Computers and Internet

How to Questions and Answers About Computers and Internet

Exploiting IP Telephony and CRM Sales Software – HackTheBox Beep All Exp…

In this video walkthrough, we demonstrated the exploitation of local file inclusion vulnerability in the IP Telephony system and CRM software. We also exploited password reuse to log in across different services such as SSH, MYSQL, and web interfaces. video is [here](https://www.youtube.com/watch?v=X90AgammiZ0)

Chasing Ransomware Actors

I am a semi-techy (BS Comp Sci, BS Chem Engg), software engineering background. Rudimentary or dated Network, Network Engineering, OS, Crypto, ASM, knowledge. Moved to the dark side – PM a while back… I understand the moral and ethical dilemmas around hitting a wrong target etc. I humbling submit that only defense and no offense…

Looking for MITM solutions with cool UI

Hello! I am **looking for a solution to perform a MITM attack demo to a very general audience** (non-technical). The goal is to teach attendees what are the risks of connecting to non-trusted Wi-Fi networks and even worse: “Trusting” unknown certificates. Scenario: The audience connects to the demo Wi-Fi AP, ignoring/accepting an “unknown certificate” security…

So do I have a free trial or not?

I use Mcafee antivirus (yes, I know that some people hate it but I’m perfectly fine with it and it helped me get rid of a virus on my computer) and yesterday I got an email from mcafee saying that I have auto-renew on, and that instead of paying $69.99, it’s going to be free,…

Google Drive-hacked?

Recently been getting notifications of mentions from topics on Google Drive. The names etc are in a foreign alphabet and i’m guessing Russian. Never heard of this before and didn’t know I could get notifications of topics in Drive. I do have an old drive acct that I will close out later today. Anyone have…

Facebook restricted me for posting looters n arsonists should be shot is that fair.?

Facebook restricted me for posting looters n arsonists should be shot is that fair.?

Vierzehn: The 14 Attack – A study on IQ and Known Plaintext on Password Recovery

Vierzehn: The 14 Attack – A study on IQ and Known Plaintext on Password Recovery

What are some career options?

I’m currently a Information technology Specialist with about 2 1/2 years left with the U.S army (5years total). I have my bachelor’s degree in Cybersecurity, Security +, and my secret clearance. I’ve only really done help desk and I don’t have much practical cybersecurity experience. Would I have to get an entry level cyber position…

Question about Juice Jacking

I’ve noticed some strange things about my phone (android OS), which I just bought very recently, and I fear that some spyware might be installed; possibly through the shared chargers at work. My question is: I know that some attacks can bypass the security when using the “charge only” option. (accessing ADB or such), but,…