Posts

Showing posts from October, 2019

OPHCRACK--> rainbow-table based password cracker

Image
OPHCRACK-->   Ophcrack is a rainbow-table based password cracker. This tool can import hashes from different formats included dumping directly from the SAM files of Windows. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE: + 91 8446503791 / +91 9004527361 For detail, courses visit our website:   https://careertechnology.co.in/

1.3 million Indians' bank card details Leaked

Image
1.3 million Indians' bank card details put on the dark web On October 28,2019 the Singapore-based Group-IB security research team Shown unearthed a large database of credit and debit card details leaked on the dark web. The payment card details are being sold on the infamous underground card shops, Joker’s Stash, since October 28, 2019.  As per the screen-shot shared by Group-IB, each card is being sold for $100 (roughly Rs 7,092) and in total, it costs more than $130 million (approx. Rs 921.99 crore), making it the most valuable financial information to be put up for sale on the dark web to date. Hacker used Skimmer to steal the credit and debit card details of 1.3 million Indian users. Usually, a criminal installs a credit/debit data retriever device at ATM's card slot in addition to a key-stroke tracker on the keypad (or sometimes place a small camera near it). Once the user inserts the card, it copies all the information in the magnetic stripe on the back

CROWBAR--> brute force attacking tool

Image
CROWBAR--> Crowbar is one of the brute force attacking tool that It doesn’t try to identify a positive response  OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

Mysterious malware that re-installs itself

Image
Mysterious malware that re-installs itself infected over 45,000 Android Phones I new malware is detected in recent research. The malware reinstalls itself after deleting it or after the factory reset. The malware named Xhelper already infected mare than 45,000 Android Phones in just the last 6 months and it is continuing to spread by infecting at least 2,400 devices on an average each month according to Symantec report published. What an Xhelper can do by itself: "xhelper regularly reinstalls itself, almost every day" "The install apps from unknown sources setting turns itself on" "I rebooted my phone  and also wiped my phone yet the app xhelper came back" "Xhelper came pre-installed on the phone from china" "don't buy cheap brand phones" From Where Xhelper Android Malware Comes? Though the Symantec researchers did not find the exact source from where the malicious app packed with the Xhelper malware comes in

EVILABIGAIL-->TOOL FOR EVIL MAID ATTACK ON LINUX

Image
EVILABIGAIL--> PYTHON BASED TOOL   TO RUN AUTOMATED EVIL MAID ATTACK ON LINUX SYSTEM OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

Cyber Crimes and Provisions applicable

Image
List of cyber crimes and provision under IT ACT for the cybercrime  Harassment via a fake public profile on social networking site:  A fake profile of a person is created on a social networking site with the correct address, residential information or contact details but they are labeled as a ‘prostitute’ or a person of ‘loose character’. This leads to harassment of the victim. Provisions applicable:  Sections 66A, 67 of IT Act and Section 509 of the Indian Penal Code, this section are applicable for Harassment Online hate community:  An online hate community is created inciting a religious group to act or pass objectionable remarks against a country, national figures, etc. Provisions applicable:  Section 66A of IT Act and 153A & 153B of the Indian Penal Code.  Email account hacking:  If the victim’s email account is hacked and obscene emails are sent to people in the victim’s address book. Provisions applicable:   Sections 43, 66, 66A, 66C, 67, 67A and

THC HYDRA-->Network Login Tool

Image
THC HYDRA--> Network login tool that uses the dictionary and brute-force attacks to try various password and login combinations on the login page OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

Walmart leaked data

Image
Company's irresponsibility leads to huge data breach Keeping Personal Information safe from the criminal's hand is hard to save.  The bigger the company the more data it stores and more risk of breaching data. Walmart is one of the biggest companies millions of dollars in a year and also having millions of customer data stored in its database. Recently Wallmart leaked it's 1.3 million user data publically. The leaked data was stored in an Amazon S3 bucket named "WALMARTSQL" and was accessible by the public.  The leaked information belongs to a firm named "MBM Comapany Inc. The MBM company is dealing with the Jewelry products and leaked data of 1.3 million users. download the leaked data from the below link:  https://mega.nz/#!R4wD0QgB!OcFJrTZhbSrtt_eQDPmhr9yRpgqJDSNP5VyvzHJGlZg

Sonakshi Sinha order RS 18,000 headphone received this!!!

