Browsing category

Tutorials

RBAC Buster – A new K8s attack technique to hack in Kubernetes cluster

The first known proof that attackers are using Kubernetes (K8s) Role-Based Access Control (RBAC) in the field to construct backdoors was found by specialists. DaemonSets were also deployed by the malicious actors in order to seize control of the K8s clusters they attacked and steal their resources. An incorrectly configured API server that permitted unauthenticated […]

Top 8 Free Tools for security testing and audit of your Kubernetes cluster in 2022

Docker is a technology for containerization, while Kubernetes is a tool for orchestrating container deployments. In the subsequent subsections, we will discuss a variety of open-source tools that really are useful for securing Kubernetes clusters. These open source tools involve code snippets that will help with static scanning of Docker images, security auditing, hardening Kubernetes […]

RedEye: A great opensource cyber security Log Visualization tool for Red and Blue teams

RedEye is an open-source analytical tool for administrators to view and report command and control (C2) activities, according to the U.S. Cybersecurity and Infrastructure Security (CISA) organization. RedEye is a cooperative effort between CISA and the DOE’s Pacific Northwest National Laboratory that can read attack framework logs and show complicated data in a more palatable manner. […]

How to easily spoof mac address automatically and be more anonymous

In this article, we will consider how to change (change, spoof) the MAC address on your Linux computer, as well as how to use different tools for the automatic replacement of the MAC address. Why change the MAC address? The MAC address is (should be) unique to each network interface. By the way, if the […]

How to Use Advanced Network Intelligence Toolkit for Pentesting: badKarma

Searching vulnerabilities on the host (the host can be a website, web server, network device (router and others), end-user computer) begins with the collection of basic information. This information includes host detection, scanning their ports to search for open, definition of running services at these ports, defining service versions and finding vulnerabilities for these versions, […]

Tutorial for pentesting Android apps using the free ZANTI toolkit

In this tutorial, the specialists of the Cyber Security 360 course of the International Institute of Cyber Security (IICS) will show us how to use ZANTI, a pentesting tool that allows attacks against a certain network, in addition to operating routers, auditing passwords, creating and running HTTP servers, scanning devices for open ports, and more. […]

5 best free API security testing tools. Protecting your cloud CI/CD Pipeline

Applied Programming Interfaces (API) are an essential component of most modern programs and applications. In fact, cloud applications and mobile applications now rely heavily on APIs because they are designed to control various elements. Many large companies have hundreds or even thousands of APIs built into their infrastructure. The number of API interfaces will only […]

How to do professional vulnerability assessment on your website for free using Juice Shop?

Searching for vulnerabilities in websites, tools, applications, and software for reporting through bounty programs is a common practice among programmers. Although this is a good option, there are other alternatives to practice vulnerability analysis without breaking the law. This time, specialists from the International Institute of Cyber Security’s (IICS) cyber security course will show you […]

How to do local privilege escalation attacks on Windows to brute force the local administrator account?

Privilege escalation attacks pose a severe cyber security risk to all kinds of systems in public and private organizations. In these attacks, threat actors exploit vulnerabilities or design flaws in operating systems and software applications to gain illegitimate access to resources that would otherwise be restricted to authorized users only, triggering dangerous hacking scenarios. As […]

How to easily create deepfake videos of your family?

Since its appearance, deepfake technology has become a controversial issue because, despite being one of the most popular examples of artificial intelligence and machine learning, on many occasions it has been given a malicious use. Despite its growing popularity, many curious people still wonder how this technology and tools work, being surprised to realize how […]

How to collect only valid evidence during forensic investigation and incident response processes instead of creating images of system memory

The cybersecurity community understands as cyber forensics the procedures and methodological techniques to identify, collect, preserve, extract, interpret, document and present the evidence of an investigation on a computer system, so that these reports can demonstrate or rule out malicious activity on the affected systems. Specialists say that this research plays a fundamental role in […]

Top 6 free steganography tools for cyber security professionals

In cybersecurity, steganography is a technique that allows you to hide snippets of code in a legitimate-looking file, mainly images in various formats and even some documents. This practice is increasingly popular among cybersecurity researchers, since it has been proven that multiple hacking groups have used it in different attacks successfully, so it is better […]

How to hack WhatsApp easily with a very effective Termux WhatsApp phishing website

Phishing is one of the main cybersecurity threats today, since virtually anyone in the world uses smartphones, online accounts and other tools despite not having basic notions of computer security and security risks, say specialists in ethical hacking. A growing trend within phishing is the compromise of WhatsApp accounts, the largest instant messaging platform in […]

TOP 10: The best web browsers for cybersecurity specialists

Search engines are one of the most widely used computer tools worldwide, since any user can access the Internet regardless of their level of computer knowledge. Although tools such as Chrome, Edge or Firefox are the best known, other web browsers offer other kinds of functions and protections. This time, cybersecurity awareness experts from the […]

Here’s how hackers remotely attack smartphones: Taking control of victim’s camera and microphone using just 11 commands

Mobile hacking is one of the most dangerous cybercriminal trends, as it allows threat actors to conduct detailed surveillance of people of interest, steal personal information, and even empty bank accounts and cryptocurrency wallets remotely and without raising suspicion. This time, specialists from the mobile security course of the International Institute of Cyber Security (IICS) […]

How to perform Kubernetes pentesting and secure it?

Kubernetes is a great platform for container management that has shown a breakthrough lately, both in terms of functionality and in terms of security and resiliency. Specialists claim that Kubernetes’ architecture makes it easy to survive different types of outages and stay active despite everything, making it a great option for pentesting. On this occasion, […]

How to perform digital forensics of malicious PDF files? Easily checking if a PDF document has malware or backdoors

The PDF format has become one of the most popular ways to view files, as this format is compatible with all kinds of technological devices, including desktop computers, laptops, electronic tablets and smartphones. Because of this universal presence, threat actors began using these documents to deliver malware and easily deploy other attack variants. This time, […]