Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Mona.py for exploit devs: 6 must know commands

Uday Mittal July 23, 2019 Leave a Comment

Mona.py for exploit devs: 6 must know commands

When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration. What is Mona.py? A pycommand for Immunity Debugger, designed and developed to aid the exploit development process Automates various tasks […]

Filed Under: Hacks, Technology Tagged With: bad character analysis, corelan, corelancoder, Cyber Security, ethical hacking, exploit development, immunity debugger, infosec, mona library, offensive security, osce, oscp, Peter Van Eeckhoutte

Would Trump trump his promise on Cybersecurity?

Uday Mittal November 16, 2016 Leave a Comment

Would Trump trump his promise on Cybersecurity?

It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]

Filed Under: Awareness, Opinion Tagged With: Cyber Security, cyber-warfare, Narendra Modi, Trump

Effects of Currency Ban on Cyber Security

Uday Mittal November 12, 2016 Leave a Comment

Effects of Currency Ban on Cyber Security

On 8th November, 2016, our honorable Prime Minister Shri. Narendra Modi, in his speech addressing the nation, announced that the currency notes of denomination 500 and 1000 would cease to be legal tender from the midnight of November 8. Following are key points concerning the currency ban (source: The Hindu): These notes can be deposited […]

Filed Under: Awareness Tagged With: cashless, currency ban, Cyber Security, Narendra Modi

What you need to know about XKeyScore: NSA’s Mass Surveillance Tool

Uday Mittal July 25, 2016 Leave a Comment

What you need to know about XKeyScore: NSA’s Mass Surveillance Tool

In this video, we give you a peek into the world’s supreme intelligence gathering tool, XKeyScore. Developed by the NSA, XKeyScore has been widely criticized ever since it’s existence became known through the documents leaked by Edward Snowden in 2013. Watch the video till the end to know why.     Uday MittalUday Mittal is […]

Filed Under: Awareness Tagged With: Cyber Security, Edward Snowden, Intelligence Gathering, Mass Surveillance, NSA, XKeyScore

7 Ways to Cover Your Device’s Camera

Uday Mittal July 17, 2016 Leave a Comment

7 Ways to Cover Your Device’s Camera

Have you ever wondered that somebody might be watching you through your laptop’s webcam or smartphone’s camera? Or that while your laptop or smartphone stays on, in your bedroom, somebody might be recording your each and every act? Cracking into device cameras has been around ever since they were commercialized. Most of the devices we […]

Filed Under: Awareness Tagged With: Cyber Security, hacking, privacy, smartphone camera, Webcam, Webcam cover

Mr. Robot: Fsociety deploys ransomware

Uday Mittal July 11, 2016 Leave a Comment

Mr. Robot: Fsociety deploys ransomware

If you’ve been following the news, you would have come across a term called Ransomware. It is a type of computer virus which uses encryption as a weapon for destruction rather than protection of data. It encrypts files on an infected system and then demands a ransom, from the user of the infected machine, to decrypt […]

Filed Under: Recommended TV Shows Tagged With: cryptowall, Cyber Security, fsociety, Mr. Robot, Ransomware

DDoS Attacks: When Servers Won’t Serve

Subham Mishra June 13, 2016 Leave a Comment

DDoS Attacks: When Servers Won’t Serve

DDoS stands for Distributed Denial of Service. DDoS is a type of attack in which multiple computers (for example a botnet) are used, to flood a single computer or a network with non-legitimate service requests to overload its resources. It is rare that a week goes by without news of some organization being impacted by […]

Filed Under: Under the Hood Tagged With: Cyber Security, DDoS, Denial of Service, Distributed Denial of Service, DoS, Patch, Ping of Death, SYN Flood

Safety Tips for Your Mobile Devices

Uday Mittal September 24, 2015 Leave a Comment

Safety Tips for Your Mobile Devices

That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]

Filed Under: Awareness Tagged With: Cyber Security, Mobile, Mobile Safety Tips, Mobile Security, Personal Information, Wifi

Updated: Comments on Draft National Encryption Policy

Uday Mittal September 22, 2015 Leave a Comment

Updated: Comments on Draft National Encryption Policy

Imagine, the Government issues a policy which states that you may lock your house but you have to leave the keys outside the house, at all times. The Government appointed officials may then at any time visit your house to see what’s going on inside. You have no choice but to comply. What would your […]

Filed Under: Awareness Tagged With: Cyber Security, Government of India, National Encryption Policy, privacy

Cyber Security Awareness 2.0

Uday Mittal September 21, 2015 2 Comments

Cyber Security Awareness 2.0

When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]

Filed Under: Awareness Tagged With: awareness, Cyber Security, facebook, Social Media, twitter, youtube

  • 1
  • 2
  • Next Page »

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress