Browsing category

Tutorials

How to easily check if DOC, RTF, XLS, PPT, PPTX or PDF file has a malware without antivirus like a digital forensics expert

In most cyberattack variants threat actors use legitimate-looking documents loaded with malware, which is why researchers often say it all starts with a Word file, Power Point presentation, Excel spreadsheet, or even a book downloaded from a free PDF file website. This time, digital forensics experts from the International Institute of Cyber Security (IICS) will […]

ETHICAL HACKING & PROTECTION FROM HACKERS: 60 BEST HACKING TOOLS USED BY CYBER SECURITY EXPERTS 2021 – PART 2

In the previous tutorial, experts in ethical hacking from the International Institute of Cyber Security (IICS) showed you dozens of the best tools to perform different tasks of analysis, monitoring and anti-hacking protection. This time, we will review some additional programs to complement previously acquired knowledge. ETHICAL HACKING & PROTECTION FROM HACKERS: 60 BEST HACKING […]

ETHICAL HACKING & PROTECTION FROM HACKERS: 60 BEST HACKING TOOLS USED BY CYBER SECURITY EXPERTS 2021 – PART 1

Security agencies and hacking groups around the world use the most sophisticated network security and pentesting tools to detect vulnerabilities in a target network to perform further analyses. Experts from the International Institute of Cyber Security (IICS) mention that detection of security flaws is one of the main objectives of both cybercriminals and research agencies. […]

PROBIV: The most famous Russian black market to find job or buy illegal things

Currently, an illegal marketplace that can solve many problems for cyber criminals and affect everyone else exists, as mentioned by digital forensics specialists from the International Institute of Cyber Security (IICS). This marketplace, called Probiv, allows a criminal to find information for sale in order to rob an entire company or a jealous husband to […]

Steps to create your own VPN

Alphabet Inc., through its cybersecurity subsidiary Jigsaw, announced the launch of Outline, a project that allows any user to create and run their own virtual private network (VPN) server to provide other users with these features. According to the experts in ethical hacking of the International Institute of Cyber Security (IICS), there are two main […]

Top 7 apps to fake your WhatsApp live location in real time

Nowadays it is very easy to find unknown locations using GPS technology, Internet connection and a smartphone; unfortunately this has its disadvantages, mainly those related to user privacy. That’s why many researchers have looked for the best ways to prevent a user’s actual location from leaking, with GPS spoofing apps being the best choice thanks […]

Test your router’s security with your smartphone and only 9 commands

Although it is underestimated, router security is vital to protect our networks from intruders and take the most out of their features, as network security experts from the International Institute of Cyber Security (IICS) mention.  Manufacturers also don’t care about this, as many routers are launched with multiple easy to exploit vulnerabilities, such as remote […]

Complete Guide to track planes of president, military and passenger planes

In-flight aircraft monitoring is a very entertaining way to learn how to use tracking tools, information security experts from the International Institute of Cyber Security (IICS) mention. For doing so, there are multiple websites that will allow you to track flights on a map. After reading this article, simply launch your mobile browser to start […]

Top 15 torrents websites to download any file for free in 2021

When searching for torrents on the Internet it is necessary to use specialized search engines but how to know which is the best? How many options are available? This time, experts in ethical hacking from the International Institute of Cyber Security (IICS) will show you the best tools to search for torrents. The main reason […]

HOW TO DETECT HIDDEN CAMERAS OR SPY CAM IN A ROOM

Many users ignore it, but by using their laptop camera or any other camera with a WiFi connection, their MAC address will become visible to anyone on the Internet. Also, network security experts from the International Institute of Cyber Security (IICS) mention that it is possible to detect multiple data from a user even if […]

Stealing anyone’s Telegram channel or account session with just 4 commands

Telegram channel theft has become a frequent and completely real threat, mentioning mobile security specialists from the International Cyber Security Institute (IICS). You need to be prepared against these attacks, so here is what conditions lead to these risk scenarios. Download the following file https://github.com/teleport21/Telegram_Stealer/archive/master.zip Install Python 3.8.2 https://www.python.org/downloads/release/python-382/ Install the code editor: Visual Studio […]

How to configure, run and automate OpenVAS: Free Vulnerability Scanner

Information security researchers often require plugins for vulnerability scanners in Kali Linux, although due to licensing restrictions these tools are not included in the distribution. Fortunately Kali includes OpenVAS, which is free and open source, as mentioned by vulnerability testing specialists from the International Institute of Cyber Security (IICS). In this article we’ll show you […]

Top 5 apps to audit WiFi networks

WiFi security is an element that sometimes receives little attention from system administrators, although it is a fundamental factor in consolidating a secure IT environment, pentesting specialists from the International Institute of Cyber Security (IICS) say. Below are details on some tools that, while feature different functions, were developed to provide you with as much […]

Digital forensics tools for Windows 10 Forensics and incident response

Windows is the most common operating system. There are many organizations who prefer windows OS. Windows is also most targeted operating system by hackers, as per ethical hacking researcher of international institute of cyber security. We will show a method through which you can check all the details or view an history of windows operating […]

How to find Vulnerabilities in CMS Websites

Finding vulnerabilities takes time for pentester/ security researcher. There are many tools & techniques for finding bugs in any URL. Earlier we have shown many tools which are used in many phases of pentesting. Pentesting always begins with information gathering phase. According to ethical hacking researcher of international institute of cyber security, pentesting has really […]