that simple!

Mtu anayetaka kutumia brute force attack anapaswa ku fly low na asigundulik jambo litakalochukua muda mrefu ku hack account na unaweza kuta upgrades zilishafanyika ambapo inabidi uanze upya tena. Kiufupi BF attack is reserved for foolish site or exploitation of bugs that break locking mechanism kama ilivyokuwa kwa Insta (soma hapa)

Na wewe sasa unamsemea nani? Nani amekuambia mimi ni expert? Niwe na multiple IDs JF ili inisaidie nini? Wewe najua kuandika na kuongea kwa mdomo unaweza sana na kila kitu kwako ni rahisi, always huwa unajiweka hivyo. Unachojua wewe kubruteforce ni pale unapotaka kuingia kwenye account ya mtu, vipi kuhusu kubruteforce file, mfano la passwords ulilolipata kwa njia nyingine?

Na wewe unaamini kucrack passwords za social media, kama unatumia brute force, ni swala la kubruteforce tu bila kutumia akili nyingine?
 
By the way watu huwa mnaikuza sana Kali Linux kana kwamba ni dude la ajabu sana. Kali Linux ni distribution tu ya Debian kama Ubuntu et al. Tofauti yake iko outlined kwenye Kali Website na kwa mtaalamu wa Linux unajua hakuna kitu speacial:
  1. Single user, root access by design: Due to the nature of security audits, Kali Linux is designed to be used in a “single, root user” scenario. Many of the tools used in penetration testing require escalated privileges, and while it’s generally sound policy to only enable root privileges when necessary, in the use cases that Kali Linux is aimed at, this approach would be a burden.
My Comment: unaweza kufanya hii kirahisi kwenye Debian au ukaamua kutumia sudo kila wakati ukihitaji elevation. Na single user si unaondoa users wengine na groups ambazo huhitaji.
  1. Network services disabled by default: Kali Linux contains systemd hooks that disable network services by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blacklisted by default.
My Comment: Unaweza kuzi disable pia na ku enable ukitakak
  1. Custom Linux kernel: Kali Linux uses an upstream kernel, patched for wireless injection.
My Comment: Hili pia kwa anayejua unaweza kufanya. Just download the same place where Kali gets their patched Kernel...done!
  1. A minimal and trusted set of repositories: given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is kept to an absolute minimum. Many new Kali users are tempted to add additional repositories to their sources.list, but doing so runs a very serious risk of breaking your Kali Linux installation.
My Comment: Unaweze ku edit sources kama unavyopenda.

So kiukweli Kali is nothing but custom version of Debian na software zote hizo zinaweza ku run kwenye Debian, Ubuntu, Mint na derivatives zote za Debian. So huwa nawashangaa mnaofanya Kali Linux a big deal...It is not!

Hiyo Kali Linux na distros zingine ulizozitja ni nothing kivipi? Ni za kijinga au unamaanisha nini? Architectures zake so simple, za kizembe?

Unazielewa hizo distros in and out mpaka ukaja na conclusion yako hiyo au tuchukulie tu kuwa ni kama ilivyo kawaida yako?

Unamaansha nini big deal? Na nani aliyefanya Kali Linux big deal?

Mara zote napingana na hoja zenu, sio idea.
 
Na wewe sasa unamsemea nani? Nani amekuambia mimi ni expert?
Kama sio expert basi uwe unaandika comment kama NewBee. Maana unaandika na kukosoa kama expert na kumbe siyo. Hii KaLi!

Niwe na multiple IDs JF ili inisaidie nini?
Aisee!

Wewe najua kuandika na kuongea kwa mdomo unaweza sana na kila kitu kwako ni rahisi, always huwa unajiweka hivyo.
Sasa kama ni rahisi nidanganye? Uzuri huwa naweka na sababu na hata hapo juu nimefanya hivyo. Linux na Mac ndio default OS zangu na nimezitumia kwa miaka mingi tangu chuoni mpaka leo. Bado unataka nidanganye ni kigumu?

Eti kuongea kwa mdomo sana. Usilolijua kweli ni sawa na usiku wa giza!

