• Hacking Team RCSAndroid Trojans

    Caution for Android devices: versions 4.0-4.3 can be fixed by RCSAndroid. The remote control trojan RCSAndroid on the Android platform is one of the most professional and complex malicious programs exposed in Android. Since the Hacking Team's information disclosure, the security field has been exposed to some vulnerabilities every day Exp and other messages, of course, there is more information to be mined. Now, it's finally Android's turn. Unfortunately, it's very bad news: a new remote access trojan (RAT). RCSAndroid has ten "super abilities" Trend Technology read the whole passage
    Author: qxz_xp | Published: July 25, 2015 | Classification: Industry News , Hacker attack and defense | 1 comment
  • Overall, 2014 domestic and foreign data leakage events

    Verizon released the 2014 Data Leakage Investigation Report, which reviewed 63737 cyber security incidents and 1367 confirmed data leakage incidents. The report data shows that the information leakage caused by the database is up to 25%. Make an inventory of the data leakage events at home and abroad in 2014, and explore the underlying technical reasons. In fact, there are still many leakage events, which are either under investigation, unconfirmed or undisclosed. It can be predicted that more serious leakage events may occur in 2015. FreeBuf Science Popularization: What is read the whole passage
    Author: qxz_xp | Published: December 22, 2014 | Classification: Industry News , Hacker attack and defense | No comment
  • Some simple social engineering points

    1. The definition of social engineering is not that you simply search the victim's information on the Internet, which is not even a narrow sense of social engineering. The activities you want to carry out are not limited to narrow social engineering. You need to carry out some in-depth interactive behaviors with victims or information owners. ① In this process, we should make full use of the known information, especially the information extended in search engines, to increase trust. For example, Google Maps can be used to explore the surrounding environment, or to understand the victim's interpersonal relationship and online activity. ... read the whole passage
    Author: qxz_xp | Published: October 26, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • By setting the route like this, 99.9% of hackers can't break it

    Routing security is a big topic. The background settings of the router are too professional, and the network card is popular. The legendary hacker seems to have disappeared... It seems that the router at home is hopeless. As long as there is a hacker who knows something about it, he will be attacked every minute. Zhaikejun (public account "Letshome") has previously discussed this topic from multiple perspectives, including technical analysis, testing, protocol specification traceability, etc. However, in these things, there is no talk about the security mechanism of routing itself that has been developed for many years. We ignored the heaviest read the whole passage
    Author: qxz_xp | Published: October 18, 2014 | Classification: Safety knowledge , network security | 7 comments
  • Share some ideas for invading designated websites

    How to invade the designated website! First, observe the designated website. Intrusion of designated websites requires conditions: You should first observe whether the website is dynamic or static. First, I will introduce what sites can be invaded: I think they must be dynamic websites such as ASP PHP, JSP and other code writing sites If it is static (. htm or html), it will not succeed. If the target website to be invaded is dynamic, you can use the vulnerabilities of dynamic websites to invade. Quote: The following are common ways to invade websites: 1. Upload vulnerability If read the whole passage
    Author: qxz_xp | Published: March 9, 2014 | Classification: Rookie Entry , Hacker attack and defense | No comment
  • Details of LAN intrusion detection process

    First of all, declare that: 1. The scope of intrusion only includes the LAN. If you are in a school, you can invade the entire campus network; 2. The only machine that can intrude is the weak password (the user name is administrator, etc., and the password is empty), or the machine that knows the account password and has opened port 139 but has not opened the firewall. Intrusion tools: Generally, three are used: NTscan abnormal scanner, Recton – D special edition of He Mian Kill, DameWare Mini Chinese 4.5 (The first two tools, antivirus software, will report viruses. It is recommended that the real-time antivirus software be temporarily turned off and this read the whole passage
    Author: qxz_xp | Published: February 1, 2014 | Classification: Rookie Entry , Hacker attack and defense | No comment