Analysis SecureStudies.com OSSProxy MarketScore OpinionSpy Adware/PUP/Riskware or Malware

Wondering what rlvknlg.exe, rlvknlg64.exe or pmropn64.exe are? Or did your anti-virus detect MarketScore/OpinionSpy or OSSProxy adware or a possibly unwanted program, or the far less likely “malware detected”? Continue on, your at the right place. **** NOTE **** This website does not condone or support the practices of ComScore, Inc nor is this article intended to… Read More »

Share Button

Adware loading Malware for Monetization? System Healer Social Engineers DNSChanger/Dynamer 185.17.184.11

Typically, malware will be installed through the use of exploit kits, spam e-mails, gifs laced with executables, torrents and so on. That being said, there is a fairly commonly downloaded software package known as “System Healer” being downloaded on the interwebs which claims to speed up your PC and optimize it. Are Sethealer.net/iSystemHealer.com/MagicPro.org serving up… Read More »

Share Button

MAJOR Zero Day 0day Exploit in SMB Samba 445 BADLOCK BUG Vulnerability

Critical vulnerability allowing remote exploitation of virtually ALL versions of Samba’s Server Message Block (SMB) protocol which is a version of Common Internet File System (CIFS) which operates by default over port 445 TCP as an application-layer network protocol. SMB is typically used to provide shared access to files, printers, and serial ports and miscellaneous communications… Read More »

Share Button

Offensive Security Certified Professional (OSCP) Study Guide Links & Material

Vulnerable By Design – VulnHub – https://www.vulnhub.com   https://www.offensive-security.com/blog/   Metasploit Unleashed   0x2 Course Review: Penetration Testing with Kali Linux (OSCP)   http://www.fuzzysecurity.com/tutorials.html   https://www.corelan.be/index.php/articles/   https://blog.g0tmi1k.com/   Complete training series of videos:   HACKING THE GHOST MACHINE IN OFFENSIVE SECURITY COMPETITION OFFENSIVE SECURITY 2013 – WEB APPLICATION HACKING 101 OFFENSIVE SECURITY 2013 –… Read More »

Share Button

REINCARNA Linux.Wifatch Malware Whitehat Backdoor made by the good guys? How illegal is this?

So last night I did a little banner grabbing from some IP ranges that have been historically extremely insecure, I”m not a blackhat hacker anymore so my intentions weren’t to exploit these hopeless incompetent victims but I would have notified them. I have considered the idea of compromising them just to patch them and save… Read More »

Share Button

What Poor Security Practices Does your Organization Employ? What are best security practices?

Even in 2016 poor security practices are ubiquitous and provide a medium for hackers to compromise networks and critical infrastructure. What are some examples of poor security practices you may be guilty of? Implementing insecure services: Telnet – this is one of the worst services that you can have open on your network, telnet provides… Read More »

Share Button

What is the IEEE? What Standards are Bluetooth, Wireless, Cable, Fiber

The IEEE is an acronym for the Institute of Electrical and Electronics Engineers. These are a bunch of scientists and students who together are a leading authority in the aerospace, telecommunications, biomedical engineering, electric power, etc. The IEEE consists of more than 365000 members from around the world. The IEEE was formed in 1963 by… Read More »

Share Button

How to use WPScan WordPress Scan Kali Linux Vulnerability Scan + Snort Rule Example

Running a wordpress site means that you have to always be on the ball when it comes to updating your plugins, themes and wordpress itself. It is a good idea to scan yourself on a regular basis using simple Kali built in tools such as wpscan and sqlmap. You don’t have to be too intrusive… Read More »

Share Button