CALL US

+91 9116117170

Tag: hacking

Google Hacking For Penetration Testers

By Devashish Soni 0 Comment March 19, 2020

Google hacking or Google dorking is an advance google search technique for information gathering. These search queries can be used to gather information for arbitrary or individual targets, identify security vulnerabilities in web applications, discover files containing credentials and other sensitive data, discover error messages disclosing sensitive information Before we Begin: Before we start what […]

Cookiethief:- A Cookie Stealing Malware For Android

By Yash Kudal 0 Comment March 17, 2020

A new but dangerous version of Android malware has been discovered that steals users authentication cookies from web browsers and other applications, including Chrome and Facebook, which are installed on compromised devices. The malware is called “Cookiethief” which is commonly known as Kaspersky Trojan which works by retrieving the root privileges on the target device, […]

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

Android Banking Malware Stealing 2FA Codes From Google Authenticator

By Yash Kudal 0 Comment March 2, 2020

Security experts have discovered a new type of Android malware that can extract and steal one-time passcode (OTP) generated by Google Authenticator. A team of investigators say that they have seen an OTP stealing ability in Cerberus, a new android banking trojan which was launched last year. As per reports, the current type of Cerberus […]

Vulnerability Of LibreOffice Can Hack Your System, Just By Opening a Document In LibreOffice

By Mohammed Tahir 0 Comment August 3, 2019

If you are using LibreOffice, “Be extra careful”. By opening a document file in LibreOffice, can hack your system. That’s because LibreOffice comprises an extreme unpatched code execution vulnerability that would execute malware into your system as swiftly as you open a maliciously formed doc file. LibreOffice is one the most usable and open source […]

error: Content is protected by Cyberops !!