What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
ZDNet.webp 2018-08-17 08:49:00 \'Hacky hack hack\': Teen arrested for breaking into Apple\'s network (lien direct) Updated: The Apple fan allegedly managed to download roughly 90GB in corporate documents as well as access customer accounts. Hack
CSO.webp 2018-08-16 02:56:00 Hack mobile point-of-sale systems? Researchers count the ways (lien direct) Ever since the infamous and massive security breach at retailer Target nearly five years ago, more and more attention has focused on the potential flaws that can make payment systems vulnerable to digital attack.And now, with payments increasingly shifting to mobile platforms, it appears that the potential for hacking the mobile point-of-sale (mPOS) systems that make it possible for merchants to accept card and even cryptocurrency payments on-the-go is also shifting.[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ] Presenting at the Black Hat USA information security conference last week in Las Vegas, prominent U.K. security researchers showcased recent research detailing the inherent vulnerabilities they discovered among four of the most popular mPOS systems operating in both the United States and Europe. In what is believed to be the most comprehensive review of mPOS security to-date, security researchers from London-based Positive Technologies plumbed the inner workings of the mobile payment infrastructure of seven mPOS readers offered by Square, SumUp, PayPal and iZettle and found a host of potential ways to hack these systems. Hack ★★
The_Hackers_News.webp 2018-08-15 12:00:05 Widespread Instagram Hack Locking Users Out of Their Accounts (lien direct) Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts. A growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to Hack
ZDNet.webp 2018-08-15 07:17:05 Instagram hack is locking hundreds of users out of their accounts (lien direct) Recovery options are being changed to .ru addresses by an unknown threat actor. Hack Threat
CSO.webp 2018-08-15 03:00:00 Why you should consider crowdsourcing IT security services (lien direct) A crucial part of securing IT infrastructure, applications and services is asking independent white hat hackers to hack it. Hackers will try to break in regardless, so you might as well be part of the process to maximize the benefits. Unfortunately, not every company has the resources to hire a penetration testing team. [ Find out how to do penetration testing on the cheap ... and not so cheap. | Get the latest from CSO by signing up for our newsletters. ] Hack ★★
BBC.webp 2018-08-14 16:39:01 Instagram hack sees accounts replaced with film stills (lien direct) Affected account holders are seeing random film stills replacing their profile photos. Hack ★★★★★
Chercheur.webp 2018-08-13 00:28:01 FBI Warns of \'Unlimited\' ATM Cashout Blitz (lien direct) The Federal Bureau of Investigation (FBI) is warning banks that cybercriminals are preparing to carry out a highly choreographed, global fraud scheme known as an "ATM cash-out," in which crooks hack a bank or payment card processor and use cloned cards at cash machines around the world to fraudulently withdraw millions of dollars in just a few hours. Hack
WiredThreatLevel.webp 2018-08-12 20:00:00 A Clever Android Hack Takes Advantage of Sloppy Storage (lien direct) The so-called man in the disk attack uses Android's permissive external storage to wreak havoc on devices. Hack
Blog.webp 2018-08-12 16:35:03 Hack the ch4inrulz: 1.0.1 (CTF Challenge) (lien direct) Hello readers and welcome to another CTF challenge. This VM is made by Frank Tope as you'll see in the very homepage on the server's website (his resume). Nice touch, if I might add. Anyhow, you can download this VM from vulnhub here. The aim of this lab is to get root and read the... Continue reading → Hack
Blog.webp 2018-08-11 11:54:04 Hack the Wakanda: 1 (CTF Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as Wakanda and it is another capture the flag challenge provided for practice. So let's try to break through it. But before please note that you can download it from here. Security Level: Intermediate Flags: There are three flags (flag1.txt, flag2.txt, root.txt) Penetrating... Continue reading → Hack
TechWorm.webp 2018-08-11 11:09:04 How to Grow Your Followers on Instagram (lien direct) Instagram outgrew its first impression as a fun app for kids quite fast and has become a pretty serious tool for audience building, networking and content marketing for individuals and brands alike. It's quickly becoming one of the most popular sites for social networking on the planet with more than 200 million active users logging in every month and actively sharing over 60 million images, generating up to 1.6 billion likes daily. Engagement rates for the other social networks for brands are less than 0.1 percent but Instagram blows this all the way up, with an average extending up to an epic 58 times higher than on Facebook. Whether you're a huge brand seeking to get more new followers or still at the developing stages seeking to create prospective customers base out of target audiences, the following are 3 of the most powerful tips you can employ to become an Instagram unicorn.   Invest in a Complete and Curated Instagram Aesthetic Profile If you wish to get more followers today, you need to pay closer attention to what your Instagram feed looks like. Your Instagram business profile is the first opportunity you get to make an amazing first impression and entice people to hit the follow button. By creating a consistent brand story through your Instagram profile and aesthetic, you can transform the casual visitors into engaged and devoted followers. Therefore, you can start using Instagram bot it assists to get more authentic followers. The fact that Instagram is becoming a go-to for consumers to turn to when searching for brands means that your profile will soon become your new homepage. Thus, there's the need to put in as much effort into the visuals and copies on the profile that's put on the homepage of your website. Instagram profiles are a reflection of owners' brands, products or services and should be attractive enough to encourage visitors to become followers. Focus on the Stories Highlights and an eye-catching bio to make your page aesthetically appealing. Hack Instagram Stories for More Exposure For Instagram Stories, 2018 will definitely be a huge year, and because organic reach is dropping for regular posts, stories are fast becoming a key approach to engaging with followers and staying on top of the game. Did you know you can gain more followers with Instagram Stories? Yes, Instagram stories appear on the explore page, which implies that even people who don't follow you can easily find and view your stories. Who knows? If they fall in love with what they see, they might just give you a follow. This is just another reason why you need to have an active story running on your Instagram feed at all times. Other than appearing in Instagram's explore page, your story may also appear in stories for other hashtags and locations. Most Instagram hashtags and geo-locations have their own stories but this is an underutilized feature that you can seize. If you have to post a great piece of content or something interesting on your story, it can attract the attention of Instagram users and turn casual viewers into your new Instagram followers. Get Featured Off of Instagram One of the most effective ways to attract Instagram followers today promoting your account but not through the Instagram app. Instead of struggling to test all ways to hack the algorithm to optimize your content, spend more time on promoting your profile in other areas online. Of course, you will be going back to the basics of PR with this strategy but it's actually practically workable. When people hear you online, they are more likely to look you up on Instagram even before they Google you. Get featured in the press, guest posting on someone else or doing a podcast interview and see what it does to your Instagram following. This you can achieve by pitching your ideas to other Instagram accounts, podcasts and blogs that you're sure your target market would read. Always say yes to giving a quote for an article or doing an interview even if it's simply a small publication – they might potentially have an audience that's much more Hack Tool
SecurityAffairs.webp 2018-08-11 06:46:03 Experts explained how to hack macs in enterprises through MDM (lien direct) Researchers demonstrated how a sophisticated threat actor can hack a brand new Apple Mac computer in enterprise environments through MDM. A security duo composed by Jesse Endahl, CPO and CSO at macOS management firm Fleetsmith, and Max Bélanger, staff engineer at Dropbox, demonstrated at the Black Hat security conference how a persistent attacker could compromise […] Hack Threat
Blog.webp 2018-08-11 06:44:00 (Déjà vu) Hack the WinterMute: 1 (CTF Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as Wintermute (Part 1) and it is another boot2root challenge provided for practice. So let's try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/wintermute-1,239/ Security Level: Intermediate Author Note: There are 2 important things to... Continue reading → Hack
DarkReading.webp 2018-08-09 21:45:00 IoT Malware Discovered Trying to Attack Satellite Systems of Airplanes, Ships (lien direct) Researcher Ruben Santamarta shared the details of his successful hack of an in-flight airplane Wi-Fi network - and other findings - at Black Hat USA today. Malware Hack
