Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack. The WannaCry ransomware is not dead yet and another large scale ransomware attack is making chaos worldwide, shutting down computers at corporates, power supplies, and banks across Russia, Ukraine, Spain, France, UK, India, and Europe and demanding $300 in Read more…

 1,961 total views,  190 views today

About Blueborne !

The latest Bluetooth vulnerability With the number of smart, connected devices on the rise, so are concerns about online privacy and security, especially with the spate of ransomware and other malware attacks dominating the headlines over the past year. Even as the world is trying to recover from the WannaCry Read more…

 374 total views,  33 views today

Microsoft Windows SMB Server Remote Code Execution Vulnerability ( CVE-2017-1178 )

Windows SMB Server Remote Code Execution Vulnerability ( CVE-2017-1178 ) October 10, 2017, Microsoft released the latest patch, one of the serious vulnerability patch release, the vulnerability for Microsoft’s Windows operating system SMB protocol remote code execution vulnerability, CVE number CVE-2017-11780. The vulnerability level is high. A number of system versions that Read more…

 90 total views,  12 views today

Critical Vulnerability In Skype

CyberSecurity Researcher Found Stack Buffer Overflow Vulnerability In Microsoft Skype Software Vulnerability Lab Security researcher Benjamin Kunj Mejri discovered a Stack Buffer Overflow Vulnerability in the official Microsoft Skype v7.2, v7.3.5.103 & v7.3.6 software. Technical Details & Description: A remote and local stack buffer overflow vulnerability has been discovered in Read more…

 294 total views,  12 views today

Tools Category

Pybelt – The Hackers Tool Belt

Pybelt – The Hackers Tool Belt Pybelt is an open source hackers tool belt complete with: A port scanner SQL injection scanner Dork checker Hash cracker Hash type verification tool Proxy finding tool XSS scanner It is capable of cracking hashes without prior knowledge of the algorithm, scanning ports on Read more…

 88 total views,  12 views today

Kadimus

Find & Exploit LFI Vulnerability     LFI Scan & Exploit Tool Kadimus is a tool to check sites to lfi vulnerability , and also exploit it Features: Check all url parameters /var/log/auth.log RCE /proc/self/environ RCE php://input RCE data://text RCE Source code disclosure Multi thread scanner Command shell interface through Read more…

 96 total views,  12 views today

Tools Category

HellRaiser

Vulnerability Scanner     Install Install ruby, bundler and rails. https://gorails.com/setup/ubuntu/16.04 Install redis-server and nmap. sudo apt-get update sudo apt-get install redis-server nmap Install the foreman gem. gem install foreman Clone HellRaiser repository, change to hellraiser web app directory and run bundle install and bundle exec rake db:migrate. git clone Read more…

 92 total views,  12 views today

A new mode used by Hackers for phishing

  PhishLabs security researchers have found a new way of phishing that allows hackers to use the phone-side URL address bar to lead the user into the phishing site. At present, this means has a lot of users in the mobile side of Facebook users have in the move. Researchers revealed that the new attack strategy Read more…

 56 total views,  6 views today

Tools Category

SigPloit

A Telecom Signaling Exploitation Framework – SS7, GTP, Diameter And SIP     SiGploit a signaling security testing framework dedicated to Telecom Security professionals and researchers to pentest and exploit vulnerabilities in the signaling protocols used in mobile operators regardless of the generation being in use. SiGploit aims to cover Read more…

 134 total views,  12 views today