Saturday, July 11, 2020

Global Cyber Security Firm “Comodo Threat Research Labs” (CTRL) Detects New Family of Sophisticated...

Comodo Threat Research Labs (CTRL) has announced that it has detected a new family of financial malware dubbed as “Gugi/Fanta/Lime”. It is a sophisticated Banking Trojan that can bypass the standard security protocols of an Android operating system (version 6),...

NTP patch for Dos exploit released

NTP can be exploited to generate huge volumes of junk traffic which leads to DOS attack. Update your NTP service to ntp-4.2.8p9 which patches this Vulnerability. What is NTP? Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over...

Twitter mistakenly suspended its own CEO’s Twitter account

Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting 8:45 p.m. EST, his account status showed as “suspended.” Dorsey’s account was restored about half hour later, and at 9:15 p.m....

ICMP Types and Codes

Control messages Control messages Type Code Status Description 0 Echo 0 Echo reply (used to ping) 1 and 2 unassigned Reserved 3 – Destination Unreachable 0 Destination network unreachable 1 Destination host unreachable 2 Destination protocol unreachable 3 Destination port unreachable 4 Fragmentation required, and DF flag set 5 Source route failed 6 Destination network unknown 7 Destination host unknown 8 Source host isolated 9 Network administratively prohibited 10 Host administratively prohibited 11 Network unreachable for...

Network Penetration testing

Network Penetration testing determines vulnerabilities on the network posture by discovering Open ports,Live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Trouble shooting services and to calibrate firewall rules. Let's...
ethicalhackersacademy