Tags » Ethical Hacking

How I joined multiple Bootstrap themes with my official Wordpress site

I thought I should write down this without delay and share with my readers. These are bits and pieces of my experiences of writing my official website… 479 more words

PHP

Using the "NSA" EternalBlue exploit on Metasploitable 3

In this tutorial, we will see how to use the “EternalBlue” MS17-010 SMB exploit in Metasploit on Kali Linux to obtain a remote shell in Metasploitable 3, which uses Windows Server 2008. 394 more words

Metasploit

Brute Force Hack Attack & Dictionary Attack | Cyber Security 

Brute force attack is an automated and simplest method to gain access to a system. An attacker checks & tries different combination of all possible usernames & passwords over and over again until the correct one is found. 130 more words

Cyber Security

Kill switch

The software contained a URL that, when discovered and registered by a security researcher to track activity from infected machines, was found to act as a “kill switch” that shut down the software before it executed its payload, stopping thespread of the ransomware. 156 more words

Ethical Hacking

WannaCry malware

WannaCry is the ransomware computer worm that targets computers running Microsoft Windows. Initially, the worm uses the Eternal Blue exploit to enter a computer, taking advantage of a vulnerability in Microsoft’s implementation of the Server Message Block(SMB) protocol. 114 more words

Ethical Hacking

WannaCry ransomware attack?

The WannaCry ransomware attack was a world wide cyber attack by the WannaCry ransomware crypto worm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin crypto currency. 311 more words

Ethical Hacking