TechWorm.webp 2018-08-09 17:37:04 Wifi password hacking: Easily Hack WiFi Password Using New WPA/WPA2 flaw (lien direct) Learn how to hack Wi-Fi password of modern routers Wifi password hacking has become popular as people are always in search of the free internet. But due to the advancement of technology, cracking passwords have become a difficult task to do. The reason is due to the implementation of WPA/WPA2 (wifi protected access) protocols. They made […] Hack
WiredThreatLevel.webp 2018-08-09 16:30:00 A New Pacemaker Hack Puts Malware Directly On the Device (lien direct) Researchers at the Black Hat security conference will demonstrate a new pacemaker-hacking technique that can add or withhold shocks at will. Malware Hack
CSO.webp 2018-08-09 13:16:00 IDG Contributor Network: Here I am, hack me (lien direct) Those of us in healthcare are reeling from the recent ransomware attack at LabCorp. The company, one of the largest medical testing companies in the world, confirmed that a known group of bad actors penetrated their network late on a Friday night via an exposed RDP port, and infected more than 30,000 systems with SamSam ransomware. LabCorp deserves some kudos, given reports that they had the attack contained in less than 50 minutes, which is quite amazing, if true. Kudos notwithstanding, however, why did they allow their network to be penetrated in the first place? Ransomware Hack
BBC.webp 2018-08-09 08:14:04 Medical hack poses pacemaker risk (lien direct) Researchers disclose an unfixed vulnerability that threatens medical devices. Hack Vulnerability
ErrataRob.webp 2018-08-08 20:09:17 That XKCD on voting machine software is wrong (lien direct) The latest XKCD comic on voting machine software is wrong, profoundly so. It's the sort of thing that appeals to our prejudices, but mistakes the details.Accidents vs. attackThe biggest flaw is that the comic confuses accidents vs. intentional attack. Airplanes and elevators are designed to avoid accidental failures. If that's the measure, then voting machine software is fine and perfectly trustworthy. Such machines are no more likely to accidentally record a wrong vote than the paper voting systems they replaced -- indeed less likely. The reason we have electronic voting machines in the first place was due to the "hanging chad" problem in the Bush v. Gore election of the year 2000. After that election, a wave of new, software-based, voting machines replaced the older inaccurate paper machines.The question is whether software voting machines can be attacked. Well, if that's the measure, then airplanes aren't safe at all. Security against human attack consists of the entire infrastructure outside the plane, such as TSA forcing us to take off our shoes, to trade restrictions to prevent the proliferation of Stinger missiles.Confusing the two, accidents vs. attack, is used here because it makes the reader feel superior. We get to mock and feel superior to those stupid software engineers for not living up to what's essentially a fictional standard of reliability.To repeat: software is better than the mechanical machines they replaced, which is why there are so many software-based machines in the United States. The issue isn't normal accuracy, but their robustness against a different standard, against attack -- a standard which airplanes and elevators suck at.The problems are as much hardware as softwareLast year at the DEF CON hacking conference they had an "Election Hacking Village" where they hacked a number of electronic voting machines. Most of those "hacks" were against the hardware, such as soldering on a JTAG device or accessing USB ports. Other errors have been voting machines being sold on eBay whose data wasn't wiped, allowing voter records to be recovered.What we want to see is hardware designed more like an iPhone, where the FBI can't decrypt a phone even when they really really want to. This requires special chips, such as secure enclaves, signed boot loaders, and so on. Only once we get the hardware right can we complain about the software being deficient.To be fair, software problems were also found at DEF CON, like an exploit over WiFi. Though, a lot of problems are questionable whether the fault lies in the software design or the hardware design, fixable in either one. The situation is better described as the entire design being flawed, from the "requirements",  to the high-level system "architecture", and lastly to the actual "software" code.It's lack of accountability/fail-safesWe imagine the threat is that votes can be changed in the voting machine, but it's more profound than that. The problem is that votes can be changed invisibly. The first change experts want to see is adding a paper trail, rather than fixing bugs.Consider "recounts". With many of today's electronic voting machines, this is meaningless, with nothing to recount. The machine produces a number, and we have nothing else to test against whether that number is correct or fa Hack Threat
DarkReading.webp 2018-08-08 20:00:00 Researchers Release Free TRITON/TRISIS Malware Detection Tools (lien direct) Team of experts recreates the TRITON/TRISIS attack to better understand the epic hack of an energy plant that ultimately failed. Malware Hack
Blog.webp 2018-08-08 16:50:03 Hack the LAMPSecurity: CTF 7 (CTF Challenge) (lien direct) Hello friends! Today we are going to take another CTF challenge known as LAMPSecurity CTF7 and it is another boot2root challenge provided for practice and its security level is for the beginners. So let's try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/lampsecurity-ctf7,86/ Penetrating Methodologies Network Scanning... Continue reading → Hack
The_Hackers_News.webp 2018-08-08 03:33:05 Snapchat Hack - Hacker Leaked Snapchat Source Code On GitHub (lien direct) The source code of the popular social media app Snapchat was recently surfaced online after a hacker leaked and posted it on the Microsoft-owned code repository GitHub. A GitHub account under the name Khaled Alshehri with the handle i5xx, who claimed to be from Pakistan, created a GitHub repository called Source-Snapchat with a description "Source Code for SnapChat," publishing the code of Hack
TechRepublic.webp 2018-08-07 15:12:01 New method makes cracking WPA/WPA2 Wi-Fi network passwords easier and faster (lien direct) Major password-cracking tool, Hashcat, found a simpler way to hack your WPA/WPA2 enabled Wi-Fi networks. Here's what businesses need to know. Hack
The_Hackers_News.webp 2018-08-07 11:57:05 How to Hack WiFi Password Easily Using New Attack On WPA/WPA2 (lien direct) Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers. Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols Hack Tool Guideline
no_ico.webp 2018-08-06 13:00:03 Clarksons Data Breach (lien direct) Following the recent news regarding British shipping company, Clarksons, revealing that a data breach it suffered last year stemmed from a hack on a “single and isolated user account”, Joseph Carson, Chief Security Scientist at Thycotic offers the following comment. Joseph Carson, Chief Security Scientist at Thycotic: “Many organisations have failed to implement privileged access security and in … The ISBuzz Post: This Post Clarksons Data Breach Data Breach Hack
Blog.webp 2018-08-06 10:25:00 (Déjà vu) Hack the Box: Holiday Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Holiday” which is available online for those who want to increase their skill in penetration testing and black box testing. Holiday is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
Blog.webp 2018-08-06 09:08:03 (Déjà vu) Hack the Box: Silo Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Silo” which is available online for those who want to increase their skill in penetration testing and black box testing. Silo is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
Blog.webp 2018-08-05 20:14:02 (Déjà vu) Hack the Lampião: 1 (CTF Challenge) (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Lampião: 1”. This VM is developed by Tiago Tavares, which is a standard Boot-to-Root challenge. Our goal is to get into the root directory and see the congratulatory message. Level: Easy Task: To Find The Final Flag. Let's Breach!! The target holds 192.168.1.105 as... Continue reading → Hack
Blog.webp 2018-08-05 15:42:03 Hack the Bulldog:2 (CTF Challenge) (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Bulldog 2”. This VM is developed by Nick Frichette, which is a standard Boot-to-Root challenge. Our goal is to get into the root directory and see the congratulatory message. Level: Intermediate Task: To Find The Final Flag. Steps involved: Post scanning to discover open... Continue reading → Hack
SecurityAffairs.webp 2018-08-03 14:05:04 CVE-2018-14773 Symfony Flaw expose Drupal websites to hack (lien direct) A vulnerability in the Symfony HttpFoundation component tracked as CVE-2018-14773, could be exploited by attackers to take full control of the affected Drupal websites. Maintainers at Drupal addressed the security bypass vulnerability by releasing a new version of the popular content management system, the version 8.5.6. “The Drupal project uses the Symfony library. The Symfony […] Hack Vulnerability
Blog.webp 2018-08-03 11:42:03 (Déjà vu) Hack the Box: Bart Walkthrough (lien direct) Hello friends!! Today we are going to solve another CTF challenge “Bart” which is available online for those who want to increase their skill in penetration testing and black box testing. Bart is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable... Continue reading → Hack
