Owning the Dark Web
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. PunkSPIDER, the crawler that scanned the Dark Web
Ethical hacker | Pen Tester | Security blogger | Cyber Security Consultant | Dark web researcher
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. PunkSPIDER, the crawler that scanned the Dark Web
As Usual, Attackers Were Busy Over the Holiday Season http://researchcenter.paloaltonetworks.com/2016/01/as-usual-attackers-were-busy-over-the-holiday-season
A number of Dell customers claim to have been contacted by scammers who had access to specific customer information that should have only been available to Dell. The company says it hasn’t been hacked...
Criminals behind some of the most potent exploit kits, Neutrino and RIG, are ramping up attacks slinging the latest ransomware and hosing users who have not applied recent Adobe Flash patches. The patched vulnerabilities...
Samsung Electronics has confirmed that anyone using its mobile payments service, the recently launched Samsung Pay, has no cause for concern following the news of a data breach on subsidiary LoopPay’s network. Sensitive data...
Synack senior security researcher Wesley Wineberg has received US$25,000 from Microsoft for quietly disclosing a bug that allows any Hotmail account to be hijacked. http://www.theregister.co.uk/2015/10/09/hotmail_hijack_hole_earns_boffin_25k_double_bug_bounty_trouble/
Really useful reference sheet for post exploitation commands https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List