Image
Sonakshi Sinha ordered headphones, opened the packet, something like this, flew away Sonakshi Sinha the "Dabangg Girl" recently Twitted on Twitter about an Online Fraud that happened with her while shopping Online. She ordered a Headphone from Amazon of Bose company when the ordered reached to the wand she opened she was shocked what she got was unexpected for everyone. When she opened the delivered box for her order she got a rusted piece iron in the box of headphones. Here What she Twitted "Hey @amazonIN! Look what I got instead of the @bose headphones I ordered! Properly packed and unopened box, looked legit... but only on the outside. Oh, and your customer service doesn't even want to help, that's what makes it even worse."

HASHCAT--> Password Cracking tool

Image
HASHCAT--> Password Cracking tool  OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

Microsoft to Reward Hackers

Image
Microsoft to Reward Hackers for Finding Bugs in Open Source Election Software The election is the lifeline of democracy, and election should be fair for the people whom they elect. As all the world facing the problem of hacking, cybercriminals are almost everywhere and in every field. Election hacking was also a hot topic worldwide. As the world facing the problem of election hacking whether it's American voting machines during the 2016 presidential election or India's EVM's during 2014 general election , the integrity, transparency, and security of electronic voting machines remained questionable, leaving a wound in the minds of many that is difficult to heal. Many countries now believe the best way to ensure the security of election machines is to make its, technology opaque to bad actors. But the population in recent years losing trust in this system as it's only seen by the closed group of expert people. TO make a balance and transparency in election&

Shellphish: A Phishing Tool

Image
SHELLPHISH--> The tool offers phishing templates for 18 popular sites, the majority are focused on social media and email providers. There is also an option to use a custom template if so desired. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

Celebs v/s Hackers

Image
There have been numerous hacking cases where Twitter, Facebook and other social media accounts of famous Bollywood stars are hacked. Let’s know about a few shocking hacking cases that happened with your favorite Bollywood celebs. SHRUTI ASSAN: Shruti Hassan is one of the actresses who work most of the time in South movies and famous for her acting skill. The hacker not only hacked her once but many times. In May 2016 her Twitter, Facebook and even Gmail account have been hacked. First, her Facebook account was attacked by cyber-criminals, and she informed about it on twitter. The hacker posted several pictures of Bollywood actress Kriti Sanon on her Fb account. It looks like the hacker was a fan of Kriti. Later, her Twitter account was also hacked. SHAHID KAPOOR: Shahid Kapoor’s Twitter and the Instagram account was hacked in 2018 after the release of his famous movie “Padmavat” by the Turkish hackers . They hacked the Shahid's account because of Alauddin Khilj

AIRCRACK-->WIFI HACKING TOOL

Image
AIRCRACK--> EHTICAL HACKING TOOL FOR CRACKING WIRELESS PASSWORDS LIKE WEP WPA AND WPA2 ENCRYPTION KEY O UR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

BJP MP BANK ACCOUNT HACKED

Image
Shobha Karandlaje is one of the most prominent BJP politicians in Karnataka. Shobha joined the RSS at a very young age. Shobha Karandlaje's account has been hacked and debited 16 lakh Rs from her account. A case has been reported of the disappearance of about 16 lakhs of alert messages from the salary account of BJP MP from Karnataka Shobha Karandlaje. On Tuesday, the MP complained about this at the North Avenue Police Station in Delhi. She went to the bank to update the passbook last week when she came to know that 15 lakh 62 thousand rupees are missing from her account. His account has been hacked many times since December 2018. According to Karandlaje, "it is very shocking that whenever she used to make transaction an SMS alert used to come on hr number but such a huge amount disappeared from her account and not a single message came" . This case is now handled by the cyber cell. Police said that according to bank details the money has been transf

SHODAN-->search engine for Live web cams

Image
SHODAN--> Search Engine lets users find specific devices that exist online. Shodan indexes everything including webcams, medical devices traffic lights and anything that is connected to the internet OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

7 policemen including women soldier suspended

Image
7 policemen including women soldier suspended This case is of Raipur, the capital of Chhattisgarh . & policeman including a female officer arrested for online betting. The whole incident took place on Friday when police raided Ashwani Nagar in Raipur based on secret information. During this raid, police raided at a house in the old settlement and arrested a bookie named Vikas Tamboli. When the police questioned him, it was found that Rahul Chaudhary worked for them. Police nabbed Rahul Chaudhary on the trails of development. Police seized Vikas and Rahul's phone. When both of their mobile phones were examined, a WhatsApp group was found in them, in which the numbers of seven policemen were also present. The police, after verifying all the numbers, sent the names of the policemen to the top officers. A woman soldier was also included in these policemen. During investigating the officers they accepted that they use to call and chat Rahul and Vikas's number t