grahamcluley.webp 2018-08-02 14:19:00 Reddit hacked - but don\'t give up on 2FA just yet (lien direct) Reddit hacked - but don't give up on 2FA just yetYes, SMS-based 2FA can be intercepted by someone determined to hack into your account. But it's also better than not having any multi-factor authentication in place at all. Read more in my article on the Hot for Security blog. Hack
SecurityWeek.webp 2018-08-02 12:38:02 Attackers Circumvent Two Factor Authentication Protections to Hack Reddit (lien direct) Popular Community Site Reddit Breached Through Continued Use of NIST-Deprecated SMS Two Factor Authentication (2FA) Hack
itsecurityguru.webp 2018-08-02 10:05:03 Reddit\'s hack response causes concern (lien direct) Social media site Reddit has suffered a data breach, but has refused to disclose its scale. The site said it discovered in June that hackers compromised several employees’ accounts to gain access to databases and logs. View Full Story ORIGINAL SOURCE: BBC Hack
bleepingcomputer.webp 2018-08-01 19:30:01 G Suite Can Now Alert You of Government-Backed Attacks (lien direct) Google announced today that administrators of G Suite accounts can now enable and configure a special alert when a government-backed cyber-espionage group is trying to hack into one of their company's user accounts. [...] Hack
Blog.webp 2018-08-01 03:05:01 Hack the Box: Valentine Walkthrough (lien direct) Hello friends! Today we are going to solve the CTF challenge “Valentine” which is a vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have a very good collection of vulnerable labs as challenges from beginners to Expert level. Difficulty Level: Medium Task: find user.txt and root.txt file on victim's machine. Steps involved:... Continue reading → Hack
itsecurityguru.webp 2018-07-31 14:16:01 How hack on 10,000 WordPress sites was used to launch an epic malvertising campaign (lien direct) Security researchers at Check Point have lifted the lid on the infrastructure and methods of an enormous “malvertising” and banking trojan campaign. The operation delivered malicious adverts to millions worldwide, slinging all manner of nasties including crypto-miners, ransomware and banking trojans. View Full Story ORIGINAL SOURCE: The Register Ransomware Hack
bleepingcomputer.webp 2018-07-31 11:55:01 Shipping Firm Avoids Customer Data Dump in Last Year\'s Hack & Ransom Incident (lien direct) UK-based shipping company Clarkson PLC (or Clarksons) has revealed more details about a security breach that took place last year, and during which hackers threatened to release some of the company's data online if it didn't pay a ransom demand. [...] Hack
ZDNet.webp 2018-07-31 10:00:00 HP will give you $10,000 to hack your printer (lien direct) Researchers can earn up to $10,000 for issues which allow attackers to target you through your printer. Hack
grahamcluley.webp 2018-07-31 08:54:02 Dixons Carphone admits hack far bigger than originally thought (lien direct) Dixons thumbCompany now says approximately 10 million personal records could have been accessed in security breach. Hack
ESET.webp 2018-07-31 08:28:05 Inmates hack tablets for free credits prison (lien direct) >The nature of the vulnerability hasn't been disclosed, but is said to have already been identified and fixed Hack Vulnerability
Blog.webp 2018-07-30 06:34:00 (Déjà vu) Hack the Box: Aragog Walkthrough (lien direct) Hello Friends!! Today we are going to solve another CTF Challenge “Aragog”. This VM is also developed by Hack the Box, Aragog is a Retired Lab and there are multiple ways to breach into this VM. Level: Medium Task: Find the user.txt and root.txt in the vulnerable Lab. Let's Begin!! As these labs are only... Continue reading → Hack
bleepingcomputer.webp 2018-07-30 00:15:00 KickICO Platform Loses $7.7 Million in Recent Hack (lien direct) On Friday, ICO platform KickICO acknowledged a security breach during which an unknown attacker (or attackers) stole over 70 million KICK tokens ($7.7 million at the time of the hack) from the platform's wallets. [...] Hack
Blog.webp 2018-07-29 05:13:02 Hack the Jarbas: 1 (CTF Challenge) (lien direct) Hello readers. We'd recently tried our hands on the vulnerable VM called Jarbas on vulnhub. It is developed to look like a 90s Portuguese search engine. It is made by Tiago Tavares. You can download the lab from here. The objective of this challenge is to get root shell. Difficulty Level: Easy Steps involved: Method... Continue reading → Hack
BBC.webp 2018-07-27 18:20:00 Idaho inmates hack prison system and steal $225,000 in credits (lien direct) The scheme was discovered after the prisoners boosted their accounts with artificial credits. Hack
