Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Understand and restrict admin access in your organization

Uday Mittal July 15, 2019 Leave a Comment

Understand and restrict admin access in your organization

In today’s time, providing users with unjustified administrator access on their work systems, could lead to significant business loss. A careless user may download a benign looking file and the next moment you may find yourself battling an organization wide ransomware attack. Here’s a quick guide for small business owners on how to tame this […]

Filed Under: Awareness, Technology Tagged With: administrator access restriction, cybersecurity, Information Security, least privilege, secure access

Uday Mittal May 6, 2018 Leave a Comment

Steal Windows Credentials using a PDF File (NTLM Hash)

This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity […]

Filed Under: Awareness Tagged With: BadPDF, NTLM Hash leak, Password, pdf, phishing, Steal windown username and password, username, Windows

Uday Mittal May 4, 2018 Leave a Comment

Hack Windows 7 SP1 in 3 mins: Using NSA Hacking Tools

In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such […]

Filed Under: Awareness Tagged With: doublepulsar, empire, equation group, eternalblue, fuzzbunch, NSA, Shadow broker, smb exploit

Uday Mittal April 28, 2018 Leave a Comment

Durpalgeddon2: Patch or Be Hacked

This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. […]

Filed Under: Awareness Tagged With: Drupal, Drupalgeddon2, Drupalgeddon2 exploit, hack drupal

Here’s how to ensure online safety of your children

Uday Mittal September 17, 2017 Leave a Comment

Here’s how to ensure online safety of your children

The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]

Filed Under: Awareness Tagged With: blue whale challenge, bluewhale, child, children safe, Online Safety, online safety tips kids, safety tips parents

BlueBorne: Turn that Bluetooth off

Uday Mittal September 14, 2017 Leave a Comment

BlueBorne: Turn that Bluetooth off

A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]

Filed Under: Awareness Tagged With: Android, Armis, BlueBorne, Blueborne attack, Bluetooth, iOS, Linux, Windows

5 Tips for Safe Digital Payments

Uday Mittal September 12, 2017 Leave a Comment

5 Tips for Safe Digital Payments

Today, there are at least six methods through which goods and services can be paid for. These are net banking, mobile wallets, Unified Payments Interface (UPI) based apps, Aadhaar Enabled Payments System (AEPS), cards, USSD banking, Point of Sale (PoS), mobile banking, micro ATMs etc. All of these payment methods are geared towards promoting cashless […]

Filed Under: Awareness Tagged With: Aadhaar, AEPS, Cashless India, DigiDhan, Digital Payment, Digital Payment security tips, Mobile Wallet, UPI

Games can be replayed; not life – Bury the Blue Whale

Uday Mittal August 31, 2017 Leave a Comment

Games can be replayed; not life – Bury the Blue Whale

What is this Blue Whale Game? The Blue Whale Game is an internet game. It consist of series of tasks assigned to players / participants by administrators during a 50-day period. The final challenge requires the participants to commit suicide. What is the purpose of the game? The game is claimed to be invented by […]

Filed Under: Awareness Tagged With: blue whale challenge, blue whale game

Would Trump trump his promise on Cybersecurity?

Uday Mittal November 16, 2016 Leave a Comment

Would Trump trump his promise on Cybersecurity?

It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]

Filed Under: Awareness, Opinion Tagged With: Cyber Security, cyber-warfare, Narendra Modi, Trump

Effects of Currency Ban on Cyber Security

Uday Mittal November 12, 2016 Leave a Comment

Effects of Currency Ban on Cyber Security

On 8th November, 2016, our honorable Prime Minister Shri. Narendra Modi, in his speech addressing the nation, announced that the currency notes of denomination 500 and 1000 would cease to be legal tender from the midnight of November 8. Following are key points concerning the currency ban (source: The Hindu): These notes can be deposited […]

Filed Under: Awareness Tagged With: cashless, currency ban, Cyber Security, Narendra Modi

  • 1
  • 2
  • 3
  • Next Page »

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress