Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Mona.py for exploit devs: 6 must know commands

Uday Mittal July 23, 2019 Leave a Comment

Mona.py for exploit devs: 6 must know commands

When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration. What is Mona.py? A pycommand for Immunity Debugger, designed and developed to aid the exploit development process Automates various tasks […]

Filed Under: Hacks, Technology Tagged With: bad character analysis, corelan, corelancoder, Cyber Security, ethical hacking, exploit development, immunity debugger, infosec, mona library, offensive security, osce, oscp, Peter Van Eeckhoutte

Understand and restrict admin access in your organization

Uday Mittal July 15, 2019 Leave a Comment

Understand and restrict admin access in your organization

In today’s time, providing users with unjustified administrator access on their work systems, could lead to significant business loss. A careless user may download a benign looking file and the next moment you may find yourself battling an organization wide ransomware attack. Here’s a quick guide for small business owners on how to tame this […]

Filed Under: Awareness, Technology Tagged With: administrator access restriction, cybersecurity, Information Security, least privilege, secure access

Google Play Protect: Android’s New Security System

Kiruthika Ramesh September 29, 2017 Leave a Comment

Google Play Protect: Android’s New Security System

Now more than ever, mobile device users are conscious about significant advances in both device and OS security. Every time a new build of a mobile operating system is released, it includes a variety of new safety features. This time Google has taken a significant step forward with Google Play Protect.  Since it was launched […]

Filed Under: Mobile Security Tagged With: Android, Google Play, Google Play Protect, Mobile Security

Make Remote Access Your Ally

Uday Mittal March 23, 2016 Leave a Comment

Make Remote Access Your Ally

Today, every organization, big or small, is looking for a way to increase the productivity of their employees. They offer employees various kinds of flexibility options to help them achieve the much sought after work life balance. One such option is providing remote access to corporate network. Through this functionality employees can access their office […]

Filed Under: Technology Tagged With: Authentication, Information Security, Logs, Remote Access

Hacking the Internet of Things: How Easy Is It?

Jen Martinson March 2, 2016 1 Comment

Hacking the Internet of Things: How Easy Is It?

One of the buzzword in the tech world these days is the Internet of Things and the idea behind it is that in near future all of our home appliances (among other things) will be connected to the internet and controlled by it. We will be able to set our toasters from our smartphones. Our […]

Filed Under: Awareness, Internet of Things Tagged With: hacker, Internet of Things, IoT Security, smartphone, Wifi

6 Tips for MDM Solution Evaluators

Uday Mittal August 19, 2015 Leave a Comment

6 Tips for MDM Solution Evaluators

A while ago, I did a project for one of the Big 4 in Indian telecom industry. The project was to select and implement a Mobile Device Management (MDM) solution for the organization. During the project, I evaluated most of the market leading products. Given that it’s a nascent niche, the products are evolving fast […]

Filed Under: Mobile Device Management Tagged With: MDM, Mobile Device Management, mobile devices

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress