Posts

Showing posts with the label EC

EC EHE - Cloudy Meatballs

Image
  Cloud computing is an on-demand delivery of IT capabilities, in which IT infrastructure and applications are provided to subscribers as metered services over networks. Examples of cloud solutions include Google Cloud Platform, Amazon Web Service (AWS), Microsoft Azure, and IBM Cloud. Characteristics of Cloud Computing Discussed below are the characteristics of cloud computing that attract many businesses today to adopt cloud technology. On-demand self-service : A type of service rendered by cloud service providers that allow provisions for cloud resources, such as computing power, storage, and network, always on-demand, without the need for human interaction with the service providers. Distributed storage : Distributed storage in the cloud offers better scalability, availability, and reliability of data. However, cloud distributed storage can potentially raise security and compliance concerns. Rapid elasticity : The cloud offers instant provisioning of capabilitie

EC EHE - IoT Hack Tools

Image
The IoT is not the only range of devices connected to the Internet, but it is also a very complex, rapidly growing technology. To understand and analyze various risk factors, proper security solutions must be incorporated to protect the IoT devices. The use of IoT security tools helps organizations to significantly limit security vulnerabilities, thereby protecting the IoT devices and networks from different kinds of attacks. SeaCat.io Source: https://www.teskalabs.com SeaCat.io is a security-first SaaS technology to operate IoT products in a reliable, scalable, and secure manner. It provides protection to end-users, businesses, and data. Security professionals use SeaCat.io to manage connected products from a central place, access remote devices using various tools, monitor connected devices and automate updates to fix bugs, protect users with authorized cryptography and comply with regulations, ensure devices are malware-free and prevent hackers from controll

EC EHE - IoT OWASP Threats

Image
  IoT technology is growing so quickly that it has become ubiquitous. With numerous applications and features but a lack of basic security policies, IoT devices are currently easy prey for hackers. In addition, upgrades to IoT devices have introduced new security flaws that can be easily exploited by hackers. To overcome this significant issue, manufacturing companies should consider security as the top priority, starting with planning and design, and up to deployment, implementation, management, and maintenance. Discussed below are some of the challenges facing IoT devices that make them vulnerable to threats: Lack of Security and Privacy : Most IoT devices today, such as household devices, industrial devices, healthcare devices, automobiles, etc., are connected to the Internet and contain important and confidential data. These devices lack even basic security and privacy policies, and hackers can exploit this to carry out malicious activity. Vulnerable Web Interfac

EC EHE - Mobile Hack Tools

Image
  Attackers use various Android hacking tools to identify vulnerabilities and exploit target mobile devices to obtain critical user information such as credentials, personal information, and contact lists. zANTI Source: https://www.zimperium.com zANTI is an Android application that allows you to perform the following attacks: Spoof MAC Address Create malicious Wi-Fi hotspot to capture victims to control and hijack their device traffic Scan for open ports Exploit router vulnerabilities Password complexity audits MITM and DoS attack View, modify, and redirect all HTTP requests and responses Redirect HTTPS to HTTP; redirect HTTP request to a particular IP or web page Insert HTML code into web pages Hijack sessions View and replace all images that are transmitted over the network Capture and intercept downloads     Figure 9.13: Screenshot of zANTI Some additional Android hacking tools are as follows: Network Spoofer ( https://www.digitalsquid.co.uk