Brisk Infosec - Trusted IT Security Partner

Thursday, 7 March 2013

Stay away from the Threats

symantec-malaware-uk.png (900×6920)

Follow us Twitter | Friends us Facebook | Follow us Linkedin

Share This on Facebook | Share This on Twitter | Share This on Linkedin
Posted by Unknown at 05:04:00 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments
Brisk Infosec - Trusted IT Security Partner

Total Pageviews

Search This Blog

Blog Archive

  • ►  2018 (29)
    • ►  August (2)
      • ►  Aug 20 (1)
      • ►  Aug 17 (1)
    • ►  July (3)
      • ►  Jul 30 (1)
      • ►  Jul 18 (1)
      • ►  Jul 05 (1)
    • ►  June (4)
      • ►  Jun 30 (1)
      • ►  Jun 26 (1)
      • ►  Jun 18 (1)
      • ►  Jun 02 (1)
    • ►  May (7)
      • ►  May 30 (1)
      • ►  May 24 (1)
      • ►  May 22 (1)
      • ►  May 18 (1)
      • ►  May 16 (1)
      • ►  May 10 (1)
      • ►  May 08 (1)
    • ►  April (4)
      • ►  Apr 23 (1)
      • ►  Apr 19 (1)
      • ►  Apr 12 (1)
      • ►  Apr 02 (1)
    • ►  March (3)
      • ►  Mar 23 (1)
      • ►  Mar 16 (1)
      • ►  Mar 13 (1)
    • ►  February (2)
      • ►  Feb 15 (1)
      • ►  Feb 07 (1)
    • ►  January (4)
      • ►  Jan 29 (1)
      • ►  Jan 10 (1)
      • ►  Jan 04 (1)
      • ►  Jan 03 (1)
  • ►  2017 (13)
    • ►  December (3)
      • ►  Dec 29 (1)
      • ►  Dec 16 (1)
      • ►  Dec 15 (1)
    • ►  November (5)
      • ►  Nov 29 (1)
      • ►  Nov 22 (1)
      • ►  Nov 20 (1)
      • ►  Nov 16 (1)
      • ►  Nov 15 (1)
    • ►  May (5)
      • ►  May 24 (2)
      • ►  May 23 (1)
      • ►  May 19 (2)
  • ►  2016 (67)
    • ►  December (1)
      • ►  Dec 09 (1)
    • ►  November (4)
      • ►  Nov 10 (1)
      • ►  Nov 08 (1)
      • ►  Nov 02 (1)
      • ►  Nov 01 (1)
    • ►  October (4)
      • ►  Oct 23 (1)
      • ►  Oct 18 (1)
      • ►  Oct 16 (1)
      • ►  Oct 12 (1)
    • ►  September (4)
      • ►  Sept 17 (1)
      • ►  Sept 11 (1)
      • ►  Sept 08 (1)
      • ►  Sept 07 (1)
    • ►  April (9)
      • ►  Apr 15 (1)
      • ►  Apr 13 (1)
      • ►  Apr 07 (1)
      • ►  Apr 06 (1)
      • ►  Apr 05 (1)
      • ►  Apr 04 (1)
      • ►  Apr 03 (1)
      • ►  Apr 02 (1)
      • ►  Apr 01 (1)
    • ►  March (17)
      • ►  Mar 31 (1)
      • ►  Mar 30 (2)
      • ►  Mar 29 (1)
      • ►  Mar 23 (1)
      • ►  Mar 22 (1)
      • ►  Mar 21 (2)
      • ►  Mar 17 (2)
      • ►  Mar 16 (2)
      • ►  Mar 15 (1)
      • ►  Mar 12 (1)
      • ►  Mar 10 (1)
      • ►  Mar 03 (1)
      • ►  Mar 01 (1)
    • ►  February (10)
      • ►  Feb 27 (1)
      • ►  Feb 26 (1)
      • ►  Feb 23 (1)
      • ►  Feb 22 (1)
      • ►  Feb 20 (1)
      • ►  Feb 19 (1)
      • ►  Feb 17 (1)
      • ►  Feb 03 (1)
      • ►  Feb 01 (2)
    • ►  January (18)
      • ►  Jan 30 (1)
      • ►  Jan 28 (2)
      • ►  Jan 26 (1)
      • ►  Jan 22 (1)
      • ►  Jan 20 (2)
      • ►  Jan 19 (1)
      • ►  Jan 17 (1)
      • ►  Jan 15 (1)
      • ►  Jan 14 (1)
      • ►  Jan 13 (1)
      • ►  Jan 12 (1)
      • ►  Jan 11 (2)
      • ►  Jan 04 (1)
      • ►  Jan 03 (1)
      • ►  Jan 02 (1)
  • ►  2015 (38)
    • ►  December (10)
      • ►  Dec 30 (2)
      • ►  Dec 29 (1)
      • ►  Dec 27 (1)
      • ►  Dec 23 (2)
      • ►  Dec 20 (1)
      • ►  Dec 18 (1)
      • ►  Dec 17 (1)
      • ►  Dec 09 (1)
    • ►  November (21)
      • ►  Nov 28 (2)
      • ►  Nov 26 (2)
      • ►  Nov 25 (2)
      • ►  Nov 23 (1)
      • ►  Nov 19 (2)
      • ►  Nov 18 (2)
      • ►  Nov 17 (1)
      • ►  Nov 16 (1)
      • ►  Nov 14 (1)
      • ►  Nov 12 (3)
      • ►  Nov 09 (1)
      • ►  Nov 06 (2)
      • ►  Nov 05 (1)
    • ►  October (3)
      • ►  Oct 06 (1)
      • ►  Oct 02 (1)
      • ►  Oct 01 (1)
    • ►  September (2)
      • ►  Sept 30 (1)
      • ►  Sept 20 (1)
    • ►  May (1)
      • ►  May 25 (1)
    • ►  January (1)
      • ►  Jan 16 (1)
