What if I tell you, your messages, chats, webcam recordings can be forwarded to a third party without your consent for any malicious purpose? Yes, you have to believe it, buddy, it is easy. ‘Spyware’ makes it possible. In this article, we will discuss spyware and how you can create your own spyware to monitor any android phone using Kali Linux in less than 30 minutes. Pre Requisites What is… Read More »How to create your own spyware to hack android phones in less than 30 minutes
Cybersecurity, The next big thing. The massive rise in volume of data resulting in huge number of opportunities in the field of Cybersecurity. Big chunk of data is used maliciously as a result of which The industry needs data security.
We exercise information security practices. The aim is to provide excellent study material in the field of Cybersecurity. Learn about various cyber attacks, case studies and ethical hacking techniques here. Its been said that nothing is secure in this world because no software can be 100% safe. Presence of zero days is a big thread to technology due to which a hacker always has an edge over developer.
Computer service solutions provide free Tutorials on OWASP Top 10 as well as on various tools like that of OSINT. The blog has a collection of all these tutorials of Information security, Tools for hacking and awareness about data security.
Experienced professionals in the cyber security field write for us and contribute to this blog of Computer Service Solutions. The high quality of content include articles, podcasts and videos.
Microsoft Windows, An operating system loved by more than 80% of computer users in the world. What if I tell you that you love highly vulnerable operating systems? Yes, you heard it right, Your favorite OS i.e. Microsoft windows is a highly vulnerable OS. In this article, we will try to explore and exploit one of the most common vulnerabilities of windows. Fun Fact: Fascinated with the term “hack”? Hacking… Read More »SMB Pentesting with Metasploit to hack windows 7 Complete Tutorial
Secure Shell (SSH) runs on port number 22 and used for the purpose of secure data communication over an unsecured or less secure network. With SSH, Remote code execution became easy with SSH. Running on the top of TCP/IP for securing the data over the network makes it a transport layer protocol. But when used for the remote login purpose, we call it an application layer protocol. Secure socket sell… Read More »SSH Protocol | Complete Process, Attack, and Security. Everything you need to know
Wondering how to access and use your friend`s social media account without letting him know? Want to know how to hack Facebook? In this article, I will explain everything about Facebook hacking. Pre-Requisites: Social Engineering Social Engineering deals with the ability of a person to manipulate someone`s mind to get information. Playing with someone`s mind to use their private information, sensitive data, and other important details without letting them know.… Read More »Hack Facebook complete tutorial with Kali Linux and Preventive Measures
The AWS cloud security helps to protect confidentiality, integrity, and availability of data, systems & clients. Most companies trust Amazon Web Services because of their scalable and secure features and hence deploy their applications on it. Have you ever thought why companies need cybersecurity professionals or experts if they use AWS? Don`t you think Amazon should manage all this security? This series of articles will help you to understand almost… Read More »Shared Security Model in AWS explained | Cloud Computing
Simple Network Management Protocol [SNMP Protocol(Port 161, 162)] Introduced in 1988, the Simple Network Management Protocol used to meet the purpose of network and Internet Protocol-based device management and monitoring. SNMP uses UDP port 161 & 162. It aims at providing a common language to all the network devices which helps them to communicate with each other. SNMP helps network devices like router, switches, hub, etc to share information. It… Read More »SNMP Protocol | Complete Process, Commands, Attacks and Security
Buffer Overflow (B.O.) Attack, One of the oldest yet the most dangerous of all cyber attacks. Buffer overflow happens when data overflow from one storage location to override data stored in nearby locations inside a memory. B.O. is also known as a buffer overrun. Pre Requisite Terms Buffer Buffer is a portion of storage space in the Random Access Memory that can hold data. The allocated size of the buffer… Read More »Buffer Overflow Attack | Complete process, Mitigations. Everything you need to know
What if you install new firmware and end up compromising all your router data & settings? Don’t rub your eyes dude, this is easy. So, it is an IoT (Internet of things) attack that enables the attacker to access the shell of your router by creating a backdoor in the router firmware. Starting with some pre requisites: Firmware: The program or set of programs that are pre-installed on a hardware… Read More »Hack Router Firmware by creating a backdoor | An IOT Attack Tutorial
Are you looking for a tool that can help you in securing and protecting your blog or website from malware or any other threats? Then you are in the right place as we are going to discuss a tool that can help your website by providing safety and security protection. Sucuri Site Check, sitecheck.sucuri.net is an OSINT tool that is itself a basic solution for web application security as it… Read More »How to gather information about a website using a tool | Information gathering