QR Code Attack Vector :: Spoofing, Poisoning and Phishing aplications with QR Codes

QR code is a structured code in an image that can be read by specific readers that reveal their content or perform redirect functions for pages and so on. This tool, which was created especially for parts catalog and inventory management, is now used in various posters, business cards, banners, manuals, flayers and etc, and…Read more QR Code Attack Vector :: Spoofing, Poisoning and Phishing aplications with QR Codes

Advertisements

Creating E-mail Bomber in 15 Minutes with Python

In this article I will demonstrate the operation of a spammer technique, used for continuous sending of e-mail messages to third parties, in order to fill inboxes, make specific providers blacklist and even can be used by trolling to fool friends, celebrities, companies And co-workers by Trolls and coding a simple example of a tool…Read more Creating E-mail Bomber in 15 Minutes with Python

Using free hosting for Spoofing and forging Emails for Spamming

Email Spoofing, as its name suggests, is a method used by malicious attackers to falsify the sender of an e-mail message through a DNS zone or SMTP authentication failure. There are many vectors that can be applied to the use of Email Spoofing . A malicious person can use this device to send billing messages…Read more Using free hosting for Spoofing and forging Emails for Spamming

Fingerprinting and Getting Information from DNS, IP’s and Websites with Maltego

  1 :: Download the corresponding file for your distribution on the Maltego website Link: https://www.paterva.com/web6/products/download.php Debian Distros: # dpkg -i MaltegoChlorineCE.3.6.0.6640.deb Fedora, CentOS/RHEL: # rpm -i MaltegoChlorineCE.3.6.0.6640.rpm Slackware Distros - Baixe o RPM # rpm2tgz MaltegoChlorineCE.3.6.0.6640.rpm # installpkg MaltegoChlorineCE.3.6.0.6640.tgz 2 :: Register on the maltego website. You will always need to enter your email…Read more Fingerprinting and Getting Information from DNS, IP’s and Websites with Maltego

Finding and Accessing Open Internet Cameras and Routers

To use this trick we will use a very nice IP scanner called Angry IP Scanner or Nmap itself if you prefer. It was based on a very fucking post from Hacoder , blog that I follow and particularly think too much. It pays to spend time revolving the pages of the site. Basically we…Read more Finding and Accessing Open Internet Cameras and Routers

Linux Hardening and Protection Tips

Ensuring the high availability and availability of the applications and services of our networks and servers is an almost obligatory task today. We do not always work with a development-focused or secure deployments team and this can end up breaching malware, attackers, malware, and other types of malicious attack vectors that may end up compromising…Read more Linux Hardening and Protection Tips

Hardening and Best Practices in Apache Web Server

  Basic Hardening and Best Practices in Web Server Security with Apache Apache is a Web server that is widely used in the Web development industry because of its community, performance and easy configuration, so it still leaves some breaches by default that can compromise the operation and security of your application. I'm going to…Read more Hardening and Best Practices in Apache Web Server