  • ►  2014 (41)
    • ►  December (7)
      • ►  Dec 19 (1)
      • ►  Dec 17 (1)
      • ►  Dec 15 (1)
      • ►  Dec 10 (1)
      • ►  Dec 08 (2)
      • ►  Dec 06 (1)
    • ►  November (3)
      • ►  Nov 21 (1)
      • ►  Nov 13 (1)
      • ►  Nov 10 (1)
    • ►  October (4)
      • ►  Oct 23 (1)
      • ►  Oct 20 (3)
    • ►  August (2)
      • ►  Aug 20 (1)
      • ►  Aug 11 (1)
    • ►  July (7)
      • ►  Jul 31 (2)
      • ►  Jul 30 (1)
      • ►  Jul 29 (2)
      • ►  Jul 28 (1)
      • ►  Jul 07 (1)
    • ►  April (5)
      • ►  Apr 29 (1)
      • ►  Apr 21 (1)
      • ►  Apr 10 (1)
      • ►  Apr 07 (1)
      • ►  Apr 06 (1)
    • ►  March (7)
      • ►  Mar 30 (1)
      • ►  Mar 28 (1)
      • ►  Mar 26 (1)
      • ►  Mar 25 (1)
      • ►  Mar 18 (1)
      • ►  Mar 12 (1)
      • ►  Mar 06 (1)
    • ►  February (1)
      • ►  Feb 14 (1)
    • ►  January (5)
      • ►  Jan 21 (2)
      • ►  Jan 17 (1)
      • ►  Jan 10 (1)
      • ►  Jan 06 (1)
  • ▼  2013 (247)
    • ►  December (4)
      • ►  Dec 23 (1)
      • ►  Dec 16 (1)
      • ►  Dec 10 (1)
      • ►  Dec 03 (1)
    • ►  November (8)
      • ►  Nov 28 (1)
      • ►  Nov 19 (1)
      • ►  Nov 18 (1)
      • ►  Nov 12 (1)
      • ►  Nov 11 (1)
      • ►  Nov 07 (1)
      • ►  Nov 05 (1)
      • ►  Nov 04 (1)
    • ►  October (18)
      • ►  Oct 31 (2)
      • ►  Oct 30 (2)
      • ►  Oct 29 (2)
      • ►  Oct 24 (1)
      • ►  Oct 18 (4)
      • ►  Oct 15 (1)
      • ►  Oct 08 (2)
      • ►  Oct 07 (2)
      • ►  Oct 04 (2)
    • ►  September (19)
      • ►  Sept 27 (3)
      • ►  Sept 25 (2)
      • ►  Sept 05 (3)
      • ►  Sept 04 (4)
      • ►  Sept 03 (3)
      • ►  Sept 02 (4)
    • ►  August (53)
      • ►  Aug 30 (4)
      • ►  Aug 28 (6)
      • ►  Aug 27 (1)
      • ►  Aug 26 (1)
      • ►  Aug 25 (3)
      • ►  Aug 23 (2)
      • ►  Aug 22 (4)
      • ►  Aug 21 (1)
      • ►  Aug 20 (3)
      • ►  Aug 19 (2)
      • ►  Aug 18 (1)
      • ►  Aug 16 (2)
      • ►  Aug 15 (1)
      • ►  Aug 14 (8)
      • ►  Aug 09 (5)
      • ►  Aug 08 (2)
      • ►  Aug 07 (2)
      • ►  Aug 06 (1)
      • ►  Aug 05 (3)
      • ►  Aug 02 (1)
    • ►  July (41)
      • ►  Jul 31 (4)
      • ►  Jul 30 (3)
      • ►  Jul 29 (5)
      • ►  Jul 25 (1)
      • ►  Jul 24 (3)
      • ►  Jul 23 (3)
      • ►  Jul 21 (2)
      • ►  Jul 19 (2)
      • ►  Jul 18 (1)
      • ►  Jul 15 (3)
      • ►  Jul 11 (5)
      • ►  Jul 08 (3)
      • ►  Jul 04 (1)
      • ►  Jul 03 (5)
    • ►  June (38)
      • ►  Jun 30 (1)
      • ►  Jun 27 (5)
      • ►  Jun 24 (1)
      • ►  Jun 23 (1)
      • ►  Jun 21 (3)
      • ►  Jun 20 (1)
      • ►  Jun 19 (1)
      • ►  Jun 18 (8)
      • ►  Jun 17 (4)
      • ►  Jun 14 (2)
      • ►  Jun 12 (1)
      • ►  Jun 10 (3)
      • ►  Jun 07 (1)
      • ►  Jun 06 (3)
      • ►  Jun 05 (2)
      • ►  Jun 04 (1)
    • ►  May (22)
      • ►  May 31 (4)
      • ►  May 29 (3)
      • ►  May 21 (2)
      • ►  May 20 (1)
      • ►  May 16 (2)
      • ►  May 14 (2)
      • ►  May 13 (4)
      • ►  May 10 (3)
      • ►  May 03 (1)
    • ►  April (25)
      • ►  Apr 30 (1)
      • ►  Apr 27 (1)
      • ►  Apr 26 (1)
      • ►  Apr 25 (2)
      • ►  Apr 24 (1)
      • ►  Apr 23 (3)
      • ►  Apr 22 (1)
      • ►  Apr 19 (1)
      • ►  Apr 18 (1)
      • ►  Apr 17 (2)
      • ►  Apr 11 (1)
      • ►  Apr 10 (1)
      • ►  Apr 09 (1)
      • ►  Apr 08 (1)
      • ►  Apr 05 (1)
      • ►  Apr 04 (1)
      • ►  Apr 02 (3)
      • ►  Apr 01 (2)
    • ▼  March (19)
      • ►  Mar 28 (1)
      • ►  Mar 26 (2)
      • ►  Mar 25 (1)
      • ►  Mar 22 (1)
      • ►  Mar 16 (1)
      • ►  Mar 15 (1)
      • ►  Mar 14 (1)
      • ►  Mar 13 (1)
      • ►  Mar 12 (2)
      • ►  Mar 11 (1)
      • ▼  Mar 07 (1)
        • Stay away from the Threats
      • ►  Mar 06 (2)
      • ►  Mar 05 (2)
      • ►  Mar 04 (2)

