#infosec medias

Posts tagged on #infosec

Top Posts Recent Posts

Top Posts

Hands-on with Salvador Mendoza and @electroniccats’ Hunter Cat portable credit card skimmer detector.
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
// 💳 bit.ly/huntercat-detector

#hackster #hardware #opensource #security #infosec #creditcardskimming #skimmer #defcon27 #defcon.

Hands-on with Salvador Mendoza and @electroniccats ’ Hunter Cat portable credit card skimmer detector. ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ // 💳 bit.ly/huntercat-detector #hackster #hardware #opensource #security #infosec #creditcardskimming #skimmer #defcon27 #defcon ...

The same team of #cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as #Dragonblood, in the newly launched #WPA3 WiFi security standard few months ago has now uncovered two more flaws that could allow attackers to hack #WiFi passwords.

Read more on ➤ https://thehackernews.com

#hackernews #hacker #hack #cyber #infosec #informationsecurity #hacking #cybersecurity #hacked #malware #programming #codingisfun #metasploit #linux #technology #ethicalhacking #ethicalhacker #pentesting #pentesting #hackathon #programmerhumor #programmingmemes #programmerslife.

The same team of #cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as #Dragonblood , in the newly launched #WPA3 WiFi security standard few months ago has now uncovered two more flaws that could allow attackers to hack #WiFi passwords. Read more on ➤ https://thehackernews.com #hackernews #hacker #hack #cyber #infosec #informationsecurity #hacking #cybersecurity #hacked #malware #programming #codingisfun #metasploit #linux #technology #ethicalhacking #ethicalhacker #pentesting #pentesting #hackathon #programmerhumor #programmingmemes #programmerslife ...

👉 Follow @hackerscon 👈 ➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖
🇬🇧 What’s your favorite tool? Lately I’ve been using Hopper Reversing Tool to disassemble and decompile some ARM code. ➖➖➖➖➖➖➖➖➖➖➖➖➖➖
I’ve actually really been enjoying the interface to this as it’s become pretty friendly to me. Especially when you’re in the same market as IDA Pro, it becomes very hard to compete nowadays. But I’d say the way they structure the organization of their functions, strings, hex, and debugger... is pretty fuckin fantastic. Usually when I’m first testing out an RE tool, I like to create my own binaries using C/C++ on a Linux stack then decompile it to see how well it was able to assume the pseudo code.
➖➖➖➖➖➖➖➖➖➖➖➖➖➖
You can also see in this picture I’m  extracting firmware from the arduino blue shield! I could not have successfully done this without one of my all time favorite RE books, which is shown in this picture.
📸Photo by @hackersclub
⭐Tag @hackerscon to get featured! .
Use it only for educational purposes.
#ethicalhacker #computer #mac #apple #pc #cybersecurity #cisco #bugbounty  #hacker #parrotsec #pentesting  #hacking #linux #defcon  #freetime #infosec #internet  #purpleteam #developerslife #html #blueteam #tattoo #python #javascript #cyberpunk.

👉 Follow @hackerscon 👈 ➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖ 🇬🇧 What’s your favorite tool? Lately I’ve been using Hopper Reversing Tool to disassemble and decompile some ARM code. ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ I’ve actually really been enjoying the interface to this as it’s become pretty friendly to me. Especially when you’re in the same market as IDA Pro, it becomes very hard to compete nowadays. But I’d say the way they structure the organization of their functions, strings, hex, and debugger... is pretty fuckin fantastic. Usually when I’m first testing out an RE tool, I like to create my own binaries using C/C++ on a Linux stack then decompile it to see how well it was able to assume the pseudo code. ➖➖➖➖➖➖➖➖➖➖➖➖➖➖ You can also see in this picture I’m extracting firmware from the arduino blue shield! I could not have successfully done this without one of my all time favorite RE books, which is shown in this picture. 📸Photo by @hackersclub ⭐Tag @hackerscon to get featured! . Use it only for educational purposes. #ethicalhacker #computer #mac #apple #pc #cybersecurity #cisco #bugbounty #hacker #parrotsec #pentesting #hacking #linux #defcon #freetime #infosec #internet #purpleteam #developerslife #html #blueteam #tattoo #python #javascript #cyberpunk ...

The threat of ransomware is becoming more prevalent and severe as attackers' focus has now moved beyond computers to smartphones and other Internet-connected smart devices.

