Posts

CHNTPW--> Kali Linux Tool

Image
CHNTPW--> Kali Linux Tool used to edit Windows registry to reset user passwords  OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

Android hack by just GIF

Image
Just a GIF can hack your android phone using WhatsApp!!! Nowadays we often see GIF in our day-to-day life while chatting on WhatsApp. Sharing a GIF is more interesting and funny as compared to sharing a picture of a joke or any other funny picture GIF makes as feel quit more interesting. Now, here the hackers enter. The hacker can hack your phone by sending you a GIF on your WhatsApp. It's not a theoretical idea anymore. WHATSAPP REMOTE CODE EXECUTION VULNERABILITY This vulnerability tracked as CVE-2019-11932 is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that WhatsApp uses. Discovered by Vietnamese security researcher Pham Hong Nhat in May this year . The researcher said to the news that " The payload is executed under the WhatsApp context, so it has all the permission to the memory" "Malicious code will have all the permissions that WhatsApp has, ...

VULNX -->AUTO SHELL INJECTOR

Image
VULNX --> INTELLIGENT BOT AUTO SHELL INJECTOR OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: PHONE: +91 86521 24550

ABBREVIATIONS USED IN CYBERSECURITY

Image
ABBREVIATIONS USED IN CYBERSECURITY As a Cyber Security Researcher, the user must know these basic abbreviations. This is the most commonly used abbreviation used by researchers to find a bug or to secure the system and network. XSS     --> Cross-Site Scripting DOS     --> Denial Of Service DDOS   --> Distributed Denial Of Service IPSEC   --> Internet Protocol Security SSE      --> Server-Side Encryption TLS      --> Transport Layer Security CSP      --> Content Security Policy CBSP     --> Cloud-Based Security Providers AES       --> Advance Encryption System MFA      --> Multi-factor Authentication WAF     --> Web Application Firewall STS       --> Seurity Tokenn Services RAT      --> Remote Administration Tool SPF      --> Sender Policy...

BSQL injector -> Blind SQL injector tool

Image
BSQL injector -> Blind SQL injector tool OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: EMAIL: info@careertechnology.co.in PHONE: +91 86521 24550

NEW HACKING TECHNIQUE

Image
HACKER CAN FIGURE OUT PASSWORD JUST FROM THE SOUND OF TYPING Hackers figure out a new way to hack the password by just listening to the typing on a keyboard. Hacker use microphone of the users mobile phone to listen to the typing of the user . This method is so effective that it can be carried out in a noisy place where multiple people are typing. It was found by the researcher at Southern Methodist University in Texas . This technique is discovered by analyzing the different sound waves produced when a key on a keyboard is stuck. After processing the acoustic signals, they were able to decode which keys were struck and in which order. with this, a hacker can not only get the password but also the private messages. This is usually to facilitate certain functions of the app, however, it is conceivable that hackers could either create malicious apps for the purpose of spying or hack existing apps in order to secretly hijack a phone’s microphone. The researchers warned...

BRUTUS--> FASTEST REMOTE PASSWORD CRACKER

Image
BRUTUS--> FASTEST REMOTE PASSWORD CRACKER OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION CONTACT US FOR MORE DETAILS: EMAIL: info@careertechnology.co.in PHONE: +91 86521 24550