Blog

01 Sep

Hack Windows with EternalBlue-DoublePulsar Exploit through Metasploit

What is Eternalblue-Doublepulsar? EternalBlue Malware Developed by National Security Agency (NSA) exploiting Windows based Server Message Block (SMBv1) and to be believed the tool has released by Shadow Brokers hackers Group in April 2017 and it has been used for Wannacry Cyber Attack. The DOUBLEPULSAR help us to provide a backdoor access to a windows

Read More
01 Sep

Cobalt Group Targets Banks in Eastern Europe with Double-Threat Tactic

The campaign uses double infection points and two command-and-control servers. The infamous financial cybercrime gang known as Cobalt Group has been spotted actively pushing a fresh campaign that uses a peculiar tactic: Double infection points and two command-and-control (C2) servers. The Cobalt Group, a known financial cybercrime ring since 2016, has been suspected in attacks

Read More
31 Aug

Johnny ~ John the Ripper for Windows

When it comes to the password cracking tools, John The Ripper turns out to be the top-most choice of most of the ethical hackers. This free and open source software is distributed in the form of source code. John The Ripper is primarily written in C programming language. It has been able to achieve the

Read More
31 Aug

Maltego

Maltego is an interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet. Maltego uses the idea of transforms to automate the process of querying different data sources. This information is then displayed

Read More
30 Aug

Telegram updated its policy

on Tuesday, the company published a new privacy policy in which it stated: “If Telegram receives a court order that confirms you’re a terror suspect, we may disclose your IP address and phone number to the relevant authorities.” “So far, this has never happened,” the policy noted. “When it does, we will include it in

Read More
30 Aug

theHarvester

theHarvester is a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers). Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company in the Internet.

Read More
29 Aug

ALPC 0day Bug

A security researcher has publicly disclosed the details of a previously unknown zero-day vulnerability in the Microsoft’s Windows operating system that could help a local user or malicious program obtain system privileges on the targeted machine. And guess what? The zero-day flaw has been confirmed working on a “fully-patched 64-bit Windows 10 system.” The vulnerability

Read More
28 Aug

IRN2 ~ Operation Doos Security Report

Executive Summary: Iranian cyber actors, in the Summer of 2017, compromised a website of Doosan Power Systems India (DPSI) in order to conduct a targeted spearphishing campaign against Saudi Aramco affiliates. DPSI is a subsidiary of Doosan Heavy Industries & Construction, the infrastructure support business of South Korean conglomerate Doosan Group. Doosan Heavy Industries &

Read More
28 Aug

Masscan – World’s Fastest Scanner

Masscan – Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. Masscan is an Internet-scale port scanner, useful for large-scale surveys of the Internet, or of internal networks. While the default transmit rate is only 100 packets/second, it can optional go as fast as 25 million

Read More