Read more on ➤ https://thehackernews.com

#hackernews #hacker #hack #cyber #infosec #informationsecurity #hacking #cybersecurity #hacked #malware #programming #codingisfun #metasploit #linux #technology #ethicalhacking #ethicalhacker #pentesting #pentesting #hackathon #programmerhumor #programmingmemes #programmerslife.

The threat of ransomware is becoming more prevalent and severe as attackers' focus has now moved beyond computers to smartphones and other Internet-connected smart devices. Read more on ➤ https://thehackernews.com #hackernews #hacker #hack #cyber #infosec #informationsecurity #hacking #cybersecurity #hacked #malware #programming #codingisfun #metasploit #linux #technology #ethicalhacking #ethicalhacker #pentesting #pentesting #hackathon #programmerhumor #programmingmemes #programmerslife ...

Most Recent

♦️Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers♦️
.
🔻The story started when Turkish researcher Özkan Mustafa Akkuş publicly presented a zero-day remote code execution vulnerability in the Webmin at DefCon on August 10, without giving any advance notice to the affected project maintainers.
.
🔺The vulnerability, tracked as CVE-2019-15107, was introduced in a security feature that has been designed to let Webmin administrator enforce a password expiration policy for other users' accounts.
.
🔻According to a Shodan search, Webmin has more than 218,000 Internet-exposed instances available at the time of writing, mostly located in the United States, France, and Germany—of which over 13,000 instances are running vulnerable Webmin version 1.890.
.
🎭 BY :- @xor_cipher
.
#ethicalhacking #hacking #kalilinux #cybersecurity #hackers #hack #hacker #linux #python #anonymous #technology #programming #security #infosec #ethicalhacker #developer #malware #pentesting #web #hacked #tech #programmer #computerscience #windows #cybercrime #metasploit #cyberattack #coding #password #webdeveloper.

♦️Hackers Planted Backdoor in Webmin, Popular Utility for Linux/Unix Servers♦️ . 🔻The story started when Turkish researcher Özkan Mustafa Akkuş publicly presented a zero-day remote code execution vulnerability in the Webmin at DefCon on August 10, without giving any advance notice to the affected project maintainers. . 🔺The vulnerability, tracked as CVE-2019-15107, was introduced in a security feature that has been designed to let Webmin administrator enforce a password expiration policy for other users' accounts. . 🔻According to a Shodan search, Webmin has more than 218,000 Internet-exposed instances available at the time of writing, mostly located in the United States, France, and Germany—of which over 13,000 instances are running vulnerable Webmin version 1.890. . 🎭 BY :- @xor_cipher . #ethicalhacking #hacking #kalilinux #cybersecurity #hackers #hack #hacker #linux #python #anonymous #technology #programming #security #infosec #ethicalhacker #developer #malware #pentesting #web #hacked #tech #programmer #computerscience #windows #cybercrime #metasploit #cyberattack #coding #password #webdeveloper ...

Technical Mohit To read more interesting Q&A Like this visit @technical___mohit

Share with your friends

Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
.
Share with your friends also 🙏😎💪
.
📣 For More Hacking Stuff Follow 📣
👇👇👇👇👇👇👇👇👇👇👇👇👇👇👇
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
Follow Now 👉🔴 @technical___mohit 🔴👈
👆👆👆👆👆👆👆👆👆👆👆👆👆👆👆#coding #programming #programmer #code#developer #java #coder #javascript #html  #python #webdeveloper  #hack #codinglife #softwaredeveloper #technology #tech #bhfyp #computerscience #computer #development#webdevelopment #webdesign #codinglife#hacker  #softwareengineer#linux #iot #hacking #networking #infosec.

Technical Mohit To read more interesting Q&A Like this visit @technical___mohit Share with your friends Follow Now 👉🔴 @technical___mohit 🔴👈 Follow Now 👉🔴 @technical___mohit  🔴👈 Follow Now 👉🔴 @technical___mohit  🔴👈 Follow Now 👉🔴 @technical___mohit  🔴👈 . Share with your friends also 🙏😎💪 . 📣 For More Hacking Stuff Follow 📣 👇👇👇👇👇👇👇👇👇👇👇👇👇👇👇 Follow Now 👉🔴 @technical___mohit 🔴👈 Follow Now 👉🔴 @technical___mohit 🔴👈 Follow Now 👉🔴 @technical___mohit 🔴👈 Follow Now 👉🔴 @technical___mohit 🔴👈 Follow Now 👉🔴 @technical___mohit 🔴👈 Follow Now 👉🔴 @technical___mohit 🔴👈 👆👆👆👆👆👆👆👆👆👆👆👆👆👆👆#coding  #programming  #programmer  #code #developer  #java  #coder  #javascript  #html  #python  #webdeveloper   #hack #codinglife #softwaredeveloper  #technology  #tech #bhfyp #computerscience  #computer  #development #webdevelopment  #webdesign  #codinglife #hacker   #softwareengineer #linux  #iot  #hacking #networking #infosec ...

