Posts

How to start Bug Hunting?

Image
1. First of all, you need to understand what is Bug Bounty and why it is done? A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those about exploits and vulnerabilities. 2.Some Books online books for Bug Bounty!!! There are some books for Web application penetration testing methodology and hunting the web. Through this, you learn the basics and essentials of penetration testing and bug hunting. The Web Application Hacker’s Handbook OWASP Testing Guide Highly suggested by Bugcrowd’s Jason Haddix Penetration Testing The Hacker Playbook 2: Practical Guide to Penetration Testing The Tangled Web: A Guide to Securing Web Applications Jhaddix Bug Hunting Methodology The Hacker Playbook-3 Ethical Hacking and Penetration Guide Web Penetration Testing with Kali Linux Here are some mobile application for Bug Hunting The Mobile Applicatio...

Amazon Alexa witnesses for Murder Case

Image
The case took place in Florida between the husband and wife. There was fight The man is 43-year old Adam Crespo. The woman was 32-year old Sylia Galva Crespo. The man in Florida has a spat with his wife after a night out at home. The couple argues and fight and she is somehow "speared to the chest" during the altercation. dies after heavily bleeding from the wound. The man is charged with second-degree murder but denies having killed her. There was no one else who saw or heard the whole thing while it happened. Or there was? There was someone, or rather something that may have heard it. We are talking about the Amazon Echo devices in the house which the police think may have listened to parts of an altercation that may give a clue to the cause of the woman's death. he died from a fatal wound to the chest by a spear at home in Hallandale Beach, Florida in July. As per a report by the Sun-Sentinel, the police think that the Amazon Echo smart devices may have re...

Hacking Competition for hackers

Image
A piece of good news for hackers to test their skills in the hacking world legally and win prizes by government  The Tamil Nadu police have turned to teenagers to take on cybercriminals . Around 200 college students and young professionals will take part in a hackathon at the state police headquarters on Saturday and the best among them will get to assist the cops. There’s prize money too for the winners. The first prize comes with RS 50,000 the two-second prize are worth RS 25,000 each and the three third prizes Rs 10,000 each. State police chief J K Tripathy will hand over cyber-volunteer badges to the winners in various categories. The badges will give them access to the Rs 3.24 crore Cyber Arangam that the government has set up at IIT-M’s research park. This facility, modeled on the Kerala police’s cyber-dome in Thiruvananthapuram, is to be the nerve center of the police’s cyber-dome in Thiruvananthapuram, is to be the nerve centre of the police’s operations to root o...

Malicious SDKs Caught Accessing Facebook and Twitter Users Data

Image
SDKs are known as a software development toolki t. SDK is a software library that app developers embed in their code to automate certain operations, spare themselves from writing that specific code by hand and losing precious time. SDKs are very popular in the modern app development ecosystem, but using an SDK also implies surrendering some of your app's control to a third-party entity. Two third-party software development kits (SDKs) integrated by hundreds of thousands of Android apps have been caught holding unauthorized access to user's data associated with their connected social media accounts. The two big social media platform i.e Twitter and Facebook disclose and released a statement revealing that an SDK from another company, Mobiburn have some malicious activity that might have exposed its users connected with certain Android apps to data collection firms. TWITTER On Monday, November 25, Twitter disclosed that they've received a report about an SDK...

Russia Join India for Cyber Security Cooperation

Image
After the cyberattack on Kudankulam NPCIL India informed Russia about this attack Russia. Deputy Chief of Mission of the Russian Embassy Roman Babushkin has said Nuclear Power Corporation of India Limited has informed Russian authorities that the plant is safe and additional steps have been taken to enhance its security further. India and Russia have stepped up their cybersecurity cooperation in the backdrop of cyber-attack on the Kudankulam nuclear power plant built by global nuclear major Rosatom. The two sides have a vibrant cybersecurity partnership. On the BRICS summit in Brasilia , Babushkin said ways to deal with the challenge of terrorism will be a focus area, and referred to setting up of a number of working groups to deal with terror financing and transnational crimes. He also said that issues like the situation in Kashmir and Xinjiang in China are unlikely to figure in the deliberations at the summit. Babushkin said Moscow has been focusing on ensuring that ...

Nuclear Power Corporation of India under cyber attack

Image
NPCIL accepts a Cyberattack on Kudankulam Cybercriminals targetted the Nuclear Power Corporation of India Ltd (NPCIL). The NPCIL on Wednesday accepted a cyberattack on its system after issuing a denial on it a day ago. A statement issued by NPCIL on Wednesday in which they said. "Identification of malware in the NPCIL system is correct. The matter was conveyed by CERT-In when it was noticed by them on September 4, 2019,". " The matter was immediately investigated by DAE (Department of Atomic Energy) specialists. The investigation revealed that the infected PC belonged to a user who was connected to the internet-connected network for administrative purposes. This is isolated from the critical internal network ," it said adding the networks are being monitored continuously. The statement said that the plant systems were not affected by the malware. On Tuesday, the company had denied cyber attack on its Kudankulam Nuclear Power Plant, one of the county...

PROBELY--> Vulnerability Scanner (WEB APPLICATION)

Image
PROBELY--> Probely continuously scans for vulnerabilities in your Web Applications. It allows its customers to manage the life cycle of vulnerabilities and provides them with some guidance on how to fix them.   OUR COURSES: ETHICAL HACKING PENETRATION TESTING BUG BOUNTY FORENSIC INVESTIGATION CYBR CRIME INVESTIGATION ISO 27001 LA/LI CONTACT US FOR MORE DETAILS: PHONE:   + 91 8446503791 / +91 9004527361 For detail, courses visit our website:   https://careertechnology.co.in/