So this is going to sound completely stupid. But back in 2016 I created my first Roblox account. Stupid little me decided “I should put gibberish as my password” (Foreshadowing am I right), fast forward to 2018 I decided to make an alt while completely…
submitted by /u/Bellagio_Sampler [link] [comments]
https://www.bbc.com/news/technology-59998925 submitted by /u/UserNoName6 [link] [comments]
submitted by /u/thegreatblazed [link] [comments]
So I’m writing a DDoS program in python just for educational purposes and I was testing it against my website. As I’m using cloud flare the DDoS protection came through and I started receiving a 429 error on my program. I’m just curious is there any w…
Microsoft spotted a new destructive malware operation targeting government, non-profit, and IT entities in Ukraine. Microsoft spotted a destructive attack that targeted government, non-profit, and IT entities in Ukraine with a wiper disguised as ransomware. The attackers were discovered by Microsoft on January 13, the experts attributed the attack to an emerging threat cluster tracked […]
The post Microsoft spotted a destructive malware campaign targeting Ukraine appeared first on Security Affairs.
Hey guys right now i attend at a security course at my university. The topic is "basic fundamentals of hacking tools". And i wanted to ask you for any advice on how i can split these tools in some cathegorys. so far I have the cathegorys: P…
QNAP NAS devices are under attack, experts warn of a new Qlocker ransomware campaign that hit devices worldwide. A new wave of Qlocker ransomware it targeting QNAP NAS devices worldwide, the new campaign started on January 6 and it drops ransom notes named !!!READ_ME.txt on infected devices. In May, the Taiwanese vendor QNAP warned its […]
The post A new wave of Qlocker ransomware attacks targets QNAP NAS devices appeared first on Security Affairs.
I recently watched this video on YouTube: ARP Poisoning | Man-in-the-Middle Attack by CertBros
Does this method also work as in the common case, when the MAC address has been spoofed, if an attacker wanted an extra layer of concealment? Also, ARP Poisoning MITM with a force disconnect kind of attack to intercept TLS key generation communications and create the new key at the same time as the target system; is that possible?
Any tutorial-like reads to test the procedures out, if any of the above are feasible, are most welcome. 😁
Disclaimer: I am a university student, self-studying NetSec on my free time. My interests are completely educational, with a professional (legal) end. My current skills are beyond a beginner’s, but below average (in my opinion). I do have a homelab set-up. (I wanted to have everuthing in the clear, so that only productive comments may be found below. Thank you all in advance!)