SharpHide: Tool to create hidden registry keys

SharpHide Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null-terminated) registry key. This works by adding a null byte in front of the UNICODE_STRING key… The post SharpHide: Tool to create hidden registry keys appeared first on Penetration Testing.

Titanium APT Hackers Inject New Hidden Backdoor on Windows Using Fileless Technique

A new wave of malware attack strikes again from the Titanium APT group that infects windows with hidden backdoor by mimicking common legitimate software and fileless technique. Titanium APT is one of the technologically advanced hacking group, they are using the various sophisticated technique to attack the target, and their method of attack makes very […]

FOCA – Find Metadata And Hidden Information In The Documents

  FOCA (Fingerprinting Organizations with Collected Archives)FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may be on web pages, and can be downloaded and analysed with FOCA. It is capable of analysing a wide variety of documents, with the most common being Microsoft Office, […]

11 ‘Hidden’ Android 10 Features We Have Found So Far

The latest Android version has been out for more than a week now, and many of us are working hard to find some hidden Android 10 features to satisfy ourselves. Although, the definition of what can be called ‘hidden’ depends from person to person. While in some sense, Android 10 lets you “Uninstall” your Screen, […]

Shodan and Censys: Finding Hidden Parts On the Internet With Special Search Engines

Our digital lives connect massive things with the Internet. Starting with Smartphones, Wi-Fi routers, Surveillance Camera, Smart TV, SCADA networks and leading to traffic light management systems are exposed to the internet. In 2016 impact of Mirai botnet attack, which was orchestrated as a distributed denial-of-service attack affects 300,000 vulnerable Internet of Things devices. IoT […]

This Innocent USB Charger Is A Hidden Surveillance Camera No One Can See

To tackle uninvited burglars and other intrusions, many people resort to installing closed-circuit TV cameras in their homes. But the problem with CCTV cameras is that many of these can be easily spotted and can alert the person you wish to track. There is also a breed of security cameras that can hide in plain […]

Hack your friends Facebook account using HiddenEye

Phishing is what mostly victims fall into trap of fake pages. There are many of methods for creating fake pages. Phishing is an way to obtain login credentials such as usernames & passwords or confidential details by creating cloned pages of original web pages. According to ethical hacking researcher of international institute of cyber security […]

Hidden Eye – Modern Phishing Tool With Advanced Functionality

Ultimate Phishing tool with android support available comes with 34 attack vectors of the most popular used services. Hidden Eye Modern Phishing Tool Features 1) LIVE ATTACK Now you will have live information about the victims such as : IP ADDRESS, Geolocation, ISP, Country, & many more. 2) COMPATIBILITY All the sites are mobile compatible. […]

How To Play The Hidden ‘Tennis Game’ On Google Search?

Wimbledon is coming to an end this weekend. To mark the occasion, Google is offering a new Easter Egg in the form of a tennis game. It can be played on your computer or phone — you just have to know where to look for it. To find the tennis game, type “Wimbledon” on Google […]

More than 25 million smartphones infected with new malware hidden in WhatsApp

An investigation conducted by system audit specialists from the security firm Check Point has revealed the existence of new smartphone malware; dubbed “Agent Smith”, this malware has already infected more than 25 million users worldwide, mainly in India, where around 15 million cases of infection have been detected. This malware hides from the user disguising […]

Last Facebook outage exposed users’ images hidden information

Facebook suffered a massive outage in its suite of apps yesterday morning; According to website security audit specialists, this flaw provided social network users with certain details about Facebook’s machine learning system for sorting all the users’ content. In addition to Facebook, Instagram and WhatsApp services suffered several failures and interruptions, affecting content displayed, content […]

FreshOnions TorScraper – TOR Hidden Service Crawler

This is a copy of the source for the http://zlal32teyptf4tvi.onion hidden service, which implements a tor hidden service crawler / spider and web site. Features Crawls the darknet looking for new hidden service Find hidden services from a number of clearnet sources Optional fulltext elasticsearch support Marks clone sites of the /r/darknet superlist Finds SSH […]

HiddenWasp, a dangerous malware that affects Linux systems

Although they are not uncommon, network security specialists mention that the security risks present in Linux systems are not known broadly enough. Either because of its little offensive nature or because the security mechanisms of these systems overlook them, these security threats do not receive as much diffusion as those that impact Windows systems. However, […]

HiddenWasp: New Malware Targets Linux Machines To Control Them Remotely

Unlike the Windows cybersecurity ecosystem, the threats concerning the Linux systems aren’t often discussed in much detail. The attacks either go undetected by the security mechanisms laid out by enterprises or they aren’t too severe to be reported widely by the security researchers. However, as pointed out by cybersecurity firm Intezer, malware with sophisticated evasion […]

New way to detect the malware hidden in hardware

While detecting malicious software hidden in hardware parts is an incredibly complex task, cyber forensics course specialists believe that important steps are being taken to address this attack vector. Recently, threat actors have refined their methods to hide malware within the firmware of hard disks, graphics cards, motherboards and other commonly used components for the […]

This Open Source Extension Displays Hidden Google Search Results

Google receives tonnes of requests from copyright holders daily for removing infringing content. The company then analyzes the received requests and removes the content that violates copyright claims. The number of DMCA notices received by Google has increased manifold over time. As reported by TorrentFreak, content creators have asked Google to remove over four billion pirate links till date. Whenever Google removes links from […]

Android Q’s Hidden Settings In Pixel Launcher Reveal iPhone-Like Gestures

Google has released the first beta of the upcoming Android Q, and people are frantically searching for new features in the OS. One of the major changes that we are expecting from Google in Android Q is improved gesture navigation. When Google introduced gestures in Android Pie, it seemed like a half-baked attempt. Apple, on […]

Get hidden details of Any Linux Processes Using Procdump

Core dumps or memory dumps are created when program is executed. A dump consists of modules or work flow that how program is working. In most of the cases dumps are used for files backups and directories, explain ethical hacking investigators. It contains an image processing memory of the applications. Sometimes when a process closes […]

New Android Malware Uses Motion Sensors To Stay Hidden

Security measures are not the only ones seeing improvements! Malicious apps are also figuring out new ways to enhance its working, and one such Android malware proves this. According to a report by ArsTechnica, a new Android malware makes use of the motion sensors of Android smartphones to hide itself before infecting the device. The method used […]

Find hidden malware in .Net program

Information gathering is not an easy task. In many phases, pentester has to go through many tools to gather many information, ethical hacking professors assure. Today we are talking about tool called SHED. Which extract information. This tool can be useful in extracting useful information from the .net program. In many phases of pentesting, if […]