Posts

Adv Prashant Mali Speaking along with The Hon. IT & Telecommunication Minister of India Mr Ravishankar Prasad

Image

Terrorist using Customised Apps to evade detection

Terrorist have created an application 'calculator' which can be downloaded on smart phones attached to the off-air network created specifically for them. The technology is based on the concept of 'cognitive digital radio' that enables users to turn their smartphones into peer-to-peer, off-grid communication tools. The network generates its own signal through proprietary adhoc networking protocols and automatically coordinates with other units within range which enables users to send and receive text messages, share their GPS locations on offline maps regardless of access to WiFi or cellular service. The Calculator app is loaded on a normal Android phone and communicates over WiFi to the Radio which further gets transmitted on VHF as digital burst communication.  The principle is same as Gotennna but with little difference.  Gotennna uses Bluetooth to communicate with the a small Radio device Antenna which further uses UHF to transmit data.  Gotennna works on P2P concept

What is Locky Malware and what to do

Image
is a Malware(virus types) which is sent to your computer via email or via an attachment of a fake invoice then that malware(malicious software) encrypts your hard disk and whole data becomes meaningless like special characters  ं$#़॥ like this only one jpg file u can open. Then only in this jpg file there are instructions to pay ransome via bitcoin. Once u pay the hard disk is decrypted I.e made meaningful. The victim receives an email that requests payment on an attached "invoice", usually a Word file. The attachment contains some sort of executable code, like a VBA macro, that downloads the actual malware from a web site and runs it, encrypting the data on the victim's local and networked hard drives. It then displays a screen that demands a ransom to decrypt the data. WHAT TO DO WITH LOCKY? Backup regularly and keep a recent backup copy off-site. There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a d

Meeting with Dr. Jamie Saunders

Image
Met Dr. Jamie Saunders, Director of UK's National Cyber Crime Unit at the London office of National Crime Agency .Had a good knowledge sharing session and also I presented him my Book on Cyber Crime & Cyber Law. Prashant Mali 

Fast Flux Networks An Introduction

Image
A Fast Flux Network is a network of compromised computers and some public DNS records that change frequently. As a result, the IP address associated with the corresponding domain name changes frequently. This technique is often used by the attackers to hide their malicious websites from detection. Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other web scams). To protect the identity and to maximise the availability of the core components of their business, miscreants have recently started to use fast-flux service networks, large groups of bots acting as front-end proxies to these components. Motivated by the conviction that prompt detection and monitoring of these networks is an essential step to contrast the problem posed by botnets, Attackers typically compromise one or more victim computer systems with malware and exploit those to establish a fraud

Prashant Mali Chevening TCS Cybersecurity fellowship images

Image

Black Software List

This List is Public 😇 🔵 Password Hacking Software  1.haviz 2.metasploit 3.hydra 4.wireshark 5.Dsniff 6.InSSIDer 7.Aircrack-ng 8.Aircrack 9.Brutus 10.Cain And Abel 11.IKECrack 🔴Wireless Hacking Software 12.Kismet 13.KisMAC 14.Firesheep 15.NetStumbler 16.WepLab 🔵Network Hacking Software 17.Map 18.SuperScan 19.Angry IP Scanner 🔴Packet Crafting To Exploit Firewall Weaknesses software 20.Hping 21.Scapy 22.Netcat 23.Yersinia 24.Nemesis 25.Socat 🔵Traffic Monitoring for Network Related Hacking software 26.Splunk 27.Nagios 28.P0f 29.Ngrep 🔵Packet Sniffers To Analyze Traffic software 30.Wireshark 31.Tcpdump 32.Ettercap 33.Dsniff 34.EtherApe 35.Paros 36.Fiddler 37.Ratproxy 38.Sslstrip 39.SSL/TLS Security  🔴Test By High-Tech Bridge Rootkit Detectors To Hack File Systemsoftware 40.Netfilter 41.PF: OpenBSD Packet Filter 42.Skipfish 43.Wfuzz 44.Wapiti 45.W3af 46.Sleuth Kit 47.Helix 48.Maltego 49.Encase 🔴Debuggers To Hack Running Programs software 50.Immunity Debugger 51.Netcat 52.Traceroute