Jump to content
Under Attack Mode

we are under attack,
For 2 days we have been the target of DDOS attack by small ScriptKiddies.
We are deploying a solution to solve the problem
Please stay tunned !


If you encounter problems with the new theme please inform the staff

@AdminSec   @mister     @SC_z     @Naylor

Search In
  • More options...
Find results that contain...
Find results in...

Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs

Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs
Read more...

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords
Read more...

Try challenges

Register & Join The Game

Break It

CEH V10

Proposal Name : Document Version
Document Release Date :
: CEH v10: EC-Council Certified Ethical
Hacker Complete Training Guide with
Practice Labs
1.0
14-May-18
Reference : Certified Ethical Hacking Workbook
View file...

Welcome to Exploit Zone

Become a ninja in the shadow !

News
  • Welcome To Exploit Zone
  • The kingdom of knowledge sharing in hacking
  • New Updates ! Stay Tunned !
  • Share your knowledge here !
  • unlash your power on our challenges !
  • Become a ninja in the Shadow !

Blogs

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

A new report published by cybersecurity researchers has unveiled evidence of Iranian state-sponsored hackers targeting dozens of companies and organizations in Israel and around the world over the past three years. Dubbed "Fox Kitten," the cyber-espionage campaign is said to have been directed at companies from the IT, telecommunication, oil and gas, aviation, government, and security sectors. "We estimate the campaign revealed in this report to be among Iran's most continuous and comp

AdminSec

AdminSec

A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices

A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices

A team of cybersecurity researchers late last week disclosed the existence of 12 potentially severe security vulnerabilities, collectively named 'SweynTooth,' affecting millions of Bluetooth-enabled wireless smart devices worldwide—and worryingly, a few of which haven't yet been patched. All SweynTooth flaws basically reside in the way software development kits (SDKs) used by multiple system-on-a-chip (SoC) have implemented Bluetooth Low Energy (BLE) wireless communication technology—poweri

AdminSec

AdminSec

500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users

500 Chrome Extensions Caught Stealing Private Data of 1.7 Million Users

Google removed 500 malicious Chrome extensions from its Web Store after they found to inject malicious ads and siphon off user browsing data to servers under the control of attackers. These extensions were part of a malvertising and ad-fraud campaign that's been operating at least since January 2019, although evidence points out the possibility that the actor behind the scheme may have been active since 2017. The findings come as part of a joint investigation by security researcher Jam

AdminSec

AdminSec

iOS URL Scheme Could Let App-in-the-Middle Attackers Hijack Your Accounts

iOS URL Scheme Could Let App-in-the-Middle Attackers Hijack Your Accounts

iOS URL Scheme Could Let App-in-the-Middle Attackers Hijack Your Accounts Security researchers have illustrated a new app-in-the-middle attack that could allow a malicious app installed on your iOS device to steal sensitive information from other apps by exploiting certain implementations of Custom URL Scheme. By default on Apple's iOS operating system, every app runs inside a sandbox of its own, which prevent all apps installed on the same device from accessing each other's data.

AdminSec

AdminSec

Hackers Can Manipulate Media Files You Receive Via WhatsApp and Telegram

Hackers Can Manipulate Media Files You Receive Via WhatsApp and Telegram

<!> Hackers Can Manipulate Media Files You Receive Via WhatsApp and Telegram <!> If you think that the media files you receive on your end-to-end encrypted secure messaging apps can not be tampered with, you need to think again. Security researchers at Symantec yesterday demonstrated multiple interesting attack scenarios against WhatsApp and Telegram Android apps, which could allow malicious actors to spread fake news or scam users into sending payments to wrong accounts

AdminSec

AdminSec

Hackers Stole $32 Million Worth Cryptocurrency Assets from Bitpoint Cryptocurrency Exchange

Hackers Stole $32 Million Worth Cryptocurrency Assets from Bitpoint Cryptocurrency Exchange

Hackers Stole $32 Million Worth Cryptocurrency Assets from Bitpoint Cryptocurrency Exchange The hackers stole 3.5 billion yen ( $32 million) worth funds in five cryptocurrencies, including Bitcoin, Bitcoin Cash, Litecoin, Ripple, and Ethereal. The exchange noted that out of the stolen 3.5 billion yen ($32 million), 2.5 billion yen ($23 million) were customer funds, while the rest were reserve funds owned by the exchange. Attackers breached the Japan-based cryptocurrency excha

AdminSec

AdminSec

What's Termux ?

What's Termux ?

