Password Cracking

Password Cracking & Online Casino

Authentication is the first step to measuring the security of a website, computer, and network. Various websites use a password-based authentication process to keep their users safe, even if you use password-based protection for your bank account, poker account, email account. etc. | Password Cracking | Therefore, before you make a decision and enter a…

Read More
india-powergrid-cyberattack

Chinese Hacker Groups Continue to Target Indian Power Grid Assets

China-linked adversaries have been attributed to an ongoing onslaught against Indian power grid organizations, one year after a concerted campaign targeting critical infrastructure in the country came to light. Most of the intrusions involved a modular backdoor named ShadowPad, according to Recorded Future’s Insikt Group, a sophisticated remote access trojan which has been dubbed a “masterpiece of privately sold malware…

Read More
hacking

Hamas-linked Hackers Targeting High-Ranking Israelis Using ‘Catfish’ Lures

Hamas-linked Hackers Targeting High-Ranking Israelis Using ‘Catfish’ Lures || A threat actor with affiliations to the cyber warfare division of Hamas has been linked to an “elaborate campaign” targeting high-profile Israeli individuals employed in sensitive defense, law enforcement, and emergency services organizations. “The campaign operators use sophisticated social engineering techniques, ultimately aimed to deliver previously…

Read More
North Korean Hackers

North Korean Hackers Distributing Trojanized DeFi Wallet Apps to Steal Victims’ Crypto

A state-backed North Korean hacking team, also known as the Lazarus Group, has been linked to another financially motivated campaign that uses a decentralized finance (DeFi) wallet Trojan application to spread a fully functional backdoor to compromised Windows systems. The app, equipped with features for saving and managing a cryptocurrency wallet, is also designed to…

Read More
Magniber ransomware

Magniber ransomware being spread in the guise of a legit Microsoft Edge and Google Chrome update

Analysts have now discovered that attackers behind the Magniber ransomware, who have been exploiting IE-based vulnerabilities so far, are now targeting PCs via modern browsers such as Edge and Chrome. The Magniber ransomware is disguised as a legit update package for Edge or Chrome and comes as a signed .appx file. Installing this “update” will…

Read More
Wapiti –Web Applications Security Auditing Framework

Wapiti – Web Applications Security Auditing Framework

Wapiti is a vulnerability assessment framework that performs black box security auditing of the web applications. The vulnerabilities that can be assessed with Wapiti include database injections, Local File Inclusion (LFI), Remote File Inclusion (RFI), command execution, CRLF injection, Server Side Request Forgery (SSRF), XML External Entity (XXE) injection, Shellshock bugs, .htaccess attacks, and source…

Read More
pureblood tool

Pureblood Tool – web Application Penetration Testing

Pureblood  Information Gathering and Security Auditing Tool Pureblood is a Python tool that can be used during the information gathering and gaining access phases of penetration testing. Pureblood can collect useful information about target web applications, such as Banner grabbing, WHOIS record, DNS data, reverse DNS lookup, reverse IP lookup, CMS information, ports information, admin panel paths, subdomain scan…

Read More