Prodefence Security News

Security news from our website.
Everything started from a google search for infected files. The most commun are crack, keygen etc. I’ve found a “hide ip keygen” and the link locations was very unusual…. Google Maps.  The google maps mark send’s me to some .ru link for...

Everything started from a google search for infected files. The most commun are crack, keygen etc. I’ve found a “hide ip keygen” and the link locations was very unusual…. Google Maps. The google maps mark send’s me to some .ru link for...

British Police arrested two men suspected of being member of a large organization than plans to hack Microsoft Networks. Investigators have arrested two men in the UK in connection with an international plot to hack the Microsoft network. Agents at the South East Regional Organised Crime Unit,...

British Police arrested two men suspected of being member of a large organization than plans to hack Microsoft Networks. Investigators have arrested two men in the UK in connection with an international plot to hack the Microsoft network. Agents at the South East Regional Organised Crime Unit,...

In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server’s memory that may contain authentication credentials, cookies, the servers private key, and personally...

In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server’s memory that may contain authentication credentials, cookies, the servers private key, and personally...

The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP address in the IP header. When we make a TCP...

The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP address in the IP header. When we make a TCP...

Recently, I showed you how you could exploit the widely disseminated OpenSSL vulnerability that has to become known as «Heartbleed«. Although the world has known about this vulnerability for over a month now, it will likely take many more months—or even years—for everyone to close this...

Recently, I showed you how you could exploit the widely disseminated OpenSSL vulnerability that has to become known as «Heartbleed«. Although the world has known about this vulnerability for over a month now, it will likely take many more months—or even years—for everyone to close this...

Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known vulnerabilities and will scan your machine or network to see whether those vulnerabilities appear to exist. If they do, it is your job to test whether...

Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known vulnerabilities and will scan your machine or network to see whether those vulnerabilities appear to exist. If they do, it is your job to test whether...

Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corresponding with and want to make certain they are where they...

Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corresponding with and want to make certain they are where they...

If we are considering a social engineering attack against a target, we are probably going to need email addresses. By having the email addresses of people within an organization, we can tailor our social engineering attack to particular people and circumstances within that organization (e.g., a...

If we are considering a social engineering attack against a target, we are probably going to need email addresses. By having the email addresses of people within an organization, we can tailor our social engineering attack to particular people and circumstances within that organization (e.g., a...

As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such...

As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such...

Pinterest
Caută