Posts

Showing posts from March, 2020

Flying FTP Server

Image
This is Education Purposes Only  Before coming to the main topic of this article, I would like to introduce a good source of knowledge in the cybersecurity domain. This source may not be new to most of you as you guys were in the field for a long time. But anyway I will keep a little note on this as im a huge fan of this Tech-Talk. The source is non-other than the "DEFCON conference" YouTube channel. ( As in my inner thoughts I would dying to participate to the actual conference one day😍).   DEFCON So writing about DEFCON for the new people, DEFCON is one of the world's prime and most outstanding hacker conventions, held yearly in Las Vegas, Nevada. Simply this is a place where all there Hackers (People with exceptional technical knowledge and out of the box thinking pattern) get together and show off their research works and share knowledge. If you follow the below link, you will find the YouTube channel where you can view the tech talks in most of th...

WHID Injector: Next Level USB attack

Image
This is Education Purposes Only It's 2020, and I believe most of you (Geeks, Tech Guy, IT Pro's, Pentesters) have already heard or Know about keystroke injection tools such as  Rubber Ducky ,  PHUKD.  Same as the above many good research ideas have been published, such as Iron HID, Mousejack, and the coolest USaBUSe. What is WHID Injector? If you are new to the topic, I will note a brief introduction WHID Injectors.  WHID  stands for "Wifi  HID. "  HID means  a human interface device , ie. Mouse, Keyboard. So You may wonder how the HID device been transformed into WHID and using to conduct a cyber attack. Let's get in there in the next topic. First, we will explore how WHID had made. WHID contains two main elements. Primarily  Atmega 32u4  (commonly used in many Arduino boards) featuring self-programming flash program memory and  ESP-12s  to provides the wifi capabilities and is widely used in IoT projec...