Hot Topics
Vawtrak Uses Tor2Web -

Vawtrak, also known as Neverquest, is a banking trojan that is capable of bypassing 2FA (two factor authentication). 

2 days ago | 0
Hiding secret messages in images with steganography and metadata -

Steganography is the practice of concealing a file, message, image, or video within another file, message, image,. 

5 days ago | 0
Silk Road wasn’t even close to the biggest drug market on the internet -

The largest online narcotics emporium in the world surpassed its most famous competitor, Silk Road, just one year. 

1 week ago | 0

Vawtrak Uses Tor2Web

By Blog | On Fri, Jul 3rd, 2015 - No Comments »
tor2web-logo

Vawtrak, also known as Neverquest, is a banking trojan that is capable of bypassing 2FA (two factor authentication) on some financial institutions. It is also one of your typical information stealer. One of the main strengths of Vawtrak is its use of layering techniques within its code. Within its layers, Vawtrak employs different armoring strategies such as Anti-Emulator, Anti-Debugger,. 

USA Network’s Mr. Robot – Review from a hacker’s point of view

Mr-Robot-3

There are some things that bother me about our society… primarily strong disappointments that defeat my expectations for how we should behave as a total. For example, Steve Jobs is admired when he made billions off the back of children, and our cultural icons such as Bill Cosby, Lance Armstrong, and Tom Brady are basically counterfeits with little to no real depth of character and admirable. 

Hiding secret messages in images with steganography and metadata

By Aamir Lakhani | On Tue, Jun 30th, 2015 - No Comments »
encode-secret

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos, meaning ‘covered, concealed, or protected’, and graphein, meaning ‘writing’. The first recorded use of the term was in 1499 by Johannes Trithemius in Steganographia, a treatise on cryptography. 

Silk Road wasn’t even close to the biggest drug market on the internet

By Blog | On Thu, Jun 25th, 2015 - No Comments »
deep-web

The largest online narcotics emporium in the world surpassed its most famous competitor, Silk Road, just one year after launching. The site is now the biggest online black market to ever operate on the dark web. Agora launched in September 2013 as a marketplace for illicit goods accessible via the anonymous browser, Tor. Read more: http://www.businessinsider.com/silk-road-wasnt-even-close-to-the-biggest-drug-market-on-the-internet-2015-6#ixzz3e75yW4bn  

Make Spammers Pay You with write.io

By Aamir Lakhani | On Tue, Jun 9th, 2015 - Comments Off on Make Spammers Pay You with write.io
delete spam button

What if you had to pay to send every email? Would you think twice about what you send? Would it change the content or the clarity of the message? Do you think charging money to send email would reduce SPAM and other unwanted email? Financial consequences, even minor ones, usually adds incredible efficiency on how people behave or think. For example, how often do you buy stamps? A few years. 

Entourage Movie Review – The Boys Are Back!

By Aamir Lakhani | On Mon, Jun 8th, 2015 - Comments Off on Entourage Movie Review – The Boys Are Back!
entourage-cast

The following review contains spoilers for Entourage The Movie I am a little tired of movies ending in an ambiguous way just so the studio can set up a sequel that may or may not ever happen…and typically disappoints if it does. It actually felt like cheap shots when I reflect back on how a few season-ending danglers were done in long-running TV series such as Dexter, The Sopranos, and. 

Breaking SSH, VNC, and other passwords with Kali Linux and Hydra

hydra

Hydra is a very fast and effective network login cracker. It will help you perform brute force attacks against SSH servers, VNC, and other services. When you launch Hydra it will launch the GUI in Kali, however in this tutorial we will use xHydra, which is the command line version of the tool. The command line version of the tool gives you much for flexibility in how to use the tool. Wordlists This. 

Cyber Threat Summary Week of June 1st

By Blog | On Wed, Jun 3rd, 2015 - Comments Off on Cyber Threat Summary Week of June 1st
security_0

IoT Devices Entering Enterprises, Opening Company Networks To Attacks  OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses.Using anonymized data from the billions of Internet requests routed through OpenDNS’s global network daily, the report details. 

VMware PowerCLI – Add VSwitch And VPG’s

By Blog | On Mon, Jun 1st, 2015 - Comments Off on VMware PowerCLI – Add VSwitch And VPG’s
AutomationBlog

My buddy Travis Newshott over a TechFud posted an excellent article on VMware PowerCLI. As should be apparent by now, I am a fan of automating any repetitive tasks, or even large one time tasks, if you can remove most of the human error potential. In 2014 I built a large Cyber Range for a major systems integrator, and this involved working on a fairly decent sized vCenter cluster with 9. 

Bug will Crash every Apple iOS Device right now

crazy_apple-4126

An iOS bug has been uncovered that allows potential attackers to send specific rendered text messages that in turn cause Apple iOS devices to crash. It specifically affects iOS version 8.3. When the victim receives the text message, the device either crashes or reboots. In some cases, the message application is only affected and continues to crash even after the device reboots.  Many users.