AlienVault.webp 2018-07-27 13:00:00 Things I Hearted this Week, 27th July 2018 (lien direct) Welcome to your weekly security roundup, providing you all with the security news you deserve, but maybe might not need. As always, these news stories are human-curated by me - no fancy algorithms, no machine learning, and definitely no trending topics here. We are less than two weeks away from Blackhat in sunny Las Vegas. We’ll be there - pop along to booth 528 and say hello if you’re there. Google: Security Keys Neutralized Employee Phishing Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes. Google: Security Keys Neutralized Employee Phishing | Krebs on Security While we’re on the topic of phishing, attackers used phishing emails to break into a Virginia bank twice in eight months, making off with more than $2.4 million in total. Now the bank is suing its cybersecurity insurance provider for refusing to fully cover the loss. Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M | Krebs on Security We’re probably going to see more of this kind of back and forth as companies that have taken out cyber insurance and suffered a breach fight with their insurers over liability and who will cover the cost. Somewhat related: Scam of the week, another new CEO fraud phishing wrinkle | KnowBe4 Breaking the Chain Supply chain and third party risks are getting better understood, but understanding a risk doesn’t necessarily mean it will reduce the risk. Tesla, VW, and dozens of other car manufacturers had their sensitive information exposed due to a weak security link in their supply chains. Tesla, VW data was left exposed by supply chain vendor Level One Robotics | SC Magazine SIM Swap - A Victim’s Perspective This is a really good write-up by AntiSocial engineer taking a look at how SIM swap fraud can impact victims, and why mobile phone operators need to do more to prevent this kind of fraud. “It’s an all too common story, the signal bars disappear from your mobile phone, you ring the phone number – it rings, but it’s not your phone ringing. Chaos ensues. You’re now getting password reset emails from Facebook and Google. You try to login to your bank but your password fails.  Soon enough the emails stop coming as attackers reset your account passwords. You have just become the newest victim of SIM Swap Fraud and your phone number is now at the control of an unknown person.” SIM Swap Fraud - a victim’s perspective | AntiSocial Engineer EU Fails to Regulate IoT Security In this week’s head-scratching moment of “what were they thinking?”, the European Commission has rejected consumer groups' calls for mandatory security for consumer internet-connected devices because they believe voluntar Data Breach Hack Tesla
Blog.webp 2018-07-25 12:50:05 Expert says: Hack your Smart Home to Secure It (lien direct) Smart home security starts at home, according to researcher Michael Sverdlin who says that consumers should explore the security of their smart home technology and consider simple modifications or hacks to remove insecure or promiscuous features. Not long ago, Michael Sverdlin, the back-end team leader for IoT security startup Vdoo, bought his...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560700964/0/thesecurityledger -->» Hack Guideline
Blog.webp 2018-07-25 07:34:02 Hack the Temple of Doom (CTF Challenge) (lien direct) Temple of Doom is a new CTF challenge vm on vulnhub made by 0katz. You can download it from here. The aim of this lab is to capture the flag in root directory of the system. Inspired from the Indiana Jones movie Temple of Doom, the level of this lab is intermediate. Steps Involved Port... Continue reading → Hack
Blog.webp 2018-07-24 16:01:01 Hack the Golden Eye:1 (CTF Challenge) (lien direct) Welcome to another boot2root CTF challenge “Golden Eye” uploaded by Creosote on vulnhub. As, there is a theme, and you will need to snag the flag in order to complete the challenge and you can download it from: https://www.vulnhub.com/entry/goldeneye-1,240/  By author, it has a good variety of techniques needed to get root – no exploit... Continue reading → Hack
The_Hackers_News.webp 2018-07-24 01:39:05 New Bluetooth Hack Affects Millions of Devices from Major Vendors (lien direct) Yet another bluetooth hacking technique has been uncovered. A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an unauthenticated, remote attacker in physical proximity of targeted devices to intercept, monitor or manipulate the traffic they exchange. The Bluetooth hacking vulnerability, tracked as CVE-2018-5383, affects Hack Vulnerability
Last update at: 2024-07-02 09:08:17
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter