Rahul Tyagi Official Blog | Information Security - Main page
Sunday, 2015-08-02, 9:15 AM
Welcome Guest | RSS
Site menu
Login form
Advertisements








1 2 3 ... 24 25 »

Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that’s combined with spyware—a first for crypto-ransomware. This development just comes at the heels of the discovery thatransomware has included file infection to its routines.

CryptoWall 3.0

We first encountered CryptoWall as the payload of spammed messages last year. We noted that while other crypto-ransomware variants have a graphical user interface (GUI) for their payment purposes, CryptoWall relied on other means—opening a Tor site to directly ask for payment or opening the ransom note in Notepad, which contained the instru... Read more »

Views: 1664 | Added by: defaultNick | Date: 2015-04-05 | Comments (0)

So you think reversing and getting source code of an APK is a big deal. Then give a try to Xenotix APK Decompiler.

APK Decompiler is an Open Source Android Application Package (APK) decompiler powered by dex2jar and JAD written in Python.

Minimum Requirements
OS: Windows
JDK 1.6
Wx Python

Download
https://github.com/ajinabraham/Xenotix-APK-Decompiler/

Views: 4797 | Added by: defaultNick | Date: 2014-11-05 | Comments (0)

Xiaomi is present third largest smartphone manufacture in the world. But few days ago IAF found Xiaomi stealing the private information, call logs, IMEI numbers and some info to webservers in Beijing china.

The Indian Air force   warned its employees and their belongings that their private information was being shipped over to servers in China, and asked them to avoid using Xiaomi smartphones due to security risk.

 Xiaomi is facing an investigation in Taiwan for alleged cyber security threat, as a result of which last month the Taiwanese government decided to ban the company due to several privacy controversies.

Coming to sales in India, Xiomi’s models Mi3 and Redmis … created a record sales in flipkart by being sold more than 80 k phones in 9-13 seconds.

Rec... Read more »

Views: 2480 | Added by: defaultNick | Date: 2014-11-05 | Comments (0)

Hashcat is the world’s fastest CPU-based password recovery tool.

While it's not as fast as its GPU counterpart localHashcat, large lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.

Views: 2299 | Added by: defaultNick | Date: 2014-09-14 | Comments (0)

Today we will talk about something interesting , YES :) , As we all know today Android is the best mobile OS and crossed over 80% of global mobile users. Hence in this article we will try to exploit android through the one and only hacker's love - > Metasploit Framework.

Requirements:
1. Kali Linux / Backtrack 5 (Having MSF)
2. Android Phone ( Jelly Beans - I am Using Samsung S3)
3. Common Wireless Network ( Using Hotspot)

I am not gona take much time hence will do it fast in simple steps. So lets go.

Step 1: Open Your Kali terminal and type the following command.

... Read more »

Views: 4119 | Added by: defaultNick | Date: 2014-05-24 | Comments (4)

Join India's Most advance ethical hacking training program LCEH from Lucideus.We are still open with last ‘17’ admissions. Now get HUGE discount for the same as few days left for starting dates of training.

Here are few questions and their answer which you would like to ask us for tra... Read more »

Views: 2210 | Added by: defaultNick | Date: 2014-05-15 | Comments (0)

Views: 1150 | Added by: defaultNick | Date: 2014-05-08 | Comments (0)

Introduction:
Kon-Boot enables you logging in to any password protected machine profile without any knowledge of the password.This tool changes the conten... Read more »

Views: 1745 | Added by: defaultNick | Date: 2014-04-13 | Comments (1)