First Android malware written in Kotlin found posing as Swift Cleaner app and stealing user data
Get link
Facebook
X
Pinterest
Email
Other Apps
-
First Android malware written in Kotlin found posing as Swift Cleaner app and stealing user data
Security researchers have discovered a new Android malware, written in the Kotlin programming language – the first ever of its kind to be found. The malware was found posing as a Google Play Store app called "Swift Cleaner" and already has between 1,000 to 5,000 installs.
The data-stealing malware is also capable of other kinds of malicious activities such as performing click ad frauds, remote command execution and sending SMS. According to security researchers at Trend Micro, who discovered the Android malware, it can also sign up victims for premium SMS subscription services, without their knowledge or permission.
Web Hacking with Burp Suite -II In previous blog i discussed about ghe basic of Brup Suite, Now we are going to discuesss breifly Lets start..... Burp Suite Overview: Burp Suite has a large array of features, including but not limited to: Interception Proxy: Designed to give the user control over requests sent to the server. Repeater: The ability to rapidly repeat/modify specific requests. Intruder: Feature that allows automation of custom attacks/payloads Decoder: Decode and encode strings to various formats (URL, Base64, HTML, etc.) Comparer: Can highlight differences between requests/responses Extender: API to extend Burps functionality, with many free extensions available via the BApp store. Spider and Discover Content feature: Crawls links on a web application, and the discover content can be used to dynamically enumerate unlinked content. Scanner (Pro Only): Automated scanner that checks for web appl...
Ghost Phisher - Phishing & Penetration Attacks Ghost Phisher is a computer security application that comes inbuilt with a Fake DNS Server, Fake DHCP Server, Fake HTTP server and also has an integrated area for automatic capture and logging of HTTP form method credentials to a database. The program could be used as an honey pot,could be used to service DHCP request , DNS requests or phishing attacks Features : ºHTTP Server ºInbuilt RFC 1035 DNS Server ºInbuilt RFC 2131 DHCP Server ºWebpage Hosting and Credential Logger (Phishing) ºWifi Access point Emulator ºSession Hijacking (Passive and Ethernet Modes) ºARP Cache Poisoning (MITM and DOS Attacks) ºPenetration using Metasploit Bindings ºAutomatic credential logging using SQlite Database ºUpdate Support Operating System Supported Software runs on any Linux machine with the programs prerequisites, Prerequisites The Program requires the following to run properly: The following dependencies can be insta...
How to hack CCTV camera 🎥 Step 1 : Downloading Angry IP Scanner Angry IP scanner that is generally used by network administrators for port scanning and detecting for the suspicious activity.It is available on all the major OS. First Download and install the Angry IP scanner. Step 2 : Knowing your IP address range It is very important to know your public IP for accomplishing our target.CCTV cameras are connected to our broadband internet connection.If you are using a broadband connection then you can know your public IP by just going to Google or Bing and typing in the search box “My IP” .It will show your public IP. Here 103.26.218.207 is my public IP .So the IP range will be 103.26.218.1 to 103.26.218.255 Step 3 : Configuring Angry IP scanner Now you have to open Angry IP Scanner . Go to Tools > Preferences > Ports | include ports 80,8080,23 in Port choice tab It will filte...
Comments
Post a Comment