" On a long enough timeline, the survival rate of an organization against a dedicated adversary drops to zero. " 7 years back, around this time, on a long night in the middle of nowhere, I enco...
http://www.theprohack.com/2022/12/cyber-security-ransomware-protection-techniques.html
Crime as a Service has evolved into Ransomware as a Service (“RaaS”). The rise of ransomware attacks on companies and the way they are escalating both in terms of scale and tactics is somethi...
http://www.theprohack.com/2021/08/some-perspectives-on-rise-of-ransomware.html
It all started with my old (and very hated) HP Pavilion notebook (i5, 12 GB RAM, 500 GB HDD) almost dying on me. I wanted to get a new laptop, the only reason I stuck with HP for so many years wa...
http://www.theprohack.com/2020/09/how-i-got-myself-capable-laptop.html
I typically assess a senior cyber security candidate across 7 basic domains for a technical interview, before I actually jump into security. Sometimes, a candidate is so good in these domains th...
http://www.theprohack.com/2020/04/assessing-cyber-security-candidate-prohack.html
We have massively upgraded our sensor detection, logging and monitoring capabilities at rescure.me - we detected around 350K attacks in last 24 hours which are then funneled and curated as feed...
http://www.theprohack.com/2020/02/the-rescure-cyber-threat-intelligence.html
We are now publishing consumable list of malicious domains at rescure.me as part of our independent cyber threat intelligence project. Each node below is an event with its separate attributes...
http://www.theprohack.com/2018/10/the-rescure-cyber-threat-intelligence-project.html
We are now generating a daily blacklist of malicious IPs via our own threat intel solution. The feed will be generated every 6 hours and is now available at > HTTPS://RESCURE.ME The below s...
http://www.theprohack.com/2018/09/rescure-cyber-threat-intelligence-feed.html
There are probably hundreds (if not thousands) of tutorials on this, but since I wanted a portable, non rooted, disposable hacking device which has the ability to take calls (a.k.a a cellphone/s...
http://www.theprohack.com/2017/12/turn-your-phone-into-a-hacking-machine.html
It was getting hot at Doha, Qatar and I was thoroughly bored. And tired. Out of blue a creative request came by one of my seniors that if I have ever worked on Unity 3D. Though I have some exp...
Due to recent onslaught of attacks on SWIFT network, I thought why not to release a small introduction on the same. Here it is then gentlemen -An Introduction to SwiftNET you always wanted. I ha...
http://www.theprohack.com/2016/05/an-introduction-to-swiftnet-and-swift-network.html
Recently Fortinet confirmed there was a backdoor in their firewalls which impacted FortiGate OS Version 4.x - 5.0.7. An exploit was released in the wild but it took some efforts to work with...
http://www.theprohack.com/2016/03/fortigate-ssh-backdoor-password-calculator.html
So, I have left Accenture and have joined the red team of a Big 4; & below is my first presentation which I have given there (redacted completely; obviously). Comments are very much welcome. ...
http://www.theprohack.com/2015/07/layer-2-security-issues-Hacking-Cisco-switches-Yersinia.html
Got my hands on Cisco EX90 (that was malfunctioning) & here is my impression of it - sucks balls. The box has poor support for rs232 , has a special cable provided separately (USB to serial) w...
http://www.theprohack.com/2015/03/cisco-ex90-recovery-hacking-xconfig-console.html
I got an overwhelming response to my WARDRIVING AT DELHI PROJECT and have got a lot of emails regarding the same. I am so thrilled that so many people want to contribute to the project. Inspire...
http://www.theprohack.com/2013/03/wardriving-at-delhi-updated-open-wep.html
Happy new year folks, I am late & I know it, but there is something that I just came across & thought to share it with you. Its Read at leakedpress / Spiegel, posting from Leakedpress . If th...
Its feels like aeons since I have written anything at Prohack. Actually, I got busy with my side projects, job & some pretty shitty sticky situations (I am looking at your CitiBank) . Life was ...
http://www.theprohack.com/2013/11/subnormalitythe-webcomic-that-demands.html
I have had enough..I am very very pissed off as India has become the land of the skids & the greatest contribution to the same has been provided by imitators of FADIA BUSINESS MODEL ..And for th...
http://www.theprohack.com/2013/08/best-hackers-of-indiarevealed.html
It all started with me hunting for a point and shoot camera for my mother. To be frank , any camera with no hassles & fair performance would have qualified and I was personally looking for Nikon...
http://www.theprohack.com/2013/05/snapdeal-sucks-my-experience-with.html
I have been nagged a lot regarding guest posts, and almost 90% of them are related to some news, social media bullshit and half baked security crescendo. Until recently, I was contacted by amiab...
Simulating CISCO ASA 8.4 on GNS3, on Ubuntu is a pain in the ass. Countless QEMU errors ,203 errors, results with no output on console and many more hair-pulling skull bashing events that *will*...
winAUTOPWN has been an old favourite to automate WINDOWS hacking and vulnerability testing. The project is the brainchild of Azim Poonawala of Closed Circuit Corporate Clandestine and saw its ...
http://www.theprohack.com/2013/03/hack-windows-using-winautopwn-34.html
Dear Mr Pramit Jhaveri , Last October an incident happened with me , on a fuzzy evening I went to the nearest ATM near my home - Deutsche Bank ATM where I provided my card to my cousin who wen...
http://www.theprohack.com/2014/03/an-open-letter-to-pramit-jhaveri.html
We have got a lot of packet sniffer/analyzer software out there, I am a self confessed WIRESHARK & ETTERCAP LOVER , but still, when it comes to analyzing network traffic from command line in a f...
http://www.theprohack.com/2013/03/ngrepgrep-patterns-in-network-traffic.html
Cisco has issued a security advisory intimating that its new password hashing algorithm TYPE 4 is vulnerable,which allows Cisco TYPE 4 encoded hashes to be cracked easily. TYPE 4 is an update of ...
http://www.theprohack.com/2013/03/cisco-type-4-passwords-crackedcoding.html
“ Incredible” thats one word when you describe CARNA botnet, which is a single handed attempt to map the entire Internet by a researcher, which makes it a single most herculean feat I have ...
http://www.theprohack.com/2013/03/carna-botnetresearcher-maps-internet.html