Skip to main content

Google SQL Dorks – 2021

"index of" "plugins/wp-rocket" intitle:"index of" secrets.yml intitle:"index of /" "*key.pem" intitle:"index of" "admin/sql/" intext:"index of /" "config.json" index of .svn/text-base/index.php.svn-base intitle:"index of" admin.tar inurl:/servicedesk/customer/user/login Dork: "Index of" "upload_image.php" Dork: "index of" "Production.json" index.of.?.frm inurl:wp-content/plugins/brizy "Index of" "customer.php" inurl:adminlogin.jsp inurl:/download_file/ intext:"index of /" index of /backend/prod/config intext:"index of /" "customer.php" "~Login" intext:"INTERNAL USE ONLY" ext:doc OR ext:pdf OR ext:xls OR ext:xlsx intext:"Welcome to Intranet" "login" "Index of" "/access" inurl:admin/data* intext:index of intext:powered by JoomSport - sport Wo

Common types of cyber attacks

 

Malware


Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. Once inside the system, malware can do the following:

  • Blocks access to key components of the network (ransomware)
  • Installs malware or additional harmful software
  • Covertly obtains information by transmitting data from the hard drive (spyware)
  • Disrupts certain components and renders the system inoperable

Phishing


Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.


Man-in-the-middle attack


Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

Two common points of entry for MitM attacks:

1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.

2. Once malware has breached a device, an attacker can install software to process all of the victim’s information.


Denial-of-service attack



A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.

SQL injection


A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.

Zero-day exploit



A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detection requires constant awareness.


DNS Tunneling


DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons to utilize DNS tunneling. However, there are also malicious reasons to use DNS Tunneling VPN services. They can be used to disguise outbound traffic as DNS, concealing data that is typically shared through an internet connection. For malicious use, DNS requests are manipulated to exfiltrate data from a compromised system to the attacker’s infrastructure. It can also be used for command and control callbacks from the attacker’s infrastructure to a compromised system

Comments

Popular posts from this blog

Google SQL Dorks – 2021

"index of" "plugins/wp-rocket" intitle:"index of" secrets.yml intitle:"index of /" "*key.pem" intitle:"index of" "admin/sql/" intext:"index of /" "config.json" index of .svn/text-base/index.php.svn-base intitle:"index of" admin.tar inurl:/servicedesk/customer/user/login Dork: "Index of" "upload_image.php" Dork: "index of" "Production.json" index.of.?.frm inurl:wp-content/plugins/brizy "Index of" "customer.php" inurl:adminlogin.jsp inurl:/download_file/ intext:"index of /" index of /backend/prod/config intext:"index of /" "customer.php" "~Login" intext:"INTERNAL USE ONLY" ext:doc OR ext:pdf OR ext:xls OR ext:xlsx intext:"Welcome to Intranet" "login" "Index of" "/access" inurl:admin/data* intext:index of intext:powered by JoomSport - sport Wo

13 BEST Operating System for Hacking in 2021

  1) Kali Linux     Kali Linux is a Security Distribution of Linux specifically designed for digital forensics and penetration testing. It has over 600 preinstalled penetration-testing applications (cyber-attack performs against computer vulnerability). This OS can be run on Windows as well as Mac OS. Features: It can be used for penetration testing. This platform is available in 32 bits as well as 64 bits. Kali Linux can be updated without the need to download a new version. This OS can encrypt the full disk. You can easily automate and customize the Kali Linux installation on the network. Support for USB live installs. It has a forensics mode that can be used for forensic work. Link:   https://www.kali.org/ 2) Parrot OS Parrot OS is a platform for hacking. It has an easy to use editor for software development. This platform enables you to surf the web privately and securely. Hackers can use Parrot OS to perform vulnerability assessment, penetration testing, computer forensics, and mo