Cisco’s team at Talos today released a new free tool called MBRFilter, that protects a computer’s MBR (Master Boot Record) sector against unauthorized access. This can be useful for safeguarding PCs against MBR-targeting malware, such as the Petya, Satana, or HDDCryptor ransomware.
SMB is used for Network file sharing in windows. By default and for security reason windows allow network sharing with Password enabled which is your system password. You can brute force those credentials with help of acccheck and gain access to victim system easily. In this tutorial I will explain how to brute force a
When a user logs into a computer the User Profile Service is used to create certain directories and mount the user hives (as a normal user account cannot do so). In theory the only thing which needs to be done under a privileged account (other than loading the hives) is creating the base profile directory.
In this article we will talk how to hack email server using telnet? This is easy, but the only problem is this that this type of attack works for same domain only or domains hosted on same server, i.e you can send mail form *@aakarperiwal.com to *@aakarperiwal.com only. This process is useful in sending this
In previous tutorials of Designing Viruses Using BATCH we saw some of the basic virus designing guides and codes. In this tutorial we are going to see how to Add Virus in PDF file and send it to your victim. If you haven’t checked those posts then click on Tutorial1, Tutorial2. We will add pdf file with
Virtual box is used to create virtual machine in your PC. That means you can run more than one OS at a time in same machine. Your main machine is called HOST OS and the virtual Machine is called GUEST OS. Lets see How to Create Virtual Machine:-