Changing your voice 💻
People often change their voice on audio recordings — to preserve anonymity or just to make fun of friends. For example, to say something frightening in the voice of a monster.
Changing your voice 💻
People often change their voice on audio recordings — to preserve anonymity or just to make fun of friends. For example, to say something frightening in the voice of a monster.
🔎 Scanners Box. Scanners for every taste and color.
• There are no universal tools, and vulnerability scanners are no exception to this rule. Scanners are available with a free license and commercial. As you have already guessed, our channel is aimed at covering open source software and publishing material for free, which is why today I will share with you an excellent resource where various scanners are collected for any need.
👁 Selection of IpLogger services
IpLogger is a useful tool in deanonymizing a user on the network. There are many applications to be found. For example, with the help of such a service, you can create a trap link, when the victim clicks on it, you will get her Ip address. Or you can create a logger image by sending a photo to a person on VKontakte. or in the format of a "tracking" pixel 1x1 and paste it on your website / article / message.
👨💻 Purple Team.
• Purple Team — Helps the Red Team and Blue Team to be friends with each other, allowing the blue team to develop a strategy and technical measures to protect the infrastructure based on the vulnerabilities and shortcomings discovered by the red team. The task of such a team is to ensure and maximize the efficiency of all teams.
👨🏻💻 Steganography. Useful tools and resources.
• Steganography — for the first time this term was mentioned in 1499, and even then this word meant the transmission of information by keeping the fact of transmission secret. Oddly enough, nowadays steganography has not received widespread recognition among hackers, although it cannot be said that it has not been resorted to at all.
💬 true story... How I was hacked, my cryptocurrency wallets were emptied, and what Apple said.
• The story of how the creator of the website for job search in the field of cryptocurrencies cryptojobslist withdrew personal savings in cryptocurrency, simultaneously gaining access to Apple, Yahoo, Gmail and Telegram accounts with two-factor authentication enabled.
💬 true story... Christopher Rocancourt. The story of a famous conman and a $40 million fraud.
• At one time, writers Ilya Ilfov and Evgeny Petrov created a literary image of the “great combinator” Ostap Bender, who was able to "take" money in "four hundred comparative honest ways." One of his modern prototypes is Christophe Rocancourt. The only difference is that Bender called himself the son of a Turkish citizen, and the modern "combinator" is a descendant of Rockefeller.
💬 true story... What are the risks of pentesters trying to hack your company. Part 1.
• There have been no interesting stories from the lives of pentesters and social engineers for a long time, and to be honest, I missed this category. Today we will add another fascinating story to our list. Enjoy reading.
💬 true story from Group IB... False alarm.
• Today I found for you another and interesting story from Group IB, accepted reading:
💬 true story... The enemy is inside: how I got caught on insider redtiming.
• I had all the advantages. I've already been online. I was above suspicion. But they discovered my hacking, kicked me out of the network... and tracked me down physically.
💬 true story... Jonathan James. The story of a hacker who hacked the Pentagon and NASA at the age of 15.
The most difficult thing is not getting into the system, but learning and gaining knowledge so that you can then understand what can be done with it.
💬 true story... Social Engineering.
• Today we are talking about social engineering, namely the hacking of the American prison system with the help of #SI. Kevin Mitnick argued that no technology in the world can resist a social engineer, since people are easy to manipulate, and even in the most secure systems, it is people who can be the weak link.