Yearly Archives: 2017

/2017

UAC bypass module for Windows 10 – Metasploit

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credit: Christian

This module exploit a recently disclosed bypassuac method on windows 10 that is currently unpatched.
By editing a registry key and launching fodhelper.exe autoelevated process, one can get an elevated meterpreter session without dropping any file.
This technique […]

By |June 19th, 2017|Metasploit, Papers|

WIKILEAKS REVEALS HOW THE CIA COULD HACK YOUR ROUTER

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Source: Wired

YOUR WI-FI ROUTER, sitting in the corner of your home accumulating dust and unpatched security flaws, provides an attractive target for hackers. Including, according to a new WikiLeaks release, the CIA.

On Thursday, WikiLeaks published a […]

By |June 17th, 2017|Cyber News|

€4.3m stolen in cyber attack on Meath council returned in full

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Source: Herald
Meath County Council yesterday had €4.3m returned in full to its bank account, after it was the subject of an attempted cyber attack over last year’s October bank holiday weekend.
The council had taken legal action […]

By |June 17th, 2017|Cyber News|

Cyber, physical attacks against the grid increasing

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Source: WS Examiner

No cyber or physical attacks against the power grid were successful last year, but that doesn’t mean the country’s electric supply is safe, according to the nation’s electric reliability watchdog.

“While there were no reportable […]

By |June 17th, 2017|Cyber News|

Canada cyber-spy agency expects hacktivist attacks in 2019 vote

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Source: Reuters

Canada’s electronic spy agency said on Friday it was “very likely” that hackers will try to influence Canada’s 2019 elections and it planned to advise political parties next week on how to guard against cyber […]

By |June 17th, 2017|Cyber News|

NHS cyber-attack was ‘launched from North Korea’

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Source: BBC

British security officials believe that hackers in North Korea were behind the cyber-attack that crippled parts of the NHS and other organisations around the world last month, the BBC has learned.

Britain’s National Cyber Security Centre […]

By |June 17th, 2017|Cyber News|

Stay anonymous while hacking online using TOR and Proxychains

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TOR
Tor is software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy. It gives you access to the dark web.

Dark web is nothing […]

By |May 4th, 2017|Papers|

ShodanHat – Search For Hosts Info With Shodan

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Search For Hosts Info With Shodan.

Dependencies
You need to install shodan with pip install shodan or easy_install shodan.
You need to install python-nmap with pip install python-nmap.
You need to set your API Key in the ‘constantes.py’ file.

Options
-h, –help […]

By |April 27th, 2017|Papers|

IR-RESCUE – A WINDOWS BATCH SCRIPT TO COMPREHENSIVELY COLLECT HOST FORENSIC DATA DURING INCIDENT RESPONSE.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

IR-RESCUE is a Windows Batch script that collects a myriad of forensic data from 32-bit and 64-bit Windows systems while respecting the order of volatility.
It is intended for incident response use at different stages in the […]

By |April 27th, 2017|Papers|

REGA & REGEX : FORENSIC AND REGISTRY ANALYZER

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

REGA is the forensic tool performing collection and analysis of the windows registry hives. (GUI application)
RegEX is a console application for collecting registry hive files.
Supported platforms
Windows (written in C/C++ and MFC)
Platform : Windows
Features
Target OS
Windows NT / […]

By |April 27th, 2017|Papers|