The website was full of vulnerabilities from XSS, SQL injection, unsecured cookies, out-of-date SQL server, http transmitted login info, so hacking it wasn’t hard but how fast i would hack it?
BIG DATA CHALLENGES IN THE CLOUD
What is Big Data? A new generation of technologies and architectures, designed to economically extract insight from very large volume of data both structured and unstructured that leads to better decisions and strategic business moves. Most of the data that wants to be analyzed contains sensitive information, and that’s why it relates to us as security practitioners. The data is…
WannaCry: The Anatomy of a Sophisticated Ransomware Attack
“Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. “ Ransomware attack types may be from locking a user’s system to more advanced malware which it may encrypt users file and make them unable to read from the user and demand a…
My Cheat Sheet for Security, Hacking and Pentesting ebooks
I am often asked by other individuals and professionals about technical books I read and use when it comes to learning new hacking techniques and improving my hacking skills. I have created the following list for everybody to have access to it. Disclaimer: These are ebooks which are available online and i’m just sharing the name. The contributor(s) cannot be…
Cryptocurrency-Mining Malware: A new Business Model for Cyber Offenders
The growing popularity of Bitcoin and other cryptocurrencies is driving curiosity among the hackers. 2017 was the year of high profile breaches and ransomware attacks where as a result bitcoin had a tremendous price hike. Hackers launched global ransomware attacks where the payments were demanded in bitcoins Like many people, hackers on message board hack forums are trading tips on…
CTF::HacktheBox: Invite Code
How to approach it ? Hackthebox.eu doesn’t allow you to register. The only way to sign up is by having an insider to provide you with an invite code or hack your way in. I don’t have someone to provide me an invite code so I have to hack me way in. I start off by analyzing the source code…
How can a hacker steal your personal information on a public Wi-Fi ?
Intro Nowadays most of us use public Wi-Fi on daily basis, whether it is on our local coffee shop, school, or even at the airport. Today people have become addicted to the internet, and it is not just younger generations. Now even my father, who 5 years ago didn’t know what Facebook was, now everywhere we go, he wants to…