Category Archives: Uncategorized

IBM IMPROVES ITS SECURITY AND PROHIBITS THE USE OF USB DRIVES THROUGHOUT THE COMPANY

IBM recently banned all removable storage, throughout the company; this is a new policy that aims to avoid financial and reputational damage from a lost or misused USB drive. Shamla Naidoo, IBM’s chief information security officer, told staff in an internal email … Continue reading

Posted in Uncategorized | Leave a comment

TOOL TO PERFORM BRUTE FORCE ATTACKS ON SSH, SMTP, FACEBOOK AND INSTAGRAM- BRUT3K1T

As an introduction, brut3k1t is a bruteforce module on the server side that supports dictionary attacks for various protocols, information security experts say. Some of the current protocols that are complete and compatible are: ssh ftp smtp XMPP instagram Facebook There will … Continue reading

Posted in Uncategorized | Leave a comment

HOW TO MAKE A SUBDOMAIN TAKEOVER ATTACK

A team of information security experts tells us that sub-domain acquisition vulnerabilities happen whenever a subdomain points to a service (for example, GitHub pages, Heroku, etc.) that has been removed or removed. This may allow an attacker to configure a … Continue reading

Posted in Uncategorized | Leave a comment

HOW TO HACK ANY CAR WITH THIS TOOL

First we will see the topics that will be covered by the information security experts in this test / course of auto hacking: Configuration of virtual environments for tests, Sniffing CAN Traffic, Analyzing CAN Traffic, Inverse Engineering CAN IDs, Denial … Continue reading

Posted in Uncategorized | Leave a comment

HACK ANY WIRELESS NETWORK USING ALL IN ONE TOOL: HIJACKER

To begin with, the experts explain that Hijacker is a graphical user interface for the penetration test tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. This application offers a simple and easy user interface to use the tools without writing commands in … Continue reading

Posted in Uncategorized | Leave a comment

TRUSTJACKING ATTACK ALLOWS HACKERS TO HACK IOS DEVICES

Symantec professionals have found a vulnerability that could allow hackers to compromise iOS devices without the owner’s knowledge. This iOS attack named as “Trustjacking” by information security researchers exploits a vulnerability in iTunes Wi-Fi Sync, a special feature that allows iOS devices … Continue reading

Posted in Uncategorized | Leave a comment

JSHIELDER AUTOMATED HARDENING SCRIPT FOR LINUX SERVERS

JSHielder is an Open Source tool developed to help SysAdmin and developers secure their Linux Servers in which they will be deploying any web application or services. According to information security experts this tool automates the process of installing all the necessary … Continue reading

Posted in Uncategorized | Leave a comment