Google to End Support for Gmail, YouTube, Drive Account Sign-in on Old Android Phones Soon

Metasploit for Pentester: Creds

This is in continuation with the Metasploit for Pentester series of articles that we are presenting.  More specifically we learned about the Workspaces and the Metasploit Database service in this article: Metasploit for Pentester: Database & Workspace. In this article, we will be discussing another database inside the Workspace that can be used by Penetration […]

read more

Metasploit for Pentester: Windows Hidden Bind Shell

In this article, we are going to cover the tactics of Hidden BIND TCP shellcode. Every organization has multiple scanning tools to scan their network and to identify the new or unidentified open ports. In this type of environment, it’s very difficult to hide the suspicious bind shellcode and remains unnoticed from the reach of […]

read more

Is OnePlus Nord 2 the Best Affordable Flagship Right Now?

OnePlus Nord 2 5G debuted last week as the successor to the original OnePlus Nord. The new smartphone has a number of upgrades: a bigger primary camera, larger battery, and faster charging over the last year model. It is also the first phone from OnePlus to have a MediaTek SoC over a Qualcomm one. In […]

read more

Metasploit for Pentester: Migrate

In the continuation in this series of articles dedicated to the Metasploit Framework to provide an appropriate resource for Penetration Testers so that they can use the variety of the features present in the Metasploit Framework to the maximum extent. In this article, we will be talking about the migrate command and its functionalities. Table […]

read more

Apple Security Advisory – Canadian Centre for Cyber Security

Number: AV21-369Date: 30 July 2021 On 29 July 2021 Apple published a Security Update to address a vulnerability in the following product: watchOS – versions prior to 7.6.1 Exploitation of this vulnerability could allow arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. The Cyber Centre encourages […]

read more

[Control Systems] Hitachi ABB Power Grids Security Advisory

Number: AV21-368Date: 30 July 2021 On 29 July 2021, ICS-CERT published an ICS Advisory to highlight a vulnerability in the following product: eSOMS – version 6.3 and prior     Exploitation of this vulnerability could lead to credential theft. The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigation […]

read more

[Control Systems] Wibu-Systems AG Security Advisory

Number: AV21-367Date: 30 July 2021 On 29 July 2021, ICS-CERT published an Advisory to highlight vulnerabilities in the following product: Wibu-Systems AG CodeMeter Runtime – versions prior to 7.21a Exploitation of these vulnerabilities could allow a malicious actor to cause a denial-of-service or expose sensitive information. The Cyber Centre encourages users and administrators to review […]

read more

AWS is retiring EC2-Classic soon: Here’s what you need to know

Migration tools are available, but most EC2 customers won’t be impacted, said Gartner researcher. Image: Amazon.com Amazon Web Services has announced its plans to shut down its venerable EC2-Classic product, with some users unable to access the service beginning on October 30, 2021.  Originally launched in 2006, Elastic Compute Cloud (EC2) used a flat network […]

read more

20 steps to decommission a redundant data center facility

Decommissioning a redundant facility is a harder task than shutting down a standalone operation. Learn the appropriate steps to take to get the job done safely and reliably. Image: Getty Images/iStockphoto It was with an element of sadness that I recently participated in the decommissioning of a remote site from our global environment. This site […]

read more

How to remove or update a single entry from the SSH known_hosts file

SSH holds fingerprints of your remote machines in the known_hosts file. Sometimes you might need to remove or update one of those entries. Jack Wallen shows you how. Image: Anawat Sudchanham/EyeEm/Getty Images The SSH known_hosts file contains fingerprints (generated from the remote machines SSH key) of the known machines you’ve logged into. If you SSH […]

read more

Metasploit for Pentester: Inject Payload into Executable

Being lurking and undetectable is the priority after anonymity. In this article, we are going to learn how to create an innocuous-looking backdoor and bind it with a legitimate executable file to gain the victims’ trust. Table of Content Pre-requisites for Lab set up Executable file search on victim’s PC Using peinjector payload to bind […]

read more