Posts

What is Locky Malware and what to do

Image
is a Malware(virus types) which is sent to your computer via email or via an attachment of a fake invoice then that malware(malicious software) encrypts your hard disk and whole data becomes meaningless like special characters  ं$#़॥ like this only one jpg file u can open. Then only in this jpg file there are instructions to pay ransome via bitcoin. Once u pay the hard disk is decrypted I.e made meaningful. The victim receives an email that requests payment on an attached "invoice", usually a Word file. The attachment contains some sort of executable code, like a VBA macro, that downloads the actual malware from a web site and runs it, encrypting the data on the victim's local and networked hard drives. It then displays a screen that demands a ransom to decrypt the data. WHAT TO DO WITH LOCKY? Backup regularly and keep a recent backup copy off-site. There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a d

Meeting with Dr. Jamie Saunders

Image
Met Dr. Jamie Saunders, Director of UK's National Cyber Crime Unit at the London office of National Crime Agency .Had a good knowledge sharing session and also I presented him my Book on Cyber Crime & Cyber Law. Prashant Mali 

Fast Flux Networks An Introduction

Image
A Fast Flux Network is a network of compromised computers and some public DNS records that change frequently. As a result, the IP address associated with the corresponding domain name changes frequently. This technique is often used by the attackers to hide their malicious websites from detection. Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other web scams). To protect the identity and to maximise the availability of the core components of their business, miscreants have recently started to use fast-flux service networks, large groups of bots acting as front-end proxies to these components. Motivated by the conviction that prompt detection and monitoring of these networks is an essential step to contrast the problem posed by botnets, Attackers typically compromise one or more victim computer systems with malware and exploit those to establish a fraud

Prashant Mali Chevening TCS Cybersecurity fellowship images

Image

Black Software List

This List is Public 😇 🔵 Password Hacking Software  1.haviz 2.metasploit 3.hydra 4.wireshark 5.Dsniff 6.InSSIDer 7.Aircrack-ng 8.Aircrack 9.Brutus 10.Cain And Abel 11.IKECrack 🔴Wireless Hacking Software 12.Kismet 13.KisMAC 14.Firesheep 15.NetStumbler 16.WepLab 🔵Network Hacking Software 17.Map 18.SuperScan 19.Angry IP Scanner 🔴Packet Crafting To Exploit Firewall Weaknesses software 20.Hping 21.Scapy 22.Netcat 23.Yersinia 24.Nemesis 25.Socat 🔵Traffic Monitoring for Network Related Hacking software 26.Splunk 27.Nagios 28.P0f 29.Ngrep 🔵Packet Sniffers To Analyze Traffic software 30.Wireshark 31.Tcpdump 32.Ettercap 33.Dsniff 34.EtherApe 35.Paros 36.Fiddler 37.Ratproxy 38.Sslstrip 39.SSL/TLS Security  🔴Test By High-Tech Bridge Rootkit Detectors To Hack File Systemsoftware 40.Netfilter 41.PF: OpenBSD Packet Filter 42.Skipfish 43.Wfuzz 44.Wapiti 45.W3af 46.Sleuth Kit 47.Helix 48.Maltego 49.Encase 🔴Debuggers To Hack Running Programs software 50.Immunity Debugger 51.Netcat 52.Traceroute

Case Laws for CCTV as Best Evidence

CCTV Footage- Primary Evidence-  CCTV footage directly & immediately stored in hard drive of computer is original media, self generated & created without human intervention- Not secondary evidence & does not require certification u/s 65B of Evidence Act. Kishan Tripathi v. State, Crl.A.108/13, 12.2.16 DHC -—-–—–-—––—-–— : Procedure to be followed by Magistrate when CCTV footage and video recordings is produced by police at the time of filing of chargesheet?            During the hearing of the case, we noticed that the trial Court had not played the DVR (MO-2) and seen the CCTV footages in the presence of the accused. In this regard we propose to dispel misgivings, if any, in the mind of trial Judges about their power to view such evidences. There will be instances where, by the time the case comes up for trial in one court, the electronic record would have had a natural death for want of proper storage facilities in the Court property room. To obviate these difficulties, w

Trojan targeting your bank codes sent on Mobile

Image
A new Android trojan has the ability to intercept text messages and bypass the SMS-based two-factor authentication system protecting customers' bank accounts. The trojan, detected as   "Android/Spy.Agent.SI"   is currently targeting customers of large banks via their mobile apps. The malware tricks users into downloading it onto their devices by masquerading as Adobe Flash Player. Upon installation, it requests that the user grant the malicious app administrator rights, before seemingly disappearing from view. Rest assured, however, that while the Flash Player icon might no longer be visible, the trojan is just getting started.At this point, Android/Spy.Agent.SI contacts a remote server hosting malicious APK files whose corresponding URL paths are regenerated hourly in a bid to avoid detection by anti-virus software. The trojan uses this connection to send information about the infected device, along with the package names of installed applications, to its opera