Beginners Guide To Metasploit
Metaspoilt can run on Linux, Mac OS X and on Windows. It is both a command line interface and a graphical user interface (GUI). The Metasploit Framework can be extendedRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Metaspoilt can run on Linux, Mac OS X and on Windows. It is both a command line interface and a graphical user interface (GUI). The Metasploit Framework can be extendedRead More →
Japan plan to develop a hack proof satellite system to protect transmissions between satellites and ground stations with a dynamic encryption of data. Japan’s Internal Affairs and Communications Ministry plansRead More →
Demo exploit is inexpensive, remote, scalable—and opens door to more advanced hacks. A new attack that uses terrestrial radio signals to hack a wide range of Smart TVs raises anRead More →
Scientists from two Israeli universities have come up with a way to use flatbed scanners as relay points when sending commands to malware installed on an air-gapped computer. Further researchRead More →
A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV,Read More →
The US Department of Justice announced yesterday that Maxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty for his role in the creation of the Ebury malware and for maintainingRead More →
Redmond pledges to defend users against government hacks. Microsoft is one of the companies that brought the US government to court for data request orders which it claimed violated theRead More →
APT29, a/k/a Cozy Bear, has been utilizing a technique called domain fronting in order to secure backdoor access to targets for nearly two years running, experts said Monday. The nation stateRead More →
Short Bytes: The DIY tech inventor NODE has created a handheld all-in-one computer that runs Linux. It’s made using the new Raspberry Pi Zero W, some 3D printed parts, and anRead More →
Recently I started playing with the awesome PowerUpSQL tool by guys at NetSPI. I was interested in the ability to attack an Active Directory (AD) environment using access to aRead More →