Unachojua wewe kubruteforce ni pale unapotaka kuingia kwenye account ya mtu, vipi kuhusu kubruteforce file, mfano la passwords ulilolipata kwa njia nyingine?
Kweli wewe mgeni kwenye haya mambo. Hapa mada ni social media au general security? Inaongelewa InstaBrute na specifically ina target specific social media namely instagram. Sasa ulitaka niongelee brute force kwenye hayo madudu mengine kwa sababu ipi?

Professional always keeps things to the topic. Learn to be like Bro!

Na wewe unaamini kucrack passwords za social media, kama unatumia brute force, ni swala la kubruteforce tu bila kutumia akili nyingine?
Sasa mbona hiyo akili nyingine haijatajwa kwenye post wala hujaisema? Hapa tunajadili alichosema mtoa mada na comment ulizoandika hapa. Hatujadili unachowaza kichwani kwako.

Jifunze kujadili mada iliyo mezani kwa weledi badala ya kupiga abra-kadabra na blah blah!
 
Hiyo Kali Linux na distros zingine ulizozitja ni nothing kivipi? Ni za kijinga au unamaanisha nini? Architectures zake so simple, za kizembe?

Unazielewa hizo distros in and out mpaka ukaja na conclusion yako hiyo au tuchukulie tu kuwa ni kama ilivyo kawaida yako?

Unamaansha nini big deal? Na nani aliyefanya Kali Linux big deal?

Mara zote napingana na hoja zenu, sio idea.
Aliyekuelewa atanielewesha ili niijibu hii comment yako.
Cool down edit your stuffs to something intelligible.
 
Kama sio expert basi uwe unaandika comment kama NewBee. Maana unaandika na kukosoa kama expert na kumbe siyo. Hii KaLi!


Aisee!


Sasa kama ni rahisi nidanganye? Uzuri huwa naweka na sababu na hata hapo juu nimefanya hivyo. Linux na Mac ndio default OS zangu na nimezitumia kwa miaka mingi tangu chuoni mpaka leo. Bado unataka nidanganye ni kigumu?

Eti kuongea kwa mdomo sana. Usilolijua kweli ni sawa na usiku wa giza!


Kweli wewe mgeni kwenye haya mambo. Hapa mada ni social media au general security? Inaongelewa InstaBrute na specifically ina target specific social media namely instagram. Sasa ulitaka niongelee brute force kwenye hayo madudu mengine kwa sababu ipi?

Professional always keeps things to the topic. Learn to be like Bro!


Sasa mbona hiyo akili nyingine haijatajwa kwenye post wala hujaisema? Hapa tunajadili alichosema mtoa mada na comment ulizoandika hapa. Hatujadili unachowaza kichwani kwako.

Jifunze kujadili mada iliyo mezani kwa weledi badala ya kupiga abra-kadabra na blah blah!

Wewe ndio huelewi umevamia. Mjadala ulishatoka kwenye instabruteforce ukahamia kwenye Brute Force algorithm kwa sababu kuna watu (fuatilia uzi) waliosema kamwe Brute Force kwa sasa haifanyi kazi. Tumekuwa tukibishana kuhusiana na general Brute Force approach/algorithm.

Unasema Hizo distros ni rahisi just kwa kuzitumia tu? Sijakuuliza matumizi. Una software ya maana uliyotengeneza kwa ajili ya distro yoyote ya Linux? Au ukiambiwa you can edit sources lists ndio unakuwa unaifahamu system na inakuwa rahisi kwako? Au just unafahamu system kwa sababu unaweza kutumia command line kuinstall packages? Does all these mean you know it?

Kweli mimi ni mgeni, ndio maana nataka wewe expert unieleweshe, kwani kuna tatizo?

Wewe ni Linux distros expert au security expert?
 
Kweli mimi ni mgeni, ndio maana nataka wewe expert unieleweshe, kwani kuna tatizo?

Wewe ni Linux distros expert au security expert?
Sijaona unachotaka kueleweshwa zaidi ya arrogance ya much know. Kila ukijibiwa hili unahamisha magoli. Sijaona comment ambayo hakuna mdau hajajibu. Kama ipo iweke.

Weledi huwa sio watu wa ligi na kukaza misuli ya shingo bali huwa wanajadili kwa mantiki na kwa taarifa. Sasa kipi katika majibu yangu hujakielewa mpaka sasa?

Umetishia watu na Kali Linux nimekwambia Kali haina lolote special. Hata Mbongo yeyote anayejua Linux vizuri anaweza kutengeneza distro yake sawa kabisa na Kali na kuwa yote Kali inafanya unaweza kufanya configuration kwenye ubuntu au Mint na ikafanya kazi sawa kabisa.

Nikamalizia kuwa brute-force attack kwenye networks ni mchezo wa kitoto na ukiucheza kikubwa haufanyiki. Nikaweka sababu. Sasa kipi kigumu kueleweka hapo kama lengo ni kuelewa?

Kama unataka ligi tufanye umeshinda. Kuna jingine?
 
Sijaona unachotaka kueleweshwa zaidi ya arrogance ya much know. Kila ukijibiwa hili unahamisha magoli. Sijaona comment ambayo hakuna mdau hajajibu. Kama ipo iweke.

Weledi huwa sio watu wa ligi na kukaza misuli ya shingo bali huwa wanajadili kwa mantiki na kwa taarifa. Sasa kipi katika majibu yangu hujakielewa mpaka sasa?

Umetishia watu na Kali Linux nimekwambia Kali haina lolote special. Hata Mbongo yeyote anayejua Linux vizuri anaweza kutengeneza distro yake sawa kabisa na Kali na kuwa yote Kali inafanya unaweza kufanya configuration kwenye ubuntu au Mint na ikafanya kazi sawa kabisa.

Nikamalizia kuwa brute-force attack kwenye networks ni mchezo wa kitoto na ukiucheza kikubwa haufanyiki. Nikaweka sababu. Sasa kipi kigumu kueleweka hapo kama lengo ni kuelewa?

Kama unataka ligi tufanye umeshinda. Kuna jingine?

Ni wapi nimetishia watu na Kali Linux? Nitajie mbongo mmoja aliyetengeneza os yake kama derivative ya Linux-based distro yoyote, maana inaonekana ni rahisi kwa mjibu wako. Labda wewe, tupe link ya repository tudownload.

Wewe si ulisema unaijua Kali Linux, na variants zingine za Linux, na umetaka niandike kama expert, lakini mimi sio expert, nikakuuliza una software yoyote ambayo inaweza kuwa installed kwenye Linux-based distro yoyote na ikafanya kazi ya maana mpaka watu waka appreciate? Nimekuuliza pia wewe ni security expert au umeongea tu?

Tuambie kitu intelligible ulichofanya kwa ajili ya Linux distros, labda contritbution, kutengeneza software fulani, etc. Una distro yako?

Kwani haya ya kusema unajua na expertism nimeleta mimi au wewe? Au ulikuwa unatishia tu?

Umekuwa expert just kwa kukutumia system?

Kuhusu bruteforce, nimeuliza vipi kubruteforce file la password ambalo limepatikana kwa njia nyingine, pia haifanyi kazi? Kwa sababu hoja ambazo zimekuwa zikijadiliwa kwenye mjadala sio instabruteforce tu bali bruteforce kwa ujumla pia.

Halafu akili yako inakuambia kuwa ni possible kubruteforce logins za social network kama Instagram bila kushirikisha skills zingine wakati unajua tu baada ya login attempts kadhaa account itafungwa?
 
Kila mtu anayeleta ubishi na kuleta hoja yake against hii thread, kwanza ningependa kuwapa tu taarifa kwamba hakuna system ambayo ni 100% secured, hivo basi usiione instagram pale ukadhani ni perfectly secured!

Pili, kwa swala la mimi kusema kwamba hiyo Instagram inaweza kuwa hacked tu kwa kupitia bruteforce, ni hoja ya uongo na mimi siku-declare hivo katika hii thread yangu. Na hivo ninawasi wasi na mtu aliyekuja juu na hoja hiyo ya kipuuzi na mbaya zaidi ninawasi wasi naye kama anailewa security vizuri vile vile kama anauzoefu kwenye game! Mimi nilishare tu hiyo tool ambayo itamsaidia yeyote atakaetaka kuapply bruteforce katika kuattack Instagram account. Hivo kama ukitumia with combination na skill nyingine itakuwa vema na perfect, shida ni kwa wale wanaoexpect kuanza tu kubruteforce moja kwa moja.

