Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and …
Commix – Automated All-in-One OS Command Injection and Exploitation Tool
Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers …
Famous Cosmetic Company “Tarte” leaked 2 Million Customers Personal Data Online
Newyork based Cosmetic Company Tarte’s leaked online around 3 million US and international customers data who shopped via their online …
EgressBuster – Compromise Victim via Command & Control using Firewall
Network Firewalls acts as a fortification to keep the internal corporate network secure.Many people often think as it is protecting …
Beware : Mass Ransomware Cyber Attack with “Bad Rabbit” Ransomware Hitting Many Government & Private organization
A New ransomware family called “Bad Rabbit” rapidly spreading across the Eastern European countries affecting government and private agencies including Russia, …
DUHK Attack allows Hackers to Recover Encryption Keys and Decrypt Communications Passing Over VPN
DUHK attack targets the old vulnerability that resides in the pseudorandom number generator called ANSI X9.31. It is an algorithm …
Beware: Dangerous Android Ransomware “LOKIBOT” Attacked Many Users & Earned $1.5Million From Compromised Victims
Dangerous Android Banking Trojan “LOKIBOT” has distributed around the world with sophisticated Ransomware future and demanding around $70 and $100 from …
Security Information and Event Management (SIEM) – A Detailed Explanation
Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In agent-based approach, a log pushing …
BOVSTT – Buffer Overflow Vulnerability Services Tester Tool
BOVSTT is to detect the existence of remote/local stack-based buffer overflow vulnerabilities using the standard communication protocol for each service. …
Web Applications Security Testing: Tact’s & Methodology
Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web …