Presentation on Advanced Cyber Attacks held on 10 Sep- 17 Sep. Topics covered:
1. QRL Jacking - Lokesh
2. Remote Harvest login via UAC force - Jebaraj
3. DeepFakes - Voice and Video - Nithin
Presentation on Advanced Cyber Attacks held on 10 Sep- 17 Sep. Topics covered:
1. QRL Jacking - Lokesh
2. Remote Harvest login via UAC force - Jebaraj
3. DeepFakes - Voice and Video - Nithin
Cybersecurity is the high technique of protecting computers, networks, and data. This image covers the overview of cybersecurity domains.
Go ahead – hover your mouse over the link to see where it goes on the status bar on the bottom of your browser.
you’ll find that it’s a completely normal link and lets understand how attackers benefit from this vulnerability.
Please note : This is not a Vulnerability or a bug , that i am exploiting. I am showing a popular Misconfiguration issue, that often many overlook.
I have been getting a lot of queries on why cyber security is tough, and what one should do to secure a place in this cyber security world. I have shared my thoughts. Please comment your opinions, will be happy to hear.
Vinod collaborates with broadcast and online media and for more than a decade, he has dedicated himself to create cybersecurity awareness among people.
The lockdown due to pandemic has forced the majority of the workforce to work from home.
(netsh wlan show profiles) | Select-String “\:(.+)$” | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name=”$name” key=clear)} | Select-String “Key Content\W+\:(.+)$” | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }} | Format-Table -AutoSize >> vino_wifi.txt