Graduated? Sharing Your Cert Is Exciting — But Here’s a Risk You Should Know.
Introduction Graduation is exciting ! Not only that, Every examination is lots of hard work…
Introduction Graduation is exciting ! Not only that, Every examination is lots of hard work and celebration is natural. As a recent I have noticed that lots of recent graduates are sharing their degree certificate on LinkedIn. Also, I have seen that other professional certifications also shared in LinkedIn. Here my main focus is recent…
Think your saved Chrome passwords are secure? Think again! In this post, I’ll show you how easy it is to extract saved passwords and why you should NEVER rely on Chrome’s or any other browser based built-in password managers. Hackers can steal your credentials in seconds—without you even knowing! First of all we need to…
#Lumma Stealer is an #infostealer #malware sold on the dark web as malware-as-a-service. Cybersecurity researchers have recently discovered a new technique that Lumma Stealer is using. Essentially, the infection leverages compromised websites with fake CAPTCHA pages, tricking users into copying and pasting a Base64-encoded PowerShell command onto their own PCs. Here is the same concept…
SANS SIFT Digital Forensics VM is specifically designed for the digital forensics and incident respond. Here we are discussing how you can simply download this VM and install on your own environment with 100% free and get some hands-on experience with this. This VM is ubuntu based VM and you need to have some minimum…
Microsoft has released IMPORTNAT security updates on August 2024 Tuesday Patch updates. This fix includes 9 zero-days and 6 exploited vulnerabilities. Here are the six actively exploited vulnerabilities which include August patch update. This is showcasing how important the windows patch updates and looking at these vulnerabilities I can see sometimes, entire Windows System is…
This video tutorial is to demonstrate how you can use Wireshark to sniff credentials over Telnet. It’s just a proof of concept that Telnet is not secure. You can use this as a project you have done in your home lab environment and add it to your portfolio, GitHub, or resume. Please take notes while…
This is a something different tutorial which showcase how threat actors or anyone gain initial access via emails. But before go to that level we have to find out valid email address on the organization. This proof of concept is all about that and let’s see how we can do that. Best thing is these…
Unveiling Malware Collection Execution and User Exploitation (Passion Project) Introduction During my own research time I found a few malwares and decided to test them on my own.Interesting thing is I found these resources from the GitHub and YouTube, which means these are publicly available, Free, and accessible to anyone. I tried each individually and…
I found a Facebook page which is trying to distribute the malware among the users using hot AI news in the market. This is one of the common way that hackers use to distribute the malwares and some poor users think these are real and get use of it. When I see at the number…
What is Commando VM? CommandoVM, also known as Complete Mandiant Offensive VM, is a Windows-based security distribution designed for penetration testing and red teaming. It offers a wide range of offensive tools that are not typically found in Kali Linux, emphasizing the effectiveness of Windows as an attack platform. Requirements Windows 10 (Insider Preview editions…