Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Uday Mittal May 6, 2018 Leave a Comment

Steal Windows Credentials using a PDF File (NTLM Hash)

This video demonstrates the recently discovered NTLM hash leak vulnerability via the PDF files. Uday MittalUday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity […]

Filed Under: Awareness Tagged With: BadPDF, NTLM Hash leak, Password, pdf, phishing, Steal windown username and password, username, Windows

BlueBorne: Turn that Bluetooth off

Uday Mittal September 14, 2017 Leave a Comment

BlueBorne: Turn that Bluetooth off

A cool thing about Person of Interest, a popular television show, is it’s depiction of how easily mobile devices can be broken into. On a typical day, John Reese (played by Jim Cviezel) would walk by the person of interest, tap a few times on his phone and gets full access to the target’s mobile device. […]

Filed Under: Awareness Tagged With: Android, Armis, BlueBorne, Blueborne attack, Bluetooth, iOS, Linux, Windows

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux lab environment lab hardware Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

Top Posts

  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Active Directory Network Recon using PowerView
    Active Directory Network Recon using PowerView
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Introduction to MITRE ATT&CK Framework
    Introduction to MITRE ATT&CK Framework

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress