Posts

Showing posts from October, 2017

Malware Found Preinstalled on Dozens of Android Phones

Malware has been discovered preinstalled on 36 Android phones belonging to two companies, security software maker Check Point reported on Friday. Malware Found Preinstalled on Dozens of Android Phones "In all instances, the malware was not downloaded to the device as a result of the users' use -- it arrived with it," noted Oren Koriat, a member of Check Point's Mobile Research Team. The malicious apps on the phones of a telecommunications company and a multinational technology business were not part of the official ROM supplied by the vendor, he explained. They were added somewhere along the supply chain. Six of the malware instances were added by a malicious actor to the device's ROM using system privileges, meaning they couldn't be removed by the user and the device had to be re-flashed, Koriat added. Most of the preinstalled malware consisted of information stealers and rough ad networks, he said. Included in the malicious software array was Slock

Petya's Ransomware Cloaking Device

Recent ransomware threats have escalated into a global crisis, and cybersecurity experts and government authorities have redoubled their investigative efforts. Of grave concern is the possibility that the recent Petya attack had more sinister motives than typical ransomware operations, and that state actors were involved behind the scenes. The Petya attack -- which disrupted major government agencies, infrastructure sites, multinational companies and other organizations -- actually used the cover of a ransomware attack to deploy a more malicious exploit, called a "wiper," that paralyzed thousands of computers and destroyed data in dozens of countries around the world, some leading cybersecurity experts have concluded. The National Cyber Security Centre, which operates within the UK's GCHQ intellligence agency, late last month raised questions about the motives behind the attack, saying it had found evidence that questioned initial judgments that collecting ransoms wa

Investigate the Investigator Walkthrough

Image
Hello, guys !!! Today I'm bringing some interesting topic to you. That is Investigate the Investigator Walkthrough. Let's see how to break this CTF box. Bypass the grub of the Virtual Machine and get the final on desktop Analyze the packets at Pcaps in the desktop and Retrieve Flag2 by file header analysis and identify the dictionary for the Brute-forcing Analyze pacap2 and identify the username and the IP addres for the brute force Session Bypass and log in as manager user   Decrypt the Chiper text and log in to the next level Dump the database and retrieve the final flag at the user

DNS cache poisoning

Hello, guys !!! Today I'm bringing some interesting topic to you. That is DNS cache poisoning. Let's talk about the DNS cache poisoning. Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system tables by replacing an Internet address with that of another, rogue address. When a Web user seeks the page with that address, the request is redirected by the rogue entry in the table to a different address. At that point, a worm, spyware, Web browser hijacking program, or other malware can be downloaded to the user's computer from the rogue location. Cache poisoning can be transmitted in a variety of ways, increasing the rate at which rogue programs are spread. One tactic is the placement of compromised URLs within spam e-mail messages having subject lines that tempt users to open the message (for example, "Serious error on your tax return"). Images and banner ads wi

ByPass the Windows OS Logins

Image
Hello, guys !!! Today I'm bringing some interesting topic to you. That is bypass the passwords in windows OS. Let's talk about that. Bypass Windows Login Password with Command Prompt In my computer has one admin account and there is no password on that account. If it means Windows 7 built-in administrator has been enabled and its password has not been set, now we can bypass our Windows 7 login screen-free with using command prompt in safe mode. In windows 7 computer, there are 3 different types of safe modes to choose, safe mode, safe mode with networking and safe mode with command prompt. In order to make full use of command prompt to bypass Windows login password, we just could select the third one. Restart your Windows 7 computer and hold on pressing F8 to enter Advanced Boot Options. Choose safe mode with command prompt in the coming screen and press enter. In pop-up command prompt window, type net user and hit Enter. Then all Windows 7 user accounts wou

Mobile Application Security

Image
Hello, guys !!! Today I'm bringing some interesting topic to you. That is Mobile Application security. Let's talk about the Mobile Application security. Mobile Application Security states to the enforcement of access and data protection measures for individual apps. For examples of such application security policies include data encryption, mobile app VPN, authentication, and data wipe. These security policies and others can be applied during application development, later with software development kits (SDKs), or after the app is compiled with application wrapping. Let's See what are the Mobile Application security policies in the industry. Corporate Authentication – Dynamically requires users to enter their corporate credentials before the application will open. This utilizes our enterprise integration for single sign-on (SSO). Data-at-Rest Encryption – Secures data stored by the application without having to encrypt the entire device. The entire application