Hivo kwanza kila mtu afahamu kwamba mimi sikuandika mahali katika hiyo POST yangu kwamba unaweza dukua Instagram kwa hiyo 'Instagram bruteforce exploit module' TU! Ndio maana nikaorodhesha kila kitu ambacho utatakiwa kuwa nacho kabla ya kuitumia. Hivo ni ujanja na uzoefu wako wewe kama hacker kuchagua what's next.

Hivyo ni decision yako kutumia tool gani au skill ipi.

Vile vile ningependa kuwataarifu wale raia wanaodai kwamba eti Bruteforce sio applicable katika website za kisasa au za mwaka 2017. Nipende kuwajulisha tu kwamba kila method unayofikiri wewe ni effective ina DISADVANTAGES zake na scenario ambapo inakuwa ineffective. Hivo kama nilivotangulia mwanzo nipende kuwakumbusha tu kwamba hakuna system ambayo ni 100% safe from Hackers! Ni kwamba utaslow down tu ile rate ya attack lakini hata ufanyeje lazma tu hacker mwenye nia atafigure out njia ya kuweza kucircumvent hizo restrictions mtakazoweka.

Mwisho nipende tu kushare nanyi hizi articles zilizoandikwa na OWASP, kama unaelewa ngeli na atleast security utaelewa kidogo.

1) Blocking Brute Force Attacks - OWASP

2) Slow Down Online Guessing Attacks with Device Cookies - OWASP

Mwisho kabisa, ni nani hapa kati yetu anayefahamu ni policy gani Instagram waliyo enforce kuminimize Bruteforce attacks against its users' account? Anipe na ushahidi usio na any doubt. Ili tuconclude kwamba ni very IMPOSSIBLE kwa Bruteforce attack kuwa effective kwa Instagram.

Article hii inaorodhesha ni namna gani any user wa Instagram anavyoweza kukeep akaunti yake safe.

Conseils de sécurité | Pages d’aide Instagram

Thanks.
 
Kila mtu anayeleta ubishi na kuleta hoja yake against hii thread, kwanza ningependa kuwapa tu taarifa kwamba hakuna system ambayo ni 100% secured, hivo basi usiione instagram pale ukadhani ni perfectly secured!

Pili, kwa swala la mimi kusema kwamba hiyo Instagram inaweza kuwa hacked tu kwa kupitia bruteforce, ni hoja ya uongo na mimi siku-declare hivo katika hii thread yangu. Na hivo ninawasi wasi na mtu aliyekuja juu na hoja hiyo ya kipuuzi na mbaya zaidi ninawasi wasi naye kama anailewa security vizuri vile vile kama anauzoefu kwenye game! Mimi nilishare tu hiyo tool ambayo itamsaidia yeyote atakaetaka kuapply bruteforce katika kuattack Instagram account. Hivo kama ukitumia with combination na skill nyingine itakuwa vema na perfect, shida ni kwa wale wanaoexpect kuanza tu kubruteforce moja kwa moja.

Hivo kwanza kila mtu afahamu kwamba mimi sikuandika mahali katika hiyo POST yangu kwamba unaweza dukua Instagram kwa hiyo 'Instagram bruteforce exploit module' TU! Ndio maana nikaorodhesha kila kitu ambacho utatakiwa kuwa nacho kabla ya kuitumia. Hivo ni ujanja na uzoefu wako wewe kama hacker kuchagua what's next.

Hivyo ni decision yako kutumia tool gani au skill ipi.

Vile vile ningependa kuwataarifu wale raia wanaodai kwamba eti Bruteforce sio applicable katika website za kisasa au za mwaka 2017. Nipende kuwajulisha tu kwamba kila method unayofikiri wewe ni effective ina DISADVANTAGES zake na scenario ambapo inakuwa ineffective. Hivo kama nilivotangulia mwanzo nipende kuwakumbusha tu kwamba hakuna system ambayo ni 100% safe from Hackers! Ni kwamba utaslow down tu ile rate ya attack lakini hata ufanyeje lazma tu hacker mwenye nia atafigure out njia ya kuweza kucircumvent hizo restrictions mtakazoweka.

