Learning

Buffer overflow Beginner To Advance part1

Greeting Everyone! Today we will learn how to exploit buffer overflow using with immunity debugger and mona modules. Steps I covered in buffer overflow. Spiking Fuzzing Finding the offset Overwriting the EIP (Extended instruction pointer) Finding the bad characters Finding the right module Generate shell code and gain shells Download vulnserver – https://github.com/stephenbradshaw/vulnserver Download immunity …

Buffer overflow Beginner To Advance part1 Read More »

Crypto Mining in Tesla Motors | Securium Solutions Pvt Ltd

TESLA FALLS VICTIM FOR CRYPTO ATTACK

Hello Everyone, Tesla Motors recently announced its entry in India through tax-friendly jurisdiction of Dutch to invest in India. Tesla has registered its Indian Subsidiary in Bangalore and finalized its headquarters also along with 3 Directors appointed. But Tesla needs to consider their Security Measures also, Yes. Recent attacks on illicit Cryptocurrency mining now targets …

TESLA FALLS VICTIM FOR CRYPTO ATTACK Read More »

Ransomware 2021

Ransomware 2021 – Babuk Locker

Hello Everyone, After an awful year of the decade due to Covid-19 We all are advised to be careful by adhering preventive measures. But Still we are not safer in our cyber space from the dangerous Malware Ransomware. Yes, First Ransomware of 2021 hits the world with the name of Babuk Locker in the very …

Ransomware 2021 – Babuk Locker Read More »

What is cURL & Usages ?

Greeting everyone! Hope everything is going good Today in this blog post we are going to discuss how to use cURL command cURL is Basically Linux CLI Command which is transferring data using various network protocols which Helps Tester, Administrator to utilize and check all Response from live server Network infrastructure. cURL Transfer data using …

What is cURL & Usages ? Read More »