JACK--> Clicking Jacking Tool

Image
JACK--> Drag and Drop Web-based Clicking Jacking Tool  OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

5 Keys to Improve Your Cybersecurity

Image
5 Keys to Improve Your Cybersecurity Cybersecurity isn't easy, today's world becoming more digital depending on gadgets that connect them with each other. As the growth becoming more cyber attacks is getting more and more to fight with them need cybersecurity. here are the few tips to improve your cybersecurity skills Assess your business objectives and unique attack surface — Choose a threat detection method that can address your workloads. For instance, cloud servers spin up and spin down constantly. Your detection must follow the provision and de-provision actions of your cloud platform(s) and collect metadata to follow events as they traverse this dynamic environment. Most SIEMs cannot do this. Eliminate vulnerabilities before they need threat detection — Use vulnerability assessments to identify and remove weaknesses before they become exploited. Assess your full application stack, including your code, third party code, and code configurations. Align

Social Mapper-->Search profile information on social media

Image
Social Mapper-->Open Source Tool to search for profiles Information from Social Media sites such as Facebook, Instagram, LinkedIn, Google+ OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE:  +91 86521 24550

KIARA ADVANI's TWITTER ACCOUNT HACKED

Image
KIARA ADVANI's TWITTER ACCOUNT HACKED Kiara recently worked in a movie named Kabir Singh which was a blockbuster on the Bollywood. In the movie, Kiara performed the role of Preeti who was a Girlfriend of Kabir Singh. Kiara on Tuesday posted an Instagram Story warning his followers about the Twitter Account Hacked. She said "My Twitter account has been hacked. We are working on it to get it back. Please ignore any unnecessary or strange tweets being posted". She also mentioned that on Instagram "Please do not click on any suspicious link that is being sent from my twitter account. My account is still hacked and this link has not been sent my me". Kiara is now in the list of Amitabh Bachchan, Adnan Sami, Shahid Kapoor and other Bollywood celebrities who have fallen prey to social media hacking. In the working field, Kiara has her plate full with films like Indoo Ki Jawaani, Bhool Bhulaiyaa 2, Laxmi Bomb and Netflix film Guilty. Kiara is a

HALL OF FAME ON INDIAN NCIIPC

Image
HALL OF FAME The government has launched an Bug Bounty program for the free Bug hunters on Indian websites. Current month 266 Bug Hunters got the Hall OF Fame on the Indian Websites. ( www.nciipc.gov.in ) The total number of student got all of the fame in India is 266 in which our institute student where 41.  Trained under the guidance of Mr. Sanjeet Mishra.

CUCKOODROID--> Software to Analysis Android

Image
CUCKOODROID--> Software used to Analysis suspicious files and Malware for Android Applications OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

Fake Fraud call center

Image
This incident took place in Haryana cyber city Gurgaon, Crime branch raided then companies and exposed this fake call center. In the raid, police arrested 23 people including the owner who was a foreigner. The crime branch of Gurgaon Police conducted raids on 10 companies of Udyog Vihar. Where the fraudulent business of fake call center was being run. People were being fraudulent with phone calls. However, the police have not denied that the mastermind of this racket is a foreigner. Through such call centers, hundreds of people have been made a victim of fraud in the last 6 months. These gangs used to collect money in the name of giving loans and credit cards to people through phone calls. In all, the police have busted 10 such call centers. In this case, DCP Crime had received secret information. After this action was carried out. Police say that the strings of this racket can also be connected to foreigners.

DOMAINED --> Multi subdomain Wordlist creator

Image
DOMAINED --> Multi subdomain enumeration for creating wordlist OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

IRCTC biggest scam by CBI officer

Image
IRCTC biggest scam by CBI officer Ajay Garg was working as an assistant programmer for CBI . Before working in CBI Ajay Garg was appointed as a programmer in IRCTC . It is alleged that this agency of CBI had created illegal software to book railway tickets. Ajay Garg with his partner named Anil Gupta committed the crime of TRCTC ticket fraud. Ajay Garg developed software that directly infiltrated the IRCTC's Tatkal Ticket booking system. CBI arrested Ajay Garg and his crime partner Anil Gupta. After the incident CBI raid at 14 places including Delhi, Mumbai, and Jaunpur. CBI seized cash 89.42 lakh, jewelry 61.29 lakh, 2 gold bricks, and 15 laptops. Ajay Garg uses the method of bitcoin and hawala networks to get money. Ajay Garg develops this software at the time when it was developed in IRCTC. Ajay Garg used Proxies and Foreign servers for this purpose. With this software, Ajay can book 800 to 1000 tickets for the users at a time. Anil Gupta used to give Bitcoin

