Ethical Hacking

Buffer overflow Beginner To Advance part1

Greeting Everyone! Today we will learn how to exploit buffer overflow using with immunity debugger and mona modules. Steps I covered in buffer overflow. Spiking Fuzzing Finding the offset Overwriting the EIP (Extended instruction pointer) Finding the bad characters Finding the right module Generate shell code and gain shells Download vulnserver – https://github.com/stephenbradshaw/vulnserver Download immunity …

Buffer overflow Beginner To Advance part1 Read More »

WiFi jamming: a ‘DOS/Deauth attack’

WiFi jamming allows us to take rogue stations/clients off our network. Software does this using de-authentication attack where it will flood the target access-point(AP) with deauth packets. This will cause the target AP to disconnect the clients from the network. It doesn’t involve the actual jamming of radio frequencies, which can be done using tool …

WiFi jamming: a ‘DOS/Deauth attack’ Read More »

Crypto Mining in Tesla Motors | Securium Solutions Pvt Ltd

TESLA FALLS VICTIM FOR CRYPTO ATTACK

Hello Everyone, Tesla Motors recently announced its entry in India through tax-friendly jurisdiction of Dutch to invest in India. Tesla has registered its Indian Subsidiary in Bangalore and finalized its headquarters also along with 3 Directors appointed. But Tesla needs to consider their Security Measures also, Yes. Recent attacks on illicit Cryptocurrency mining now targets …

TESLA FALLS VICTIM FOR CRYPTO ATTACK Read More »