Skip to main content

Posts

Showing posts with the label Windows

Snatch Ransomware Reboots Windows in Safe Mode to Bypass Antivirus

Cybersecurity researchers have spotted a new variant of the Snatch ransomware that first reboots infected Windows computers into Safe Mode and only then encrypts victims' files to avoid antivirus detection. Unlike traditional malware, the new Snatch ransomware chooses to run in Safe Mode because in the diagnostic mode Windows operating system starts with a minimal set of drivers and services without loading most of the third-party startup programs, including antivirus software. Snatch has been active since at least the summer of 2018, but SophosLabs researchers spotted the Safe Mode enhancement to this ransomware strain only in recent cyber attacks against various entities they investigated. "SophosLabs researchers have been investigating an ongoing series of ransomware attacks in which the ransomware executable forces the Windows machine to reboot into Safe Mode before beginning the encryption process," the  researchers say . "The ransomware, which calls itsel...

More than 60% of Malicious Ads Targeting Windows Computer Systems – Windows Users Beware!

A new report shows that 61% of malicious ads on the Internet targeting Windows computers to infect with malware or to steal the information. The malicious ads act as a platform to distribute malware, by attracting users and redirect them to malicious websites which results in downloading the malware. Windows as Prime Target According to Devcon  observation  between July 11 – November 22, 2019, 61% of the malicious ad campaigns primarily targeting the Windows operating system, when compared to other popular operating systems. Next to the Windows operating system, the second most targeted operating system in ChromeOS which accounts for 22.5%, next is MacOS at 10.5% and the least targeted device is Apple iPads at 0.8%. Malicious Ads Source: DEVCON In another  report  published by Confiant, the malicious ads increased from Q2 to Q3. The Q3 attacks are targeting desktop computers, mainly running Windows and they are attacking users mainly in Italy, Spain,...

Steals Chrome and Firefox Browsers Data , Newly Evolved Malware Attack Drops Double Remote Access Trojan in Windows

Researchers discovered a new  malware  campaign that drops two different Remote Access Trojan(RAT) on targeted Windows systems and steal sensitive information from popular browsers such as Chrome and Firefox. The samples that uncovered by Fortinet researchers drop the RevengeRAT and WSHRAT malware and it has various obfuscation functionalities that use the various stage to maintain the persistence. RAR’s Infection Process RevengeRAT The RAT has infected the victims by utilizing the different stages. When opening the malicious sample file, it contained JavaScript code in a text editor with encoded data. Once decoded its drops the VBScript code is responsible for drop the next stage of malware. The dropper then later download the second stage of malicious downloader( “A6p.vbs” file) from the external website which also contains an obfuscated strings to avoid detection. If the downloader script will be successfully executed then it establishes a connection with...

Apple iTunes and iCloud for Windows 0-Day Exploited in Ransomware Attacks

Watch out Windows users! The cybercriminal group behind BitPaymer and iEncrypt ransomware attacks has been found exploiting a zero-day vulnerability affecting a little-known component that comes bundled with Apple's iTunes and iCloud software for Windows to evade antivirus detection. The vulnerable component in question is the  Bonjour  updater, a zero-configuration implementation of network communication protocol that works silently in the background and automates various low-level network tasks, including automatically download the future updates for Apple software. To be noted, since the Bonjour updater gets installed as a separate program on the system, uninstalling iTunes and iCloud doesn't remove Bonjour, which is why it eventually left installed on many Windows computers — un-updated and silently running in the background. Cybersecurity researchers from Morphisec Labs discovered the exploitation of the Bonjour zero-day vulnerability in August when the attackers ta...

ShortCut CommandsIn Windows..

Type the following commands in your Run Box (Windows Key + R) or Start Run. ---------------------------------- devmgmt.msc = Device Manage msinfo32 = System Information cleanmgr = Disk Cleanup ntbackup = Backup or Restore Wizard (Windows Backup Utility) mmc = Microsoft Management Console excel = Microsoft Excel (If Installed) msaccess = Microsoft Access (If Installed) powerpnt = Microsoft PowerPoint (If Installed) winword = Microsoft Word (If Installed) frontpg = Microsoft FrontPage (If Installed) notepad = Notepad wordpad = WordPad calc = Calculator msmsgs = Windows Messenger mspaint = Microsoft Paint wmplayer = Windows Media Player rstrui = System Restore netscp6 = Netscape 6.x netscp = Netscape 7.x netscape = Netscape 4.x waol = America Online control = Opens the Control Panel control printers = Opens the Printers Dialog mstsc = Remote Desktop Connection cmd=Command Prompt

How to recover/Hack Windows XP password Using Cain & Abel..

How to recover/Hack Windows XP password Using Cain & Abel....... Introduction:- In Your Windows XP, 7, VISTA, NT or 2000 system there is a file which store your system password. this file is sam(system account manager) which store all your account information (i.e., user name, password and user setting) and because password can’t be saved as it is in a file because it can be hacked easily therefore Windows encrypt this password using a key(this key is stored in System file). Both System and SAM file is stored at the same location i.e., C:\WINDOWS\system32\config so to recover password we need both these file but because these file are locked so we can not use these file from window so we need other operating system to copy both these files let’s say linux(because we can see windows drive in linux so you can go to above location and copy both sam and system file). if you don’t have linux it’s fine windows store these file in other location also i.e., C:\WINDOWS\repair which Windows...

Speed-Up Your Firefox

                                 ..::Speed-Up Your Firefox::.. How to Boost Speed of Firefox 400x Faster ? How to boost the speed of firefox 400x faster. Just follow these steps. 1-open firefox 2-write (about: config) in the address bar & hit the enter.a message prompt will be apear.again hit enter. 3-now in the blank row type network 4-change the value of max.pipelining request to 500 5-network max connections-48 6-network max.conn.per server-16 7-network.prefetch-next-false. now close the firefox & open it again.fill the address of any site & see how much you have boost your internet browsing speed . ..  ... . . .

Hacking Onto College or Schools PC And Displaying Notice:-

                                            Displaying Notice:- 1)Start -> Run 2)Type regedit 3) Go to the key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon 4) Create a new string value in the right pane named LegalNoticeCaption and enter the value that you want to see in the menubar 5) Create a new string value and name it LegalNoticeText. Modify it and insert the message you want to display each time Windows boots . .                                     Enjoy Hacking . . ..

The best guide to the Metasploit Framework

"The best guide to the Metasploit  Framework."  —HD Moore, Founder of the Metasploit  Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching youhow to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform...

Top 15 Best Free Antivirus For Windows 7

                                         Top 15 Best Free Antivirus For Windows 7 Now a days we see a lot of people are searching for a good antivirus. No wonder people are searching are the antivirus software’s, but the thing is they want a consistent and a free antivirus which updates regularly and catches new viruses as soon as they try to enter your system. The moment we talk about the antivirus,we will say go for either Kaspersky, BitDefender, Norton, ESET NOD 32 and etc. But all these antivirus software’s are a bit expensive. So how to protect your data with our buying a antivirus software? No problem at all.i have a list of free antivirus softwares which run for both Windows 7 and Windows Xp. These free antiviruses are not only free but also very consistent and worthy to use. Here goes the list 1) Microsoft Security Essentials : I would say Micro...

Create Bootable WIN XP\VISTA\WIN 7 USB

Create Bootable WIN XP\VISTA\WIN 7 USB It is very common that one time or other we all be forced to boot win XP/ 7/ Vista from USB due to many problems with our DVD drives or with their firmware versions or any other reason. If you are the one who is suffering to get this things done then this post is for you. Now you can create Windows 7, Vista, or the old XP bootable USB key with a few clicks. Yup, this is true. Read to know more! Requirements: ►USB atleast of 2GB capacity ►ISO of of your required OS(xp/7/vista) ►10 minutes of your precious time. ►A simple APP called WinToFlash tool (free) which you can download from here. Procedure: 1) Insert your pen drive and back up your files and folders as it will be formatted during the procedure. 2) Now execute WinToFlash tool. 3) Now follow the on screen instructions and browse to your Windows 7, Vista, or XP ISO files. 4) Now make sure your pen drive letter is correct. 5)The final step - Now press "create" butt...