Browsed by
Author: avishek

Red Teaming vs VAPT and Introduction

Red Teaming vs VAPT and Introduction

A Red Team is an independent group that challenges an organization to improve its effectiveness by assuming an adversarial role or point of view. Red teaming is typically employed by organizations with more mature or sophisticated security postures (but that isn’t necessarily always the case). Having already done penetration testing and patched most vulnerabilities, they’re now looking for someone to come in and try again to access sensitive information or breach the defenses — in any way they can, from many different…

Read More Read More

Mobile OWASP Top 10 (2016) : Android

Mobile OWASP Top 10 (2016) : Android

ANDROID Android is the name of the operating system used on many smartphones and tablets. It is owned and maintained by Google. Google bought Android in 2005 and launched it for phones and tablets in 2007, the same year Apple released the first iPhone. An operating system is basically what appears on the screen on a touchscreen device – the underlying software that you interact with. This is different to apps you can download to use for it like you…

Read More Read More

Updates 53 Vulnerabilities Patched in Microsoft Releases

Updates 53 Vulnerabilities Patched in Microsoft Releases

Microsoft released Security patch for 53 Vulnerabilities in July 2018. So if you are not running an updated system go an update as fast as possible. Users are strongly advised to apply security patches as soon as possible to keep hackers and cybercriminals away from taking control of their computers. These vulnerabilities are so deadly. It will create a bad impact on your system. Affecting Products 1) Windows 2) Internet Explorer (IE) 3) Edge 4) ChackraCore 5) NET Framework 6)…

Read More Read More

RED TEAMING

RED TEAMING

What is the Red Team? A Red Team assessment is an authorized, adversary-based assessment for defensive purposes, performed by an interdisciplinary team of professionals. It includes 1)OSINT(Open Source Intelligence) 2)Reconnaissance 3)Footprinting: System, Network, and Services. 4)Footprinting online presence of people. 5)Developing attack vector 6)Developing exploit to gain access. 7)Escalate privileges 8)Social engineering 9)Developing backdoor REPORT AND QUERY SOLVED!! After performing these steps the red team will provide the extensive report to detail the problem areas. Where the issues are and…

Read More Read More

NEW ATTACK AGAINST LTE NETWORK PROTOCOL

NEW ATTACK AGAINST LTE NETWORK PROTOCOL

LTE ATTACK If you are using 4G network mobile phone carrier also known as LTE, you need to beware of your network communication that can be remotely hijacked. The researcher’s team has discovered some critical weakness in the ubiquitous LTE mobile device standard that could allow HACKERS to SPY on users cellular networks. They can re-route to the malicious website and even modify the content of their communication. Evolution LTE Long Term Evolution, used by millions of people this is…

Read More Read More

WHAT IS BLOCKCHAIN AND THEIR PROBLEMS

WHAT IS BLOCKCHAIN AND THEIR PROBLEMS

BLOCK CHAIN A blockchain is a chain of a block that contains information. This technique was originally discovered in 1991 by a group of teachers and it was originally intended to timestamps digital documents. so it is not possible to tamper with them. A blockchain is a distributed ledger completely open to anyone they have an interesting property one the data has been recorded inside the blockchain it becomes very difficult to change it. It is a structure of data…

Read More Read More

What is CRYPTO CURRENCY AND HOW HACKER STEAL YOUR BITCOIN

What is CRYPTO CURRENCY AND HOW HACKER STEAL YOUR BITCOIN

Cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify the transaction. Cryptocurrencies are limited entities in a database that no one can change unless the specific condition is fulfilled. HISTORY Early 2009, an anonymous programmer or a group of programmer under an alias Satoshi Nakamoto introduced Bitcoin. Satoshi described it as a ‘peer-to-peer’ electronic cash system. Crypto is completely decentralized, meaning there are no servers involved and…

Read More Read More

DON’T BE THE DOCTOR THAT LOSSES HIS PATIENTS DATA

DON’T BE THE DOCTOR THAT LOSSES HIS PATIENTS DATA

What Is HIPPA? HIPPA (Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information. A US law designed to provide privacy standards to protect patients’ medical records and other health information provided to health plans, doctors, hospitals and other healthcare providers. Developed by the Department of Health and Human Services, these new standards provide patients with access to their medical records and more control over how their…

Read More Read More

WPA3 NEW WIFI SECURITY PROTOCOL

WPA3 NEW WIFI SECURITY PROTOCOL

What is WPA3 and Why we need it? WPA 3 is a new WIFI Security Protocol. We need this security protocol because we are using WPA 2 since 2004 and now the internet is growing too much we also need to maintain our security level in the year 2017 October new vulnerability arises KRACKS (Key Reinstallation Attack) KRACKS Main insecurity issue of WPA2 is given by “unencrypted open Wi-Fi networks” that make it incredibly easy for anyone who uses the…

Read More Read More

WHAT IS OWASP TOP 10 WHY IT IS IMPORTANT FOR ETHICAL HACKERS!

WHAT IS OWASP TOP 10 WHY IT IS IMPORTANT FOR ETHICAL HACKERS!

OWASP:-OPEN WEB APPLICATION SECURITY PROJECT is an open community dedicated to enabling the organization to develop, purchase, and maintain application and APIs that can be trusted. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. It is a non-profit entity. The OWASP update his checklist in the span of 4 years. Before moving to OWASP TOP 10 2017 we have to know about OWASP TOP 10 2013. So this is the…

Read More Read More