Posts

Find out what the Dark Web is and How you can access it ?

Image
 Dark Web is a World Wide Web content that exists on dark net ( network that use the internet but require a specific software ). Deep and Dark web are applications of integral internet features to provide privacy and anonymity. Is it safe to use Dark Web? A person with an ordinary knowledge about techy things should never go to Dark web because he will not be able to protect his own identity. Hackers are looking for such people who are noob. After getting into dark web they can steal your identity and use it for their work and it may be an illegal work too. And why you want to browse the dark web,there's no need. You may also get some virus in your device and your all data can be hacked in just few minutes. Difference between Deep Web and Dark Web- The deep web contains internet content you can't find through search engines, while the dark web is a hidden network that requires a special browser to access. Surface Web The portion of world wide web that is readily available to th...

Dumpster Diving

 The government's nodal agency CERT-In has warned against 'Dumpster Diving', which refers to fraudsters searching through a person or an organisation's trash to obtain sensitive or valuable information for malicious activities. It suggested using a shredder to destroy documents, installing security cameras or employing security personnel and disposing electronic devices properly to avoid misuse. What is dumpster diving? Dumpster Diving is a Physical Attack in which a person recovers trash in hopes of finding sensitive information that has been merely discarded in whole rather than being run through a shredder, incinerated, or otherwise destroyed. Technique A cyber attack where the attacker gets their hands on sensitive documents or data you carelessly threw into the trash bin. Solutions to it- ·        Know why someone target dumpsters on your property. ·        Light up the waste collection area. ·  ...

NETWORK SCANNING

  NETWORK Scanning ·        Network scanning refers to a set of procedures used for identifying hosts, ports and services in a network. ·        Network scanning is one of the components of intelligence gathering which can be used by an attacker to create a profile of the target organization. The purpose of scanning is to discover exploitable communications channel, probe as many listeners as possible, and track the ones that are responsive for an attacker’s particular needs. Types of scanning ·        Port scanning – Lists the open ports and services. ·        Network scanning – Lists the active hosts and services. ·        Vulnerability scanning – shows the presence of known weaknesses. SCANNING TOOLS ·        Nmap ·        Hping3 ·    ...

Password Hacking !!

  Password Cracking It is one of the most enjoyable hacks. The password cracking may not have a burning desire to hack the password of everyone. The actual password of the user is not stored in the well-designed password-based authentication system. Due to this, the hacker can easily access to user's account on the system. Types of Password Cracking ·        Non electronic: It doesn’t require technical knowledge. §   Social Engineering §   Shoulder Surfing §   Keyboard Sniffing §   Dumpster Diving ·        Active Online: An active attack is a network exploit in which a hacker attempts to make changes to data on the target. §   Dictionary attack §   Brute-Force attack §   Rule Based attack ·        Passive Online: A network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. ·  ...

All about Keyloggers!!

  A keylogger, sometimes called a keystroke logger, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Consider it as a threat because… Keyloggers are often used as a spyware tool by cybercriminals to steal personally identifiable information (PII), login credentials and sensitive enterprise data. Keylogger tools for windows ·        All in One ·        Elite ·        Spytector Keylogger tools for MacOS ·        sentryPC ·        FlexiSPY ·        REFOG Keylogger Keylogger tool for Linux - Logkeys Types of keyloggers 1.    Hardware Keylogger ·        It is a physical device that is used for capturing keystrokes ·        For hardware keylogger one must hav...

What is Steganography?

Image
It is the technique of hiding secret data within an ordinary, non-secret file or message in order to avoid detection; the secret data is then extracted at its destination. ·        Technical steganography ·        Linguistic steganography Types of steganography ·        Text : It includes hiding data within the text files ·        Image : It can hiding the information by taking the cover object as image is defined as image steganography. In image steganography, pixel intensities are used to conceal the data ·        Audio : Audio Steganography is the technology of embedding information in an audio channel ·        Video : In this method, video (set of pictures) can be used as carrier for hiding the information ·        Network Protocol : It includes hiding the info...

All about ROOTKITS in Cyber Security !!

Rootkit is a software program, typically malicious, that provides privileged, root level access to a computer while concealing its presence on that machine. Rootkit tools (popular ones) ·        Purple Fox ·        MoonBounce ·        TDSS Rootkit types ·        Hypervisor rootkit: It takes advantage of the hardware virtualization and is installed between the hardware and the kernel acting as the real hardware. ·        Kernel rootkit: Kernel Rootkits are specifically designed to attack the core of your operating system and change its functioning. ·        Bootloader rootkit: The bootloader rootkit attacks the legit bootloader and replaces it with the hacked one so that attackers could control the system boot. ·        Application rootkit: Application Rootkits re...