Protecting our information is more important than ever. What If I told you that one phone call to us could give you a free consultation and analysis that will not only offer protection, but could also save you money?? Well, that’s exactly what you get, so what do you have to lose?? For more information on our services, visit our website at www.tripleaict.com to find out how you can receive a no cost consultation and learn more about our “pay as you save” price model. 
#informationtechnology #cybersecurity #technology #technologynews #healthcare #infosec #security #cyber #tech #gdpr #opensource #cybercrime #iot #it #businessowner #business #securitymonitoring #securitymonitoringsoftware #businessstrategy #optimization #artifcialintelligence #engineeringtech #businesstransformation #cyberthreats #frankfurtgermany #frankfurt_am_main #consulting #businessconsulting #protection #tripleaict.

Protecting our information is more important than ever. What If I told you that one phone call to us could give you a free consultation and analysis that will not only offer protection, but could also save you money?? Well, that’s exactly what you get, so what do you have to lose?? For more information on our services, visit our website at www.tripleaict.com to find out how you can receive a no cost consultation and learn more about our “pay as you save” price model. #informationtechnology #cybersecurity #technology #technologynews #healthcare #infosec #security #cyber #tech #gdpr #opensource #cybercrime #iot #it #businessowner #business #securitymonitoring #securitymonitoringsoftware #businessstrategy #optimization #artifcialintelligence #engineeringtech #businesstransformation #cyberthreats #frankfurtgermany #frankfurt_am_main #consulting #businessconsulting #protection #tripleaict ...

Our core values are centred around Groot and Berg’s exclusive recruitment methodology that has been regularly refreshed and developed over the last 20 years, to hone it to perform at its optimum efficiency. ⠀
⠀
✅ Accountable ⠀
✅ Adaptable ⠀
✅ Partnership ⠀
✅ Results ⠀
⠀
For more on what makes us different, hit the link in bio👆 ⠀
#WeRecruitEU ⠀
. ⠀
. ⠀
. ⠀
. ⠀
. ⠀
#GrootandBerg #RecTech #europe #Europeanjobs #technologyjobs #python #java #ansible #linux #redhat #webAPI #DevSecops #hiring #itjobs #hiring #infosec #cybersecurity #iot #blockchain #iso #development #dotnet #Values #CoreValues.

Our core values are centred around Groot and Berg’s exclusive recruitment methodology that has been regularly refreshed and developed over the last 20 years, to hone it to perform at its optimum efficiency. ⠀ ⠀ ✅ Accountable ⠀ ✅ Adaptable ⠀ ✅ Partnership ⠀ ✅ Results ⠀ ⠀ For more on what makes us different, hit the link in bio👆 ⠀ #WeRecruitEU ⠀ . ⠀ . ⠀ . ⠀ . ⠀ . ⠀ #GrootandBerg #RecTech #europe #Europeanjobs #technologyjobs #python #java #ansible #linux #redhat #webAPI #DevSecops #hiring #itjobs #hiring #infosec #cybersecurity #iot #blockchain #iso #development #dotnet #Values #CoreValues ...

Via @techcrunch Why break into a company’s network when you can just walk right in — literally?

Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to park outside a building and brute-force the Wi-Fi network password.

Just drop your exploit in the mail and let your friendly postal worker deliver it to your target’s door. 
#privacy #technology #computer #code #tech #cybersecurity #hacking #blackhat #security #dataprotection #cyber #cybercrime #cracking #infosec #business via @hashtagexpert.

Via @techcrunch Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to park outside a building and brute-force the Wi-Fi network password. Just drop your exploit in the mail and let your friendly postal worker deliver it to your target’s door. #privacy #technology #computer #code #tech #cybersecurity #hacking #blackhat #security #dataprotection #cyber #cybercrime #cracking #infosec #business via @hashtagexpert ...