Termux is an android terminal emulator, it allows each owner of an android to enjoy a linux terminal without having to root his phone. You can download it on the PlayStore : Warning If you do not root your phone you will not be able to modify your phone, because the application installs you in the directory of the application in / DATA                               If you try to go to the root of your phone access will not be allowed                Howe

AdminSec

AdminSec

Cybercriminals target pizza delivery website to concoct personalized spam campaigns

Cybercriminals target pizza delivery website to concoct personalized spam campaigns

Cybercriminals target pizza delivery website to concoct personalized spam campaigns   The scammers used the website’s content in order to create tailor-made spam campaigns. In one instance, the attackers promoted Xenical, a prescription drug used to treat obesity. A pizza delivery website has become the latest target of cyberattackers as it was exploited to deliver personalized spam campaigns. This compromised website was first discovered by Sucuri researchers who it usi

AdminSec

AdminSec

Fake JQuery Campaign On the Rise For Ad Fraud And Malvertising

Fake JQuery Campaign On the Rise For Ad Fraud And Malvertising

Fake JQuery Campaign For Ad Fraud Some malware campaigns seemingly never stop, rather they keep coming back again and again to prey on users. One such malware campaign involving fake jQuery has returned. This fake jQuery campaign now runs for ad fraud schemes and malvertising. Fake JQuery Campaign For Ad Fraud Researchers from Malwarebytes have spotted another fake jQuery campaign in the wild. The fake jQuery campaign that dates back to 2016, has once again gained momentum. Noneth

AdminSec

AdminSec

Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password

Security Flaws in WPA3 Protocol Let Attackers Hack WiFi Password

It has been close to just one year since the launch of next-generation Wi-Fi security standard WPA3 and researchers have unveiled several serious vulnerabilities in the wireless security protocol that could allow attackers to recover the password of the Wi-Fi network. WPA, or Wi-Fi Protected Access, is a standard designed to authenticate wireless devices using the Advanced Encryption Standard (AES) protocol and is intended to prevent hackers from eavesdropping on your wireless data. The Wi

AdminSec

AdminSec

540 Million Facebook User Records Found On Unprotected Amazon Servers

540 Million Facebook User Records Found On Unprotected Amazon Servers

It's been a bad week for Facebook users. First, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now… ...the bad week gets worse with a new privacy breach. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. The exposed datasets do not directly come from Facebook; instead, they were collected and unsecurely stored online by third-p

AdminSec

AdminSec

The Bank of Dakar hacked

The Bank of Dakar hacked

The Banque de Dakar has been the victim of hacking against a backdrop of fraudulent transactions. The implicated, a Senegalese and 6 Nigerians arrested by the Special Division of Cybercrime. According to AS, which gives the information, once a personal or corporate account is opened at the Bdk, they have managed, with a sophisticated computer system, to enter the network of the banking institution to pump several million Fcfa. The newspaper says they pumped about 50 million CFA francs per accoun

AdminSec

AdminSec

600,000 pirated printers to promote UX training

600,000 pirated printers to promote UX training

Printer ports open to the world Can a bot able to hack printers from around the world encourage office workers to become designers fighting the future of AI? Nothing is less certain, but this is what the Russian online university Skillbox is trying to do, which uses an iconoclastic means to publicize one of its new web design courses. Using the Shodan API, which indexes devices connected to the Web, the marketing agency Possible Group has reported that it has successfully printed a warning

AdminSec

AdminSec

Hacker who was offering Cybercrime-as-a-service detained in Novokuznetsk

Hacker who was offering Cybercrime-as-a-service detained in Novokuznetsk

Employees of the Ministry of Internal Affairs of Russia with the assistance of experts of Group-IB, an international company specializing in the prevention of cyber attacks, detained a hacker in Russian city Novokuznetsk who hacked computers around the world. The detainee offered Cybercrime-as-a-service services to cyber criminals.  He created and maintained admin panels for managing malware and botnets.     According to the local report, he infected more than 50 thousands computers acros

AdminSec

AdminSec

PHISHING ATTACKS CAPABLE OF BYPASSING MULTI-FACTOR AUTHENTICATION INCREASE

PHISHING ATTACKS CAPABLE OF BYPASSING MULTI-FACTOR AUTHENTICATION INCREASE

Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International Institute of Cyber security ensure that malicious actors have been developing their methods to deploy phishing campaigns to the point where they are able to bypass multi factor authentication. “There has been a significant increase in the number of phishing attacks capable of bypassing two-factor authentication (2FA)”, experts commented.

AdminSec

AdminSec

×
×
  • Create New...