InfoSec Write-ups - Medium-- A somewhat detailed write-up of a thing I did 4000 YEARS AGOto know how I got the price down from ₹80 to ₹1, we need to go back a few monthsThe 3rd of May 2020 “Lockdown Day 40”, inside the campus where I stayed at the time, in Gachibowli, Hyderabad. That night, after … Continue reading HOW I HACKED YOUR VENDING MACHINE
How To Hack: Jerry From HackTheBox
InfoSec Write-ups - Medium-- My Journey On Achieving The OSCP CertificationContinue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
How to Use Linux Smart Enumeration to Discover Paths to Privesc
Null Byte « WonderHowTo-- Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into … Continue reading How to Use Linux Smart Enumeration to Discover Paths to Privesc
Master AWS with This Extensive $30 Training Bundle
Null Byte « WonderHowTo-- Cloud computing has come a long way since the days of simple online storage and server networking. Virtually every major company in the world now relies on complex cloud computing infrastructures to reach customers, innovate products, and streamline communications. Their reliance on advanced cloud computing platforms is only going to grow … Continue reading Master AWS with This Extensive $30 Training Bundle
SpaceSiren – A Honey Token Manager And Alert System For AWS
KitPloit - PenTest Tools!-- SpaceSiren is a honey token manager and alert system for AWS. With this fully serverless application, you can create and manage honey tokens at scale -- up to 10,000 per SpaceSiren instance -- at close to no cost.1How It WorksSpaceSiren provides an API to create no-permission AWS IAM users and access … Continue reading SpaceSiren – A Honey Token Manager And Alert System For AWS
How to keep K–12 distance learners cybersecure this school year
Malwarebytes Labs-- With the pandemic still in full swing, educational institutions across the US are kicking off the 2020–2021 school year in widely different ways, from re-opening classrooms to full-time distance learning. Sadly, as schools embracing virtual instruction struggle with compounding IT challenges on top of an already brittle infrastructure, they are nowhere near closing … Continue reading How to keep K–12 distance learners cybersecure this school year
LOLBITS v2.0.0 – C2 Framework That Uses Background Intelligent Transfer Service (BITS) As Communication Protocol And Direct Syscalls + Dinvoke For EDR User-Mode Hooking Evasion
KitPloit - PenTest Tools!-- LOLBITS is a C2 framework that uses Microsoft's Background Intelligent Transfer Service (BITS) to establish the communication channel between the compromised host and the backend. The C2 backend is hidden behind an apparently harmless flask web application and it's only accesible when the HTTP requests received by the app contain a … Continue reading LOLBITS v2.0.0 – C2 Framework That Uses Background Intelligent Transfer Service (BITS) As Communication Protocol And Direct Syscalls + Dinvoke For EDR User-Mode Hooking Evasion
Cisco Alerts About IOS XR Zero-Day Under Active Exploitation
Latest Hacking News-- Cisco has recently disclosed a zero-day IOS XR flaw that has caught the attention of criminals. While patches are in Cisco Alerts About IOS XR Zero-Day Under Active Exploitation on Latest Hacking News. View original article on Latest Hacking News
Microsoft Warns Of Another ‘Anubis’ Malware Targeting Windows
Latest Hacking News-- Microsoft recently warned of a new malware targeting Windows systems. Also dubbed Anubis, this Windows malware is not related to Microsoft Warns Of Another ‘Anubis’ Malware Targeting Windows on Latest Hacking News. View original article on Latest Hacking News
SS7 Attack Panel: Yet Another Rising SCAM on Social Media
InfoSec Write-ups - Medium-- Note: The primary aim of this article is not to pinpoint any individual SCAM, but to shed light on the methods adopted by Scammers/Attackers which peddles the Scam Business. Here, a Real-Life Use Case of SCAM is selected to provide detailed insight!SS7 (Signalling System #7) is an interesting field where newbies often … Continue reading SS7 Attack Panel: Yet Another Rising SCAM on Social Media







