cyber security

Security

How to find Hidden URLs via subdomain enumeration hacking

In this video Chuck is going to talk to you about Hakrawler, an awesome Subdomain Enumeration tool created by Hakluke! Chuck is going to walk you through how to install Hawkrawler and another Subdomain Enumeration tool called Gau on a Kali Linux machine using Docker.

Read More
IoT Security

Smart Meter Attack CONFIRMED

This is the final step prior to dumping the actual smart meter firmware. Can it be done without removing the processor?

Read More
Security

New Zero Day Exploit – Protect your PC from Follina

The new Follina zero-day attack is being exploited in the wild. Dave explains how to lock out attackers with a simple registry fix after explaining the Top 3 styles of zero-day attack: the application exploit, the operating system exploit, and the escalation exploit.

Read More
IoT Security

Smart Meters are Vulnerable to this Attack

Everyone wants to connect everything up to the internet, but they do not realize that the connection runs in both directions. Voltage glitching attacks have been documented for quite some time, now I am going to apply these well known techniques to extract the smart meters firmware for analysis.

Read More
Security

Real-Time OSINT: Investigating Events as They Happen

In this presentation, Josh Huff shares his techniques and resources for conducting open- source intelligence analysis on current events as they unfold. OSINT analysis of weather emergencies, missing persons, fugitives, and active shooter events is the type of fast-paced practice that makes you step out of your normal investigative routines. Real-time OSINT will make you […]

Read More
Security

This ATM RootKit Can Steal Banking Creds – ThreatWire

Google exposed Exotic Lily, a group that works with Conti, an ATM rootkit can steal banking data, and TrickBot targets MikroTik routers.

Read More