Popular Posts

  • Two functions to attack Web Application Firewalls.
    WAFNinja is a CLI tool written in Python. It shall help penetration testers to bypass a WAF by automating steps necessary for bypassing ...
  • Reverse Shell's for exploit command execution attack
    If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably wa...
  • Top 31 Metasploit Auxiliary Scanner Tutorials - Kali Linux
      CASE 1: This module queries the FrontPage Server Extensions and determines whether anonymous access is allowed. use auxiliary/scanne...
  • Auto Local Privilege Escalation Tool
    An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically This script is creat...
  • IIS Short Name Scanner v2.3.8
    The latest version of scanner for IIS short file name (8.3) disclosure vulnerability by using the tilde (~) character. Description Mic...
  • Malicious Traffic Detection System Tool
    Introduction Maltrail  is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or ge...
  • The Python Router Exploitation Framework Tool
    The RouteSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that ai...
  • FTP Authendication Attack with Metasploit
      Name      : FTP Authentication Scanner Module    : auxiliary/scanner/ftp/ftp_login Version   : 14976 License   : Metasploit Framewor...
  • APKiD tool — Detecting Malware And Tampered Android Apps
    APKID TOOL — DETECTING MALWARE AND TAMPERED ANDROID APPS INTRODUCTION: APKiD Tool finds what type of packers, obfuscator and compiler...
  • Directory Traversal Attack Cheat Sheet for Application Penetration Test
      Are attackers dot-dot-slashing their way into your data? About as simple to fix as they are to exploit, directory traversal vulnera...

