Posts

Everything about CC's Fullz

What Are Fullz? Fullz is a term used by criminals to describe sets of stolen personal information that can be used to impersonate someone or to use their bank cards. Simply put, fullz are stolen identities or stolen credit card information.  The word comes from the word “full” in the sense of “full data” or “full credentials” and encompasses all the information a fraudster needs in order to impersonate someone to defraud a company, steal directly from the victim, or conduct illegal activity that will be attributed to the victim if they are caught.   How Do Fullz Work? Fullz can be acquired in several ways, including: Phishing and spear phishing: The victim is convinced they are sharing their passwords and/or other information with a legitimate company they trust. Bought on the dark web: Fullz are readily available to buy from other criminals, usually in bulk. Sourced from data breaches and elsewhere. These long lists will require card testing and other tests to identify w...

MAN IN THE MIDDLE ATTACK (MITM Attack)

Image
Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. Attackers have many different reasons and methods for using a MITM attack. Typically, they’re trying to steal something, like credit card numbers or user login credentials. Sometimes they’re snooping on private conversations, which might include trade secrets or other valuable information Usefull Types of Man-in-the Middle Attacks  Wi-Fi Eavesdropping If you’ve ever used a laptop in a coffee shop, you may have noticed a pop-up that says “This network is not secure.” Public wi-fi is usually provided “as-is,” with no guarantees over the quality of service.   However, unencrypted wi-fi connections are easy to eavesdrop. It’s much like having a conversation in a public restaurant – anyone can listen in Another Wi-Fi Eavesdropping attack happens when a hacker creates its own wi-fi hotspot, called an “Evil Twin.” They make the connection look just like the authentic one, down to th...

How does police track location using phone number

Image
The police can track the location of a phone number through a process known as phone number tracking or phone number triangulation. This technique involves the cooperation of telecommunication service providers and law enforcement agencies. Here is a step-by-step explanation of how the police can track the location using a phone number:    Obtaining a Legal Authorization : Before the police can track the location of a phone number, they need to have a legal authorization such as a warrant or court order. This ensures that the tracking process is conducted in compliance with the law and protects individuals' privacy rights.    Contacting the Telecommunication Service Provider : Once the legal authorization is obtained, the police will contact the relevant telecommunication service provider associated with the phone number. They will provide the phone number and the legal documentation to establish the legitimacy of their request.    Requesting Subscriber Inf...

best cybersecurity courses to learn in 2023

Image
  Best cybersecurity courses to learn in 2023 video:  Introduction: The demand for qualified people who can shield businesses from online dangers is rising quickly along with the subject of cybersecurity. there are several cybersecurity courses available to assist you learn new skills and knowledge, whether you're an experinced cybersecurity expert looking to upskill or someone who's just starting out in the area. We'll look at some of the top cybersecurity courses to enroll in 2023 in this blog post. 1. Certified Information Systems Security Professional(CISSP): The CISSP certification, which is widely recognisec, focuses on different facets of cybersecurity, including risk management, access control, cryptography, and security operations. For this advance-level certification, candidates must have at least five years of cybersecurity experiance. 2. Certified Ethical Hacker(CEH): The skills required to locate ad take advantage of vulnerabilities in computer systems, network...

IP Address explained

Image
 IP Address Explained Q. What is IP address?      IP Address is a 32bit binary number used to indicate the location of a computer or other device on a network using TCP/IP. These addresses are similar to those of your house, they allow data to reach the appropriate destination on a network and the internet. Version of IP Address As the internet and technology evolve, there has been an increasing demand for IP addresses. To help meet demand for IP addresses, there are two types of addresses used today, IPv4 and IPv6. Althought you may only deal with an IPv4 address in your local home, school or small office you should also be aware of IPv6 addresses for when you encounter them. Example of an IPv4 address: 192.79.151.19 Example of an IPv6 address: 2601:681:4200:c5co:516:f0bb:ac4b:45bd IP Address class With an IPv4 IP address, There are five classes of available IP ranges: Public or private IP Address     Public IP address:  Public IP address is the addre...

Skill needed to become an ethical hacker

 Skills needed to become an ethical hacker  There are some Mandatory skills to become a hacker Without these, you are not considred to be a hacker. It requires a lot of time and effort. (1) Fundamental skills: These are the basics that every hacker should know before trying to hack. Once you have a good grasp on everything in this section, you can move into the intermediary level. (2) Advance computer skills: Advanced computer skill include managing databases, programming and running calculations in spreadsheets. Some of the most essential computer skills are MS Office, spreadsheets, email, Database managament, Social media, Web, Enterprise systems etc. An ethical hacker needs to be a computer systems expert. (3) Networking skills: You need to understand the basics of networking, such as the following: DHCP, NAT, Subnetting, IPv4,IPv6, Public vs private IP, DNS, Router and switches, OSI model, ARP, MAC Addressing, VLANs etc. As we are often exploiting these technologies, the b...

Bruteforce Attack explained

 Bruteforce attack explained Q. What is bruteforce attack? A bruteforce attak is a trial-and-error method used to obtain information such as a usser password or personal identification number (PIN). In a bruteforce attack, automated software is used to generate a large number of consecutive guesses as to the values of the desired data. Q. How long do bruteforce attack take? As per this link,with speed of 1000,000,000passwords/sec. Cracking a 8 character password composed using 96 character takes 83.5 days. But a recent reserch presented at password 12 in norway, shows that 8 character passwords are no more safe. They can be cracked in 6 hours. Q.What is the bruteforce method? In computer science, bruteforce search on exhaustive search, also known as generate and test, is a very general problem-solving technique that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfier the problem's statement. Q. How long does ...

Popular posts from this blog

MAN IN THE MIDDLE ATTACK (MITM Attack)

How does police track location using phone number

Bruteforce Attack explained