👁 Selection of IpLogger services

IpLogger is a useful tool in deanonymizing a user on the network. There are many applications to be found. For example, with the help of such a service, you can create a trap link, when the victim clicks on it, you will get her Ip address. Or you can create a logger image by sending a photo to a person on VKontakte. or in the format of a "tracking" pixel 1x1 and paste it on your website / article / message. 

Suddenly, out of nowhere, the CIA appeared.

Researchers from the Netlab team of the Chinese infosec vendor Qihoo 360 last week released a report on the Hive modification caught in the wild for the first time.

 

👨‍💻 Purple Team.

• Purple Team — Helps the Red Team and Blue Team to be friends with each other, allowing the blue team to develop a strategy and technical measures to protect the infrastructure based on the vulnerabilities and shortcomings discovered by the red team. The task of such a team is to ensure and maximize the efficiency of all teams.

👨🏻‍💻 Steganography. Useful tools and resources.

• Steganography — for the first time this term was mentioned in 1499, and even then this word meant the transmission of information by keeping the fact of transmission secret. Oddly enough, nowadays steganography has not received widespread recognition among hackers, although it cannot be said that it has not been resorted to at all.

💬 true story... How I was hacked, my cryptocurrency wallets were emptied, and what Apple said.

• The story of how the creator of the website for job search in the field of cryptocurrencies cryptojobslist withdrew personal savings in cryptocurrency, simultaneously gaining access to Apple, Yahoo, Gmail and Telegram accounts with two-factor authentication enabled.

💬 true story... Christopher Rocancourt. The story of a famous conman and a $40 million fraud.

• At one time, writers Ilya Ilfov and Evgeny Petrov created a literary image of the “great combinator” Ostap Bender, who was able to "take" money in "four hundred comparative honest ways." One of his modern prototypes is Christophe Rocancourt. The only difference is that Bender called himself the son of a Turkish citizen, and the modern "combinator" is a descendant of Rockefeller.

💬 true story... What are the risks of pentesters trying to hack your company. Part 1.

• There have been no interesting stories from the lives of pentesters and social engineers for a long time, and to be honest, I missed this category. Today we will add another fascinating story to our list. Enjoy reading.

💬 true story from Group IB... False alarm.

• Today I found for you another and interesting story from Group IB, accepted reading:

💬 true story... The enemy is inside: how I got caught on insider redtiming.

• I had all the advantages. I've already been online. I was above suspicion. But they discovered my hacking, kicked me out of the network... and tracked me down physically.

Site Search

Site Menu


☑ Scripts Software

Calendar

«    May 2024    »
MonTueWedThuFriSatSun
 12345
6789101112
13141516171819
20212223242526
2728293031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +7 Total articles 5598
  • +19 Comments 3093
  • +34 Users : 4005