Categories

  • $99 Pentest (6)
  • $99 Security test (3)
  • a1 injection (1)
  • Android (7)
  • Android cheet sheet. (3)
  • android pentest (12)
  • Android Security (14)
  • anonymus (3)
  • Anyone Really Responsible (2)
  • Bit coin (1)
  • boot camp (1)
  • Botnet (2)
  • BriskInfoSec (21)
  • CCleaner (3)
  • Central Monitoring System (3)
  • cheetsheet (2)
  • Chennai penetration testing (7)
  • Chinese cyberspies (4)
  • citadel (1)
  • cloud security (7)
  • CMS (1)
  • complaince (5)
  • Complaince assesment (3)
  • cookie hijacking (1)
  • Credit card hack (3)
  • Cross Site scripting (1)
  • Crypto Currency (1)
  • currency (1)
  • customers (1)
  • cyber attack (1)
  • cyber forensics (4)
  • cyber Security (15)
  • Cybercrime underground (5)
  • Data Security (8)
  • DDE (1)
  • developer (1)
  • Directory Traversal attack (1)
  • DIY Google Dorks (4)
  • Ethical hacking (46)
  • evidence (2)
  • exploit kit or exploiting (4)
  • Facebook (7)
  • framework (1)
  • google (4)
  • Google Dorks (2)
  • google hack (4)
  • hackers (8)
  • Hacking website? (3)
  • haking (1)
  • hashes (1)
  • honeyd (1)
  • Honeypot (2)
  • Hotspot (2)
  • How to check login page security test (1)
  • How to secure website? (5)
  • html (1)
  • HTML Injection (1)
  • HTTP Request (1)
  • impact of sql (1)
  • Indian Cyber Law (2)
  • INDIAN SPY (3)
  • Indian surveillance programme (2)
  • information Gathering (1)
  • information security for 250/- (4)
  • infosec (4)
  • Insecure Authentication (1)
  • Internet monitoring (3)
  • IoT (2)
  • Joomla Security (1)
  • kali linux (4)
  • KERLA (1)
  • login page pentest (2)
  • MALAYALAM (2)
  • malware (4)
  • metasploit (3)
  • mobile hacking (6)
  • Mobile pentesting (8)
  • mobile Security (2)
  • ms office (1)
  • Network security (15)
  • networking (3)
  • New York Times (3)
  • Newsreader app (2)
  • nmap (1)
  • NSA (7)
  • onelinershell (1)
  • Online Privacy (3)
  • OpenVAS (1)
  • osint (1)
  • owasp (5)
  • OWASP MOBILE TOP 10 (2)
  • palantir (1)
  • passwords (3)
  • PCI-DSS (1)
  • penetration test case for login page (1)
  • Penetration Testing (20)
  • pentesting cookies (2)
  • Pentesting login pages (4)
  • Perkele (1)
  • Phone hacking (2)
  • powershell (2)
  • powershell scripting (2)
  • Privacy Bill (1)
  • privacy protection (1)
  • QR code (1)
  • qwasp a1 injection (1)
  • reverch shell (1)
  • RFID hack (1)
  • risk management (1)
  • RTI Act (1)
  • SAN 25 (1)
  • scanning (2)
  • Secuirty (1)
  • Security (12)
  • security expert (6)
  • security misconfiguration (2)
  • security pentest (1)
  • security Testing (4)
  • security tips (6)
  • Security tool (1)
  • secuurity (1)
  • session attack (1)
  • session fixation attack (2)
  • Session hijacking (4)
  • SMS malware (2)
  • social media (2)
  • social networking surveillance (1)
  • sql injection (1)
  • surveillance (5)
  • training (1)
  • tread (1)
  • trend micro (1)
  • Trojan (1)
  • twitter (1)
  • types of sql (1)
  • update kali linux (2)
  • USA (1)
  • Versafe (1)
  • virus (2)
  • vulnerability (2)
  • Vulnerability assesment (1)
  • weapons (1)
  • Web application (15)
  • Web security (13)
  • web-application security (1)
  • Webcam attack (1)
  • Webgoat (1)
  • Website Pentest (15)
  • Wi-Fi in coffee shops (1)
  • windows (1)
  • windows login page pentest (1)
  • Windows 8 (2)
  • windows hacking (2)
  • XSS (1)
  • Your Company's Data Security (2)
  • zertificate.apk (2)
  • Zeus (2)

About Me

Unknown
View my complete profile
Powered By Brisk InfoSec Solution LLP. Awesome Inc. theme. Theme images by urbancow. Powered by Blogger.