Posts

IronWASP--> Vulnerability Testing TOOL

Image
IRONWASP-->   IronWASP is an open-source system for web application vulnerability testing. It is designed to be customizable to the extent where users can create their own custom security scanners using it. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE:   + 91 8446503791 / +91 9004527361 For detail, courses visit our website:   https://careertechnology.co.in/

Hackers hacked Cryptocurrency site

Image
Official Monero Site Hacked to Distribute Cryptocurrency Stealing Malware Attackers hacked the official Monero project to spread cryptocurrency stealing malware instead of the legitimate Monero downloads. A cyberattack was confirmed by the website officials of the Monero cryptocurrency project on Monday, wherein attackers covertly replaced legitimate—and downloadable—Linux and Windows binaries with their malicious versions. A supply chain cyber-attack came in light after a Monero user spotted a mismatch in the cryptographic hash for binaries he downloaded from the official site. It didn't match the hashes provided by the software developers. A Monero user on Reddit claimed to have lost funds worth $7000 after installing the malicious Linux binary Following an immediate investigation, the Monero team said that its website, GetMonero.com, was indeed compromised. How it works? The malware gets triggered when a user opens or creates a new wallet. It is programmed to a...

SPT V0.6.0--> Phishing Toolkit

Image
SPT V0.6.0--> SPT is a simple concept with powerful possibilities. It is what its name implies: a simple phishing toolkit.  OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE:   + 91 8446503791 / +91 9004527361 For detail, courses visit our website:   https://careertechnology.co.in/

GOOGLE HACKING CAMERA (WITHOUT PERMISSION)

Image
News Bugs Lets Android Apps Access Camera without Permission An alarming security vulnerability has been discovered in several models of Android smartphones manufactured by Google, Samsung, and others that could allow malicious apps to secretly take pictures and record videos — even when they don't have specific device permissions to do so. The malicious app designed by the researchers was able to perform a long list of malicious tasks, including: Making the camera app on the victim's phone to take photos and record videos and then upload (retrieve) it to the C&C server. Pulling GPS metadata embedded into photos and videos stored on the phone to locate the user. Waiting for a voice call and automatically recording audio from both sides of the conversation and video from the victim's side. Operating in stealth mode while taking photos and recording videos, so no camera shutter sounds for alerting the user. Google confirmed and addressed the vulnerabi...

FATRAT--> BACKDOOR MAKER AND PAYLOAD BINDER

Image
FATRAT-- > FatRat is an easy-to-use Exploitation Tool that can help you to generate backdoors and post-exploitation attacks like browser attack DLL files. This tool compiles malware with popular payloads and then the compiled malware can be executed on Windows, Linux, Mac OS X, and Android. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE:   + 91 8446503791 / +91 9004527361 For detail, courses visit our website:   https://careertechnology.co.in/

HACKING PHONES WITH SINGLE TEXT

Image
1 BILLON PHONES COULD BE HACKED WITH SINGLE TEXT MESSAGE A major security vulnerability in the Android operating system has left a billion phones vulnerable to getting hacked , by a plain and simple text message. Researchers at cybersecurity firm Check Point identified the bug in Android-based phones, revealing that it only takes a single SMS text message to gain full access to a person’s emails. Around 2.5 billion devices around the world use Google-owned Android, which is the world’s most popular operating system. Any security issues, therefore, can have widespread consequences for users. The hack works by making use of a technique that mobile network operators use to update new phones joining their network, known as an OMA CP message. This would allow cybercriminals to view a person’s web history and read their emails . “ When the user receives an OMA CP message , they have no way to discern whether it is from a trusted source , ” said Mr. Makkaveev. “By clicking ‘acce...

ZARP--> Network Attacking Tool

Image
ZARP--> Zarp is a network attack tool centered around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker directly. OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE:   + 91 8446503791 / +91 9004527361 For detail, courses visit our website:   https://careertechnology.co.in/