MAILXAMINNER --> MAIL EXAMINER SOFTWARE

Image
MAILXAMINNER --> MAIL EXAMINER SOFTWARE TO ANALYZE EMAIL FOR INVESTIGATOR OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

REMOVED FROM WHATSAPP GROUP ADMIN GOT UNDER A FATAK ATTACK

Image
This incident took place on 17 May on Ahmednagar-manmad Road in Maharashtra. A student at Ahmednagar Agricultural College in Maharashtra got attack with a sharp weapon. Actually, Shivaji removed another student from his college, Sachin Gadkh, from the WhatsApp group. He, along with his colleagues, carried out this incident.  According to the information students of Ahmednagar, Agricultural College has formed a Whatsapp group, in which thy use to discuss about the activities of the college and their work. But the accused attacker is an alumnus of Sachin Gadkh College and is no longer a part of the college. Therefore, Ghor removed Gadkh from the college WhatsApp group. However, Gadkhar went through this matter and decided to take revenge from Chaitanya. After this, he, along with his 3 other colleagues, suddenly attacked the 18-year-old dawn with sharp weapons. He was seriously injured in the attack. According to police, this took place when Shivaji was going towards Bhor M

DeepSound – Audio Steganography Tool

Image
DeepSound – Audio Steganography Tool--> Hides secret data into audio files, the application also enables you to extract secret files directly from audio files or audio CD tracks. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

WhatsApp tracing harmful messages

Image
WHATSAPP MESSAGES CAN BE TRACED WITH VIOLATING END-TO-ED ENCRYPTION  While the fake messages in India are spreading widely all over India. The government requested to trace the origin of fake messages WhatsApp replied: "We can't trace the messages as it is end-to-end encryption of data". The National Security Advisory Board (NSAB)  has stressed the issue and resolved to track the messages to the origin of the messages, and this will not affect the user's privacy of end-to-end encryption. V. Kamakoti said when he was delivering a lecture at the Indian council of world affairs of wednesday "If WhatsApp says it is not technically possible to show the originator of the message, I can show that it is possible". "When a message is sent from WhatsApp, the identity of the originator can also be revealed along with the message. So the message and the identity of the creator can be seen only by the recipient. When that recipient forwards the message

CEWL--> Cewl is wordlist generator

Image
  CEWL --> Cewl is wordlist generator spidering a site and create a wordlist of all important words OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

Four Most common Web Attack Pattern

Image
Four Most common Web Attack Pattern Understanding Web Request Patterns for Four Most Common Web Attack Methods Today we going to understand the 4 most common web attack patterns and how to identify this attack. This article will help you to find the pattern of web attack and make secure yourself and business organization sensitive data of customers. Four most common web attacks: Account Takeover API Abuse Injection Attack Business Logic Attack 1.ACCOUNT TAKEOVER:   It is also known as an ATO attack. Hackers often still real user account credentials of emails and passwords and access details of the real user. This data often end up selling on the dark web.   Key Factor this occurs due to a lack of password management users. 2.API ABUSE:   API is a web framework that enables applications to communicate and exchange data with each other. Hackers attempt to manipulate APIs such as gift cards and credit card validation in order to perform malicious activities.  

ANDROGAURD: Reverse Engineering for Android

Image
ANDROGAURD: Reverse Engineering and Malware Analysis fort Android Using any reverse engineering tool we can measure the obfuscation (unclear) level and can convert Android XML files to a readable format. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

SIGNAL MESSENGER BUG: AUTO-CONNECT CALLS

Image
SIGNAL MESSENGER BUG: AUTO-CONNECT CALLS Nowadays every application or software contains one or more vulnerabilities. The more you code your application or software the more it becomes vulnerable. Today's vulnerable application is "SECURE PRIVATE MESSANGER" The secure private messenger is used to call privately anywhere in the world for free. SECURE PRIVATE MESSENGER says : "Millions of people use Signal every day for free and instantaneous communication anywhere in the world. Send and receive high-fidelity messages, participate in HD voice/video calls, and explore a growing set of new features that help you stay connected. Signal’s advanced privacy-preserving technology is always enabled, so you can focus on sharing the moments that matter with the people who matter to you". Google Project Zero Researcher NATALIE SILVANOVICH discovered a vulnerability that a malicious caller can force a call to be answered at the receiver's end without re