Skip to main content

Posts

Showing posts from July, 2021

Pegasus Spyware

What is Pegasus,how it is installed,what it does, how to be detect? For all the questions here the solution, before that we can see what is Pegasus and what it will does. What is Pegasus? Pegasus, developed by Israeli cybersecurity firm NSO Group, is a highly sophisticated spyware that has been referred to as the “most sophisticated smartphone attack ever”. Pegasus is a program that allows the controller (a person who has injected the spyware) can access to the infected smartphone’s microphone, camera, messages, emails, and collect location data also. As per a Kasp e rsky report, Pegasus even allows you to listen to encrypted audio streams and read encrypted messages. In one word to say is“ hacker has the access to the entire phone ”. Pegasus was first noticed in 2016 but it created a lot of buzz in late 2019 when it was revealed that the spyware was used for snooping on journalists and human rights activists across the globe, including in India. And now Now, It was a news Published by

CAPTURE THE FLAG(CTF)

What Is CTF? Capture the flag CTF (Capture The Flag) is a kind of information security competition that challenges contestants to  s olve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these competition , the participant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag. CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a larg cash reward and can be held at a specific physical location. Other events target thehigh school and college student range, sometimes offering monetary support for education to those that place highly in the competition! Types of CTF CTF may conduct in two types:- Jeopardy-style:  Jeopardy style CTFs consist of multiple separate challenges which need to be solved to score points. The style is

SOCIAL ENGINEERING

  What is Social Engineering? Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. Psychological manipulation of people into performing actions or divulging confidential information. Getting the required data by manipulating the human mind. Social Engineering Lifecycle InformationGathering Gather the required information to attack the target. use OSINT to gather information. Extracting information from google search. prioritize the information. verify the information. plan the attack. Establishing a Relationship with the target Engage with the target. create a story. Interact with the target. Exploitation Maintain the story. Extarct information . Exit Closes interaction. Cover tracks. Traits of Social Engineering Attacks Social engineering attacks center around the attacker’s use of persuasion and confidence. Heightened emotions  : Emotional manipulation gives attackers the upper hand in an any interaction.The following