Menu

Windows

All articles and tutorials tagged #Windows
Conficker a Twelve Years Old Malware Attack Connected Objects
Conficker a Twelve Years Old Malware Attack Connected Objects

Twelve years after its creation Conficker malware is now attacking connected objects. The American firm Palo Alto Networks announces that it has detected [...]

ConfickerMalwareWormMicrosoftWindowsObjects
Remote Network Penetration via NetBios using Linux and Samba
Remote Network Penetration via NetBios using Linux and Samba

A recent study carried out in December 2019 by French researchers shows that more than 60% of Windows systems using the NetBios service use a standard [...]

NetBiosLinuxWindowsSambaWorkGroupSMB
How to Extract Data from Windows Memory Dump using Volatility
How to Extract Data from Windows Memory Dump using Volatility

In terms of Digital Forensic, there are many tools that can be used to extract valuable and sensitive information directly from the memory (RAM) of a [...]

VolatilityMemoryRAMWindowsHashBitlockerDump
How Hackers Exploit BlueKeep Vulnerability on Windows Servers
How Hackers Exploit BlueKeep Vulnerability on Windows Servers

BlueKeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation of Windows 2008 R2 and Windows 7

MoneroBlueKeepMetasploitReverseDumpWindows
ACbackdoor a Malware that Infects both Windows and Linux Systems
ACbackdoor a Malware that Infects both Windows and Linux Systems

Recently, a malware named ACbackdoor has been discovered which infects both Windows and Linux based with capabilities of pretty complex operations which [...]

ACbackdoorLinuxWindowsTrojanVirusMalware
The Bluekeep Exploit is back and is used to install Cryptominer
The Bluekeep Exploit is back and is used to install Cryptominer

Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.

BlueKeepRDPCryptominerXMRMoneroWindowsVulnerability
Identify Sensitive Information using Network Enumeration
Identify Sensitive Information using Network Enumeration

Enumeration is a process where the attacker establishes an active connection with the victim and try to discover as much attack vectors as possible.

DNSenum4LinuxLinuxNTPSMBSNMPWindows
How Hackers Exploit Struts2 on Linux and Windows Servers
How Hackers Exploit Struts2 on Linux and Windows Servers

The Jakarta Multipart Parser in Apache Struts 2 has incorrect exception handling and error-message generation during file-upload attempts.

ApacheJexbossLinuxMetasploitStruts2Windows