Skip to main content

Posts

Top Ransomeware attacks in 2021?

The number of ransomware attacks nearly doubled in the first half of 2021. According to research, 1,097 organizations were hit by ransomware attacks in the first half of 2021. In contrast, our 2020 report found 1,112 ransomware attacks for the entire year. Also in 2021 major companies were affected by ransomeware attacks. Ransomeware 😂😂 Before enter, a small definition about ransomeware for the people who doesn’t know anything about ransomeware. 😆😆😆 What is Ransomeware? Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In simple words I think now cleared about ransomeware. Top ransomeware attacks in 2021? Big compaines be like🤣. Colonial Pipeline Company The Colonial Pipeline attack made such an impact because the pipeline is an important part of the national critical infrastructure system. Taking the system down disrupted gas s
Recent posts

Extract Information From IP Address

Before Enter into the blog a small Disclamier use this for Educational and Research Purposes only. Don’t do this for any illegal activity the creator is not responsible for your activity. This is only for OSINT Investigation. There are several ways to get information about IP address. But this tool can give infomation about IP and detect the the IP is using VPN or Not. This tool is completely developed with python. Open Terminal, you can use google cloud console terminal also. Go to https://github.com/maari-krish/Ipinfoga Clone the Repository. Follow the Installing Steps which mentioned in github repository. Here i hide the IP. You please the enter the ip and move on.You can open the gps location in your browser which it is precised location not the exact location of the IP. To detect the IP is using vpn it is in different repository. But i combined the code and give it. Source code is given below. Go to https://github.com/maari-krish/Vpn-Detector Follow the steps given in the reposito

How to Extract Informatiom from Mobile Numbers?

Before Enter into the blog a small Disclamier use this for Educational and Research Purposes only. Don’t do this for any illegal activity the creator is not responsible for your activity. Want to get information from Phone Number for OSINT Investigation. Use this to tool to extract information from phone numbers. This tool is completely developed with python. The source code of the program is also attached here(down). Here i use Google Cloud Console terminal you can use any other terminal also.  Go To  https://github.com/maari-krish/Phoneinfoga And then clone the Repository. Follow the Installing Steps which mentioned in github repository. And then enter the mobile number with country code. And then see the result. Your output will look like this. Here i hide the phone number for security purposes. You can open the gps location in your browser which it is precised location not the exact location of the number. We can use another tool also. Go to terminal and type for installation:- doc

How does Browser know where you want to go on the internet?

Go to Microsoft Edge Browser or any other Chromium-based browser such as Google Chrome or Brave and start typing into the address bar (actually called the omnibar). The browser starts showing you stuff. It is not just random stuff. How does this work? How does the browser figure out what to show you? Well, there’s a setting that allows you to get a peek behind the curtains and get a glimpse at what’s going on. To see what’s going on, type the following into Microsoft Edge omnibar and press enter: edge://omnibox/ Note: This varies for other Chromium browsers. For example, Google Chrome’s type chrome://omnibox/ and for Brave use brave://omnibox/ . Now you will get a search box and lot of settings and options. Start typing into the box and information will pop up. Information that’s based on both your history, search results, and even things like your bookmarks. If you start typing in a URL that you visit often, the browser will show you a lot more details, such as when you last visited

Tech In Next 4 years

  As per Survey of Forbes and Science Focus they predicted that this technology is going to revolution the world in next 5 years. Every day, people around the world come up with new ways to make the future brighter. We’ve put together a list of some of the most exciting advances in future technology that will change our world. Artificial Intelligence (AI) and Machine Learning As we all Know the Artifical Intell i gence going to rule the world in next 5 years.The increasing ability of machines to learn and act intelligently will absolutely transform our world. It is also the driving force behind many of the other trends on this list. Robots and Cobots. We all know that Robots are how helpful in during COVID days. Today’s robots are more intelligent than ever, learning to respond to their environment and perform tasks without human intervention. In certain industries, the future of work is likely to involve humans working seamlessly with robot colleagues — hence the term “cobot,” or “col

Pegasus Spyware

What is Pegasus,how it is installed,what it does, how to be detect? For all the questions here the solution, before that we can see what is Pegasus and what it will does. What is Pegasus? Pegasus, developed by Israeli cybersecurity firm NSO Group, is a highly sophisticated spyware that has been referred to as the “most sophisticated smartphone attack ever”. Pegasus is a program that allows the controller (a person who has injected the spyware) can access to the infected smartphone’s microphone, camera, messages, emails, and collect location data also. As per a Kasp e rsky report, Pegasus even allows you to listen to encrypted audio streams and read encrypted messages. In one word to say is“ hacker has the access to the entire phone ”. Pegasus was first noticed in 2016 but it created a lot of buzz in late 2019 when it was revealed that the spyware was used for snooping on journalists and human rights activists across the globe, including in India. And now Now, It was a news Published by

CAPTURE THE FLAG(CTF)

What Is CTF? Capture the flag CTF (Capture The Flag) is a kind of information security competition that challenges contestants to  s olve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these competition , the participant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag. CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a larg cash reward and can be held at a specific physical location. Other events target thehigh school and college student range, sometimes offering monetary support for education to those that place highly in the competition! Types of CTF CTF may conduct in two types:- Jeopardy-style:  Jeopardy style CTFs consist of multiple separate challenges which need to be solved to score points. The style is