Loading…

Kaspersky Cyber Attack Map

I recently introduced the FireEye Cyber ​​Threat Map, which clearly illustrates all cyberattacks in real time. Another well-presented alternative is Kaspersky’s Cyber ​​Attack Map. Link to the Kaspersky Cyber ​​Attack Map Link to the Kaspersky Cyber ​​Attack Map  

AirDrive Keylogger – Forensisches Keyloggerkabel

Bereits vor einiger Zeit habe ich über den AirDrive Keylogger berichtet. Er verfügt über eine Wi-Fi Funktion und baut dafür ein eigenes Netzwerk auf. Nun hat AirDrive ein neues Produkte veröffentlicht, ein Keylogger in Form von einem USB Verlängerung Übersicht Arbeitet als WiFi-Hotspot, Verbindungsmöglichkeit von jedem Computer, Smartphone oder Tablet Zugriff auf die Tastenanschlagsdaten über den Webbrowser, […]

USB Password Stealer Turorial

Every security system has a vulnerability and all security systems have the same vulnerability – Human. Most people simply tick “Remember Me” on the websites they visit, as this is convenient. This happens especially often on private computers, which are not used by others, but often also on service devices, to which a hacker has […]

Fireeye Cyber Threat Map

FireEye, Inc. is a publicly traded company based in Milpitas, California, USA that provides network security software and services. It gained notoriety among other things with the discovery of several zero-day gaps in Microsoft’s Internet Explorer and participation in investigations of and actions against several botnets. A free Fireeye service is the browser-based Fireeye Cyber […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 6 – Rubber Ducky

In an episode of Mr. Robot, Mobley gives Angela a Rubber Ducky. If she does not get the femtocell up and running, Mobley says she can simply plug in the USB flash drive, wait a few seconds and then pull out. What’s it all about? The USB Rubber Ducky is a keystroke injection tool disguised […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 5 – Malware USB Sticks

USB sticks actually serve as storage media, but USB sticks can also be used as attack tools. The curiosity of what is probably for data on a found USB stick, entices many people to simply plug the USB stick into their computer. Once that happens, attackers have many options. In this tutorial, I’ll show you […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 4 – Social Engineering

You would not borrow your phone to a stranger in a hoodie? In one episode, Elliot asks Krista’s friend if he can use his cell phone to make a phone call. Then he calls himself and gets the phone number  of the victom and finally, access to many more private information. The exploitation of trust […]