Category Archives: Cybersecurity

log4j cybersecurity

Log4shell is a major flaw in the widely used logging programme Log4j, which is used by millions of machines running internet services across the world. It is expected to influence a wide spectrum of people, including organisations, governments, and individuals. Despite the fact that patches have been published, they must still be installed. Cybersecurity researchers are trying to find this bug for reporting this to get bounties from the companies… About the issue? Last week, a flaw in Log4j, an open-source logging library widely used by apps and services on the internet, was discovered. Attackers can break into systems, steal passwords and logins, extract data, and infect networks with malicious software if the problem is not fixed. Log4j is widely used in software and online services around the world, and exploiting the vulnerability needs very little technical knowledge. As a result, Log4shell could be the most serious computer vulnerability in…

Read more

computer,viruses

Malwares Malware means malicious software. It is any program created by a hacker or programmer in such a way that when it will be executed in a computer system it will lead to abnormal behaviour of the machine. For example Deletion of files, Hiding Data, Creation of new folder,switching on of webcam and many more things. Malwares include virus, worms, keyloggers, trojans, adware,ransomware, rootkit. We are now going to discuss all these in brief. Types of computer viruses.. Virus – A virus is a very common type of malware. Normally viruses are those computer codes which are attached to other executable files etc. so that they can be executed when the user double clicks on the executable file to which the virus is attached. Virus will not come into action till the user executes the file to which the virus is attached. Virus can not transfer itself from one PC…

Read more

nmap pdf

Nmap   Nmap is favorite tool for hackers which can search the network and view services that are running and there versions and ports that are open or close or filtered!!! –> Just i write upper sentence while eating lol. It have many options like:- Scan types Firewall options Verbose option Speed optimization output options Scripting engine Nmap Tool suite   Nmap pdf   Download  pdf from below:                                                                   Analysing_Networks_with_NMAP   More pdf will come here:   Question answer Pdf of class from here —  Nmaptest      

images

Nmap: It is one of the most widely used tools by hackers. It is an advanced scanner with a lot of functions compared to netdiscover. We would be discussing some main Nmap scans . For more details refer to man page of nmap by typing ​man nmap​ on the terminal. Syntax:​ nmap [Scan Type…] [Options] {target specification} Some Nmap Scans: a)Ping Scan-: ​Ping scan is used when we only want to see which devices are connected to our network. This particular scan works much like netdiscover. So for using Ping scan we will use the nmap command with ​-sn​ option. (root💀Dark)-[/home/nethaxstark] └─# nmap -sn 192.168.1.1/24 Starting Nmap 7.91 ( https://nmap.org ) at 2021-10-20 19:28 IST Nmap scan report for 192.168.1.1 Host is up (0.0015s latency). MAC Address: BC:8A:##:##:66:6E (Qing DAO Haier Telecom) Nmap scan report for 192.168.1.100 Host is up (0.050s latency). MAC Address: 9C:28:##:##:A8:F2 (Xiaomi Communications) Nmap scan report…

Read more

Bluetooth,Hacking

Bluetooth is it safe? – Bluetooth is a useful technology as we can transfer files over a network to someone without any internet access. Bluetooth is short range wireless technology which is used to transfer files over a fixed range using UHF which are given by the ism for communication from 2.402 ghz to 2.48 ghz and build personal area network. Bluetooth uses radio waves for the transfer of files unlike cables and other means of sharing data. So there is a chance of manipulation of data or hack of data if the attacker has full information how bluetooth works and how he can hack into peoples network but there are security measures that can help users to protect there data and themselves when they use there devices. Also organizations and institutions started to make there bluetooth drivers safe with mitigations! How contacts hacking works? – As i said before…

Read more

vulnerability Upload

What is File Upload Vulnerability? Ans>  File Vulnerability is Various web applications allow users to upload files (such as pictures, images, sounds, …). Stored files may pose a significant risk if not handled correctly. A remote attacker could send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code. I was able to a file containing executable code and get this code executed. How to prevent it? Restrict file types accepted: check the file extension and only allow certain files to be Stored. Use a whitelist approach instead of a blacklist. Check for double extensions such as .php.png. Check for files without a filename like .htaccess (on ASP.NET, check for configuration files like the web. config). Change the permissions on the folder so the files within it are not executable. If possible, rename the files that are Stored.   Check the Youtube video!!! In that…

Read more

Stream Kali Linux

Streaming on any channel with Kali Linux!! What is streaming? It implies any media content – live or recorded – passed on to PCs and phones through the web and played back ceaselessly. Computerized accounts, webcasts, films, TV shows, and music accounts are ordinary kinds of substance. There are different devices available, each with its own fascinating segments. Whether or not you need a without hands decision, copious inside accumulating, something sensible or conceivably 4K receptiveness, there’s a contraption for you. Journey for studies by real associations and think about substitute decisions, for instance, a gaming console or a set-top box from your TV provider and in this post, I will tell you how to do Live Stream in Kali Linux. What is a live stream? It is the transmission of an event over the web as it happens. Amusement functions, sports, battles, PC games, and unprecedented one-time events are…

Read more

advphishing

Hii Guys So Finally i am here to tell you guys how you can install adv-phishing-github   Adv phishing github We will use the github to clone the tool in your device it will run on pc and on mobile too. OTP Bypass Phishing Tool   AdvPhishing is a phishing apparatus which permits the client to get to accounts via web-based media regardless of whether two-factor verification is enacted. It permits the client to acquire the objective’s username, secret word and most recent one-time secret word (OTP) continuously as the objective is signing in. Notwithstanding this the client can utilize the tool to get the objective’s IP address. AdvPhishing is accessible on both Android and Linux. Features: 1. Produces life-like versions of popular websites. 2. 15 different websites included in the current release. 3. Easy to use Tested on: 1. Kali Linux – 2020.1a (version) 2. Parrot OS – Rolling Edition…

Read more

8/8