Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
Turn that bluetooth off

BlueBorne: Turn that Bluetooth off

Cyber Resilient SMEs

Cyber Resilient SMEs

Career in Cyber Security

Cyber Security Education & Career

SLAE: Assignment #2

Uday Mittal January 16, 2019 Leave a Comment

SLAE: Assignment #2

Assignment Task: Create a Shell_Reverse_TCP shellcode Reverse connects to configured IP and Port Execs shell on successful connection IP and Port should be easily configurable The TCP reverse shell is used to connect back to the attacking machine, with an interface to execute commands on the target machine. The TCP reverse shell code consists of […]

Filed Under: Skills Development, SLAE

SLAE: Assignment #1

Uday Mittal January 16, 2019 Leave a Comment

SLAE: Assignment #1

Assignment Task: Create a Shell_Bind_TCP shellcode Binds to a port Execs shell on incoming connection Port number should be easily configurable The TCP bind shell is used to setup a listener (or server) on the target machine which allows the attacker machine to execute commands on the said machine. The TCP bind shell code consists […]

Filed Under: Skills Development, SLAE

Uday Mittal December 9, 2018 Leave a Comment

AttackDefense: Meterpreter Basics Walk-through

This video gives a walk-through of AttackDefense Meterpreter Basics lab. To visit AttackDefense Labs, use the following URL: http://public.attackdefense.com/

Filed Under: Hacks

Uday Mittal November 27, 2018 Leave a Comment

AttackDefense: TShark Basics Walk-through

This video gives a walk-through of AttackDefense TShark Basics lab. To visit AttackDefense Labs, use the following URL: http://public.attackdefense.com/  

Filed Under: Under the Hood

Uday Mittal May 6, 2018 Leave a Comment

Steal Windows Credentials using a PDF File (NTLM Hash)

This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files.

Filed Under: Awareness Tagged With: BadPDF, NTLM Hash leak, Password, pdf, phishing, Steal windown username and password, username, Windows

Uday Mittal May 4, 2018 Leave a Comment

Hack Windows 7 SP1 in 3 mins: Using NSA Hacking Tools

In this video, see NSA hacking tools in action. It is easy to hack Windows machines using these tools. It uses EternalBlue vulnerability and DoublePulsar backdoor implant tool.

Filed Under: Awareness Tagged With: doublepulsar, empire, equation group, eternalblue, fuzzbunch, NSA, Shadow broker, smb exploit

Uday Mittal April 28, 2018 Leave a Comment

Durpalgeddon2: Patch or Be Hacked

This video gives a brief overview of Drupal vulnerability, Drupalgeddon 2. It also shows how to exploit drupalgeddon2.

Filed Under: Awareness Tagged With: Drupal, Drupalgeddon2, Drupalgeddon2 exploit, hack drupal

Google Play Protect: Android’s New Security System

Kiruthika Ramesh September 29, 2017 Leave a Comment

Google Play Protect: Android’s New Security System

Now more than ever, mobile device users are conscious about significant advances in both device and OS security. Every time a new build of a mobile operating system is released, it includes a variety of new safety features. This time Google has taken a significant step forward with Google Play Protect.  Since it was launched […]

Filed Under: Mobile Security Tagged With: Android, Google Play, Google Play Protect, Mobile Security

Here’s how to ensure online safety of your children

Uday Mittal September 17, 2017 Leave a Comment

Here’s how to ensure online safety of your children

The BlueWhale challenge has been an eye-opener for parents across the world. It has revealed another ugly side of the internet connected world. Easy manipulation of vulnerable children and teenagers by unknown people. This has now become an additional online safety concern for parents along with online pedophiles, cyberbullying, cyberstalking and internet-trolling. Dealing with proliferation […]

Filed Under: Awareness Tagged With: blue whale challenge, bluewhale, child, children safe, Online Safety, online safety tips kids, safety tips parents

BlueBorne: Turn that Bluetooth off

Uday Mittal September 14, 2017 Leave a Comment

BlueBorne: Turn that Bluetooth off

A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]

Filed Under: Awareness Tagged With: Android, Armis, BlueBorne, Blueborne attack, Bluetooth, iOS, Linux, Windows

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 8
  • Next Page »

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux lab environment lab hardware Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

Top Posts

  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Active Directory Network Recon using PowerView
    Active Directory Network Recon using PowerView
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Introduction to MITRE ATT&CK Framework
    Introduction to MITRE ATT&CK Framework

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress