இடுகைகள்

டிசம்பர், 2017 இலிருந்து இடுகைகளைக் காட்டுகிறது
படம்
FTK Step by Step Tutorial of FTK Imager (Beginners Guide ) FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as Access Data® Forensic Toolkit® (FTK) is warranted. FTK Imager can also create perfect copies (forensic images) of computer data without making changes to the original evidence. With FTK Imager, you can: Create forensic images of local hard drives, floppy diskettes, Zip disks, CDs, and DVDs, entire folders, or individual files from various places within the media. Preview files and folders on local hard drives, network drives, floppy diskettes, Zip disks, CDs, and DVDs Preview the contents of forensic images stored on the local machine or on a network drive Mount an image for a read-only view that leverages Windows Explorer to see the content of the image exactly as the user saw it on the original drive Export files and folders from forensic images. S...
படம்
Acoustic Attack Against HDDs Can Cause Permanent Damage CCTV DVR, PCs, ATMs Hard disks play a vital role in numerous computing systems including, personal computers, closed-circuit television (CCTV) systems, medical bedside monitors, and automated teller machines (ATMs). Security researchers from Purdue University show that an attacker can use acoustic sound to cause significant vibrations in HDDs internal components.They show even if a small displacement in the head leads to malfunction with HDD operation and can cause permanent damage. HDD Acoustic Attack An HDD consists of two components the platters and the read-write heads. The data will be stored in platters and the read/write operations performed by heads. If the attacker can create the acoustic signals nearer to victim device in audible frequencies by using an external speaker or any other device may result in remote software exploitation which allows an attacker to deceive the user to play a malicious sound attach...
படம்
RANSOMWARE A Group Behind the VenusLocker Ransomware Switch into Secretly Mining Monero Cryptocurrency A new malware attack distributing to mine Monero cryptocurrency by the group Behind the VenusLocker Ransomware. VenusLocker Ransomware discovered in mid of this year  which encrypts user files, renames them and changes their extensions to .Venusf or .Venusp . The virus creators require a $100, $500 or another amount to be paid in BitCoin in order to recover the files and this ransomware creator. Monero Cryptocurrency launched April of 2014 that is currently trading at around $400 USD. one of this malware distribution occurred email and specifically targetting the South Korean users. How does this Malware Mining Monero Cryptocurrency Initially distributing through spam email that delivering to target users via social engineering attacks and one of the discovered email spam falsely claims that the recipient’s information from their website has been le...
படம்
Trape -Tool to Track anyone on the Internet and to Perform real-world Attacks Trape is the python based script to track anyone on the Internet and to perform real-world attacks on the browser of a victim. Its a URL based payload should be sent to your victims on the internet and able to do phishing attack, recognizes the other tabs or sessions of victims browser, URL Redirection, sending pop-up messages. In this Kali Linux Tutorial, we show you how to use Trapeto track anyone on the internet and to perform real-world attacks. Attacker Machine Download the Trape Tool  Here Execute command:  python trape.py -u  <Cloning URL> <Port> 80 NOTE: For Security reasons, localhost is used to demonstrate this attack, If you change the script to your Ip it will become a real-world attack.Please don’t do, this article is provided for educational purpose only. Victims to fall Here I have cloned  googl...
படம்
Exploitation Framework for Embedded devices – RouterSploit The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid  penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules designed to test credentials against network services scanners – modules that check if a target is vulnerable to any exploit Requirements gnureadline (OSX only) requests paramiko beautifulsoup4 pysnmp Installation root@kali:~# apt-get install routersploit Usage Exploits The routersploit a similar tool like  Metasploit , very easy to create more modules. Anyone can extend the tool easily with the help of exploit databases. Checking for Misfortune Cookie vulnerability : It is a critical vulnerability which allows an attacker to take remote control of a router connected to the Internet and it can be fixed only by hardware vend...
படம்
10 Best Hackers The World Has Ever Known 535.7k In the world of web where we get the global connectivity, it is far easier to break into someone’s personal zone. By personal, we do not just mean the social media. The world wide web which has become the hub of storing and restoring information, considered to be the safest vault, is a mere toy in the hands of a few computer geniuses. Hackers, Black Hat Hackers, villains, crackers, cyber-criminals, cyber pirates as they are well-known, throw a malicious software or virus at a system to gain the access to the desired information. Piqued by curiosity, they may perhaps break into your system too. Here are top 10 hackers or the whiz kids who put the world in awe with their dexterity. 1. Gary McKinnon Gary McKinnon must’ve been a curious, restless child, for to gain information on UFOs, he thought it better to get a direct access into the channels of NASA. He infiltrated 97 US military and NASA computers, by instal...