Posts

More Than 10K Recorded Vulnerabilities in 2018

More Than 10K Recorded Vulnerabilities in 2018: The number of vulnerabilities disclosures which were recorded continues to rise, with 10,644 published throughout the first half of 2018 by Risk Based Security’s VulnDB team. That the total reportedly is around 3,279 vulnerabilities than those which listed on CVE/NVD, according to the 2018 Mid-Year VulnDB QuickView Report. The number reflects only 1% increase compared to last year. Which of those were discovered in the first six months of 2018, 73% of vulnerabilities have a documented solution, while only 32.1% have public exploits; however, 50% of vulnerabilities can be exploited remotely. The vulnerabilities disclosed, 16.6% scored 9.0 or higher on the CVBSSv2 scale. Nearly (48.2%) of the vulnerabilities which were disclosed through coordinated disclosure, yet only 13.1% of those coordinated disclosures were through bug bounty programs. “An important and compelling statistics is that of the 3,279 vulnerabilities not reporte...

New way to Attack on Password

Password Attacks   occur when an account is attacked repeatedly. This is accomplished by using applications known as  password crackers,  which send possible passwords to the account in a systematic manner. The attacks are initially carried out to gain passwords for an access or modification attack. There are several types of password attacks: Read:   USB Password Theft Brute-Force Attack:  A  brute-force  attack is an attempt to guess passwords until a successful guess occurs. As an example of this type of attack, imagine starting to guess with “A” and then going through “z”; when no match is found, the next guess series goes from “AA” to “zz” and then adds a third value (“AAA” to “zzz”). Because of the nature of this routine, this type of attack usually occurs over a long period of time. To make passwords more difficult to guess, they should be much longer than two or three characters (six should be the bare minimum), be complex, and have passwo...

Google releases iPhone hacking tool for security researchers

 Google Project Zero, released a proof-of-concept tool on Monday that allows security researchers and other developers to hack into iOS 11.1.2, a recent version of Apple’s operating system. This could open up the possibility of jailbreak for devices such as iPhones and iPads running iOS 11.1.2. For those unaware, Google’s Project Zero identifies bugs and exploits in all kinds of software of various companies to make them safer. According to Beer , the  tool released  takes advantage of an exploit called “tfp0”. Beer says the tool was tested on iPhone 6s, iPhone 7 and iPod touch 6G. However, he believes that with some tweaks, the tool should work on all devices. “tfp0 should work for all devices, the POC local kernel debugger only for those I have to test on (iPhone 7, 6s and iPod Touch 6g) but adding more support should be easy,” Beer  wrote  . The Google researcher last week teased this release in a tweet that asked the iOS 11 kernel security rese...

20 Run Commands Every Windows User Should Know

Run commands are one of the most useful things we can talk about. We are going to talk about ten useful ‘Run’ Commands that will help you to open anything. You just need to enter these commands in the Run command box to quickly access features and applications to customize operative system environment. 20 Run Commands Every Windows User Should Know We must admit that Microsoft’s Windows Operating system implements many features. That’s the reason why Windows is always the first preference of every regular user as it is easy to operate and implements lots of facilities. Well, Run commands are one of the most useful things we can talk about. Previously we have shared an article in which we have listed few methods to  create your own run commands  in Windows operating system. In this post, we are going to talk about ten useful ‘Run’ Commands that will help you to open anything. You just need to enter these commands in the Run command box to quickly access features...

How to Secure Your Computer By Blocking Dangerous IP Addresses Automatically

Image
Securing your computer or any digital device is an essential thing today. You have to protect your personal and professional information from hackers and other malicious users. In many ways you can protect your system such as using Antivirus products, Anti-Malware products and other security tools. However, If you are using internet to browse sites and download files, you may need another layer of protection to avoid the dangerous and malicious internet systems. There is a free tool called Bot Revolt will block the dangerous IP’s automatically and protect you. What is it and How it is Helpful Bot Revolt free is the security tool that helps your computer to block the dangerous (Malicious) IP address connections. That is, Bot Revolt will scan each and every connection that made by your computer to other and vice versa. The bot Revolt will compare all incoming and outgoing connections with Black list databases (sources include BlockList Pro, I-BlockList, FraudWatch International...

How to Activate ‘God Mode’ (All Settings) in Windows 10

Image
God Mode (for the naming fun) is a hidden Windows feature which is very much like the Control Panel, but more advanced.  God Mode exposes nearly every setting available in Windows 10 and hence makes locating and tweaking certain options easier. However, no matter how good it sounds, it still misses out on the settings which are only available via the Settings app. If you are interested in checking out God Mode on your Windows 10 PC, here’s how to get it activated. Accessing the All Settings mode or God Mode To access the list of settings or the God Mode you just need to create a folder with a special name (or extension) which will convert it into the gateway to the God Mode instead of being a regular folder. Right click on your desktop and select New> Folder. You can do this in any other location, but Desktop seems like the most appropriate place for such an option. Name the folder as following  (Copying and pasting works best): GodMode.{ED7BA470-8E54-465E...

How to Crack Wifi Wpa And Wpa2 Password Using Fern WIfi Cracker In Kali Linux?

Image
Here is a simple method to hack wifi wpa and wpa2 passwords using a tool called fern wifi cracker, All you need to do is open fern wifi cracker, select the network, insert wordlist and wait util you get the password, as its very easy probability of getting password is very low THIS IS FOR EDUCATIONAL PURPOSE ONLY, I AM NOT RESPONSIBLE FOR ANY ILLEGAL ACTIVITIES DONE BY VISITORS, THIS IS FOR ETHICAL PURPOSE ONLY Requirements : 1) Kali Linux Operating System on your pc or Live Boot I would like you to let you know about few things about wifi hacking A single method cannot hack all the wifi passwords of networks around youEach method has its own limitations If an attack is not successful on your first try, do not worry -try and try until you get the password or until you understand what the problem is Hacking wifi in windows is a very easy method but it cannot hack wifi passwords of  all the networks. It can hack only WPS Enabled networks that too not all the networks. ...