Mwisho nipende tu kushare nanyi hizi articles zilizoandikwa na OWASP, kama unaelewa ngeli na atleast security utaelewa kidogo.

1) Blocking Brute Force Attacks - OWASP

2) Slow Down Online Guessing Attacks with Device Cookies - OWASP

Mwisho kabisa, ni nani hapa kati yetu anayefahamu ni policy gani Instagram waliyo enforce kuminimize Bruteforce attacks against its users' account? Anipe na ushahidi usio na any doubt. Ili tuconclude kwamba ni very IMPOSSIBLE kwa Bruteforce attack kuwa effective kwa Instagram.

Article hii inaorodhesha ni namna gani any user wa Instagram anavyoweza kukeep akaunti yake safe.

Conseils de sécurité | Pages d’aide Instagram

Thanks.
comment no 27 ulimjibu mkuu elmagnifico hivi
Bro, don't be silly, hmm? Bruteforce stills works especially in this world where still people prefer easily guessed and simple password patterns. For Your Information, bruteforce is the last resort to a hacker/pentester when all other hacking tactics have failed. So, please could you learn and practice more on this tactic to see how you can use it effectively in day to day penetration activities (if you are a pentester maybe).

Looks like you really don't have enough experience (if not necessary knowledge) with bruteforce and exploits writing.

au na hio comment tumekusingizia mods wame edit
 
comment no 27 ulimjibu mkuu elmagnifico hivi


au na hio comment tumekusingizia mods wame edit

Hivi hizo koments unazielewa vizuri? Hapo nilimaanisha kwamba Bruteforce bado inawork na bado ni potential threat kwa any site kwa sasa regardless ni Instagram au Facebook, wewe umesoma hiyo article apo juu niliyoshare ukaielewa?

Bro, jaribu kuelewa tu kwamba bruteforce haiwezi kuwa completely prevented. Na pia uelewe kwamba katika post yangu sikudeclare popote kwamba unaweza tu kubrute hizo Instagram user accounts kwa hiyo module. So, please jaribu kuelewa na kufikiri kiyakinifu kama wewe unaielewa vizuri software development na cybersecurity.
 
Hivi hizo koments unazielewa vizuri? Hapo nilimaanisha kwamba Bruteforce bado inawork na bado ni potential threat kwa any site kwa sasa regardless ni Instagram au Facebook, wewe umesoma hiyo article apo juu niliyoshare ukaielewa?

Bro, jaribu kuelewa tu kwamba bruteforce haiwezi kuwa completely prevented. Na pia uelewe kwamba katika post yangu sikudeclare popote kwamba unaweza tu kubrute hizo Instagram user accounts kwa hiyo module. So, please jaribu kuelewa na kufikiri kiyakinifu kama wewe unaielewa vizuri software development na cybersecurity.
hakuna aliekukatalia brute force haifanyi kazi, unachokataliwa wewe hapa ni instagram na brute force, na ndio kitu ulichokuwa ukikitetea mwanzo na mimi na wengine walikuwa wakisema haiwezekani.

anyway kama umekubali site kama insta, FB na nyengine kubwa huwezi kuzibrute force basi mjadala umeisha.
 
hakuna aliekukatalia brute force haifanyi kazi, unachokataliwa wewe hapa ni instagram na brute force, na ndio kitu ulichokuwa ukikitetea mwanzo na mimi na wengine walikuwa wakisema haiwezekani.

anyway kama umekubali site kama insta, FB na nyengine kubwa huwezi kuzibrute force basi mjadala umeisha.

Sijakubali kwamba haiwezekani kuzibruteforce, nafasi ya kuzibrute na kuweza kufanikiwa ipo. Wewe kama unasema haiwezekani nipe ushahidi Instagram au FB wametumia policy ya aina gani kucompletely prevent Bruteforce. Ila kama hacker bado it's possible kubrute kutokana na so many downsides za each method ya kumitigate Bruteforce kama zilivofafanuliwa na OWASP - Blocking Brute Force Attacks - OWASP . Hivo unayebisha kwamba bruteforce haiwezekani ulete namna ambayo Instagram/FB wanaitumia 'kuondoa kabisa' threat hiyo.
 
