Cisco’s team at Talos today released a new free tool called MBRFilter, that protects a computer’s MBR (Master Boot Record) sector against unauthorized access. This can be useful for safeguarding PCs against MBR-targeting malware, such as the Petya, Satana, or HDDCryptor ransomware.
Getting remote access of devices is essential for management of your network. SSH and Telnet are most widely used services. SSH is considered to be more secure then Telnet as SSH used encryption technologies. In this article I will explain how to enable SSH on Cisco devices (Router and Switches).
In my previous article HOW TO PERFORM DENAIL OF SERVICE DOS ATTACK USING KALI – 1 I explained how to perform DoS attack using hping3, in this article I will show you how to perform DoS attack using metasploit.
Critical glibc buffer overflow vulnerability in getaddrinfo() on Linux (CVE-2015-7547 & CVE-2015-5229) In early 2015 we were startled by the “Ghost” vulnerability (CVE-2015-0235). Now, it’s time for a similar DNS-based remote code execution vulnerability, split into 2 vulnerabilities: CVE-2015-7547 & CVE-2015-5229. This vulnerability was discovered by Google’s security team. What’s the vulnerability? Red Hat has