Search results

  1. Dr. Smile

    Hackers have attacked the heart of the US nuclear program

    SiegedSec claims a leak of critical information. On Sunday, the hacker group SiegedSec, known for its politically motivated attacks, announced on Telegram that it had hacked the Idaho National Laboratory's personnel management app. The Group claims to have received detailed information about...
  2. Dr. Smile

    How Binance lost the US: chronology of the confrontation with the authorities

    Binance's summer began with an SEC lawsuit, and the fall ended with a $4.3 billion fine and the departure of the company's founder, Changpeng Zhao (CZ), from the position of CEO. ForkLog recalled the difficult last six months for the cryptocurrency exchange and highlighted key events. June On...
  3. Dr. Smile

    Bypass selfie verification in apps [Fake Camera] 2023

    Selfie identