The Evolution of Hacking and Security – From Bindshells to Reverse Shells

So, if you read my previous post on what hacking was like in the mid 90’s to early 2000’s this post will be basically the polar opposite. The hacking game has drastically changed, the old wild wild west version of the internet has turned into cities and suburbs where hacking still takes place but there … Read more The Evolution of Hacking and Security – From Bindshells to Reverse Shells

Detailed Analysis of the processes and stages of an Exploit Kit – Java and IE exploited by Flashpack Web Based Kit

Here you can see the webpage that the hackers exploited (arksylhet.com/A67iD4eo/index.html) and inserted within that page an iframe which includes a link to a Javascript Redirect file 2012-09-18 22:41:42.001035 IP 192.168.106.131.1411 > 92.43.108.70.80: Flags [P.], seq 1:395, ack 1, win 64240, length 394 E…*.@…….j.\+lF…P7_Z.X.X.P….?..GET /Lk1SsGQm/js.js HTTP/1.1 Host: web63.server77.publicompserver.de User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; … Read more Detailed Analysis of the processes and stages of an Exploit Kit – Java and IE exploited by Flashpack Web Based Kit

Malware Has Not Gone Away Like Some People Think

Cyber Security Analysts and Specialist alike have noticed a significant downward trend in the number of infections being reported. This doesn’t mean that the Crimeware bosses have packed up shop and gone legit. There are many contributing factors to the current number of infections. Reviewing many of the largest security solution providers logs and examining … Read more Malware Has Not Gone Away Like Some People Think

NTFS file system: understanding resident and non-resident files for Computer forensics – Cyber Security Video

This is the first video of the Computer forensics course (tutorial) at Duckademy. To do computer forensics, understanding the NTFS file system and the inner workings of resident and non-resident files is a must. To DOWNLOAD the evidence files and the commands used in the video go to http://www.duckademy.com The goal of the Computer forensic … Read more NTFS file system: understanding resident and non-resident files for Computer forensics – Cyber Security Video

Windows Password Resetter Recovery for Windows NT, 2000, VISA, XP, 7, 8 and 8.1

How to Recover a Locked Computer Password and Regain Access in Under 5 Minutes. Support for Windows NT, 2000, Vista, XP, 7 (all Editions) and Windows 8 / 8.1 If you’ve ever forgotten your computer password, you’ll know how frustrating it can be. No emails, no internet and no files – in fact, no nothing, … Read more Windows Password Resetter Recovery for Windows NT, 2000, VISA, XP, 7, 8 and 8.1

BLACKHAT BLACK HAT 2016 LAS VEGAS USA – INVESTIGATING DDOS – ARCHITECTURE, ACTORS, AND ATTRIBUTION

INVESTIGATING DDOS – ARCHITECTURE, ACTORS, AND ATTRIBUTION Andre Correa  |  Co-Founder, Malware Patrol – malwarepatrol.net Elliott Peterson  |  Special Agent, Federal Bureau of Investigation Location:  Mandalay Bay EF Date: Thursday, August 4 | 11:00am-11:50am Format: 50 Minute Briefing Tracks: Network Defense Internet of Things   DDOS attack usage has been accelerating, in terms of both attack volume and frequency. Such … Read more BLACKHAT BLACK HAT 2016 LAS VEGAS USA – INVESTIGATING DDOS – ARCHITECTURE, ACTORS, AND ATTRIBUTION

Massive Distributed Reflection Denial of Service (DrDoS) DoSNETs for hire – NTP, Chargen, SNMP, SSDP, DNS

DDoS attacks with a few thousand infected windows PCs SYN flooding a network have been taking a back seat to the next generation of Denial of Service attacks, known as Distributed Reflection Denial of Service (DrDoS) attacks. A packet kiddie doesn’t even need to compromise servers and PCs anymore to launch an attack. Many of … Read more Massive Distributed Reflection Denial of Service (DrDoS) DoSNETs for hire – NTP, Chargen, SNMP, SSDP, DNS