Sijakubali kwamba haiwezekani kuzibruteforce, nafasi ya kuzibrute na kuweza kufanikiwa ipo. Wewe kama unasema haiwezekani nipe ushahidi Instagram au FB wametumia policy ya aina gani kucompletely prevent Bruteforce. Ila kama hacker bado it's possible kubrute kutokana na so many downsides za each method ya kumitigate Bruteforce kama zilivofafanuliwa na OWASP - Blocking Brute Force Attacks - OWASP . Hivo unayebisha kwamba bruteforce haiwezekani ulete namna ambayo Instagram/FB wanaitumia 'kuondoa kabisa' threat hiyo.
mkuu huwa mimi sipendi blah blah na siasa, naipenda Technology sababu ni kitu ambacho kila kitu kina proof, humu hakuna kudanganyana kama watoto.

kama unasema inawezekana ni wewe ndio unatakiwa ku prove, na angalau ungeprove hata kidogo kwa screenshot kwamba umeweza kubypass mambo yote hayo unayotuambia kwa thoery.

hata screenshot ya hio program hatujaiona, hebu tuekee basi practically unavyofanya, sio lazima ufanikiwe angalau tu tuone matumaini.
 
mkuu huwa mimi sipendi blah blah na siasa, naipenda Technology sababu ni kitu ambacho kila kitu kina proof, humu hakuna kudanganyana kama watoto.

kama unasema inawezekana ni wewe ndio unatakiwa ku prove, na angalau ungeprove hata kidogo kwa screenshot kwamba umeweza kubypass mambo yote hayo unayotuambia kwa thoery.

hata screenshot ya hio program hatujaiona, hebu tuekee basi practically unavyofanya, sio lazima ufanikiwe angalau tu tuone matumaini.

Haina maana kwako na kwa wengine ambao hawajathubutu kuiexperiment, hivo sina budi kujisumbua kujiprove kwenu ninyi ambao hamjaitumia na pengine hata mmeshindwa kuitumia.

Sihitaji kuacknowledge my skills before mtu yeyote bro
.

What nilichotaka ni kushare nanyi hiyo module. Hivo basi kama utaipuuzia, we baki kuipuuzia wapo watakaoweza kuitumia. Nmeelezea procedures namna ya kuitumia na kama kuna mtu mwenye pentesting skills ataweza kujiongeza.

Ni hayo tu.
 
Haina maana kwako na kwa wengine ambao hawajathubutu kuiexperiment, hivo sina budi kujisumbua kujiprove kwenu ninyi ambao hamjaitumia na pengine hata mmeshindwa kuitumia.

Sihitaji kuacknowledge my skills before mtu yeyote bro
.

What nilichotaka ni kushare nanyi hiyo module. Hivo basi kama utaipuuzia, we baki kuipuuzia wapo watakaoweza kuitumia. Nmeelezea procedures namna ya kuitumia na kama kuna mtu mwenye pentesting skills ataweza kujiongeza.

Ni hayo tu.
ok tunashukuru module tumeipata
 
Wewe kama unasema haiwezekani nipe ushahidi Instagram au FB wametumia policy ya aina gani kucompletely prevent Bruteforce.
Sio kila security detail huwa inawekwa public. Kwenye nchi iko hivyo, kwenye majeshi iko hivyo na kwenye Software Development iko hivyo. Inaitwa "The Principle of Security by Obscurity". Nilitarajia uwe unafahamu hilo. The only way ya kutuaminisha hilo linawezekana ni kwa wewe ku penetrate kwa hiyo brute force.

Akaunti ya kampui yetu insta ni hosannaht
Ivamie kama uhakikisho kwetu nasi hatutakushtaki popote. Vinginevyo ina maana haipenyeki, at least wewe huwezi kupenya kwa hiyo brute force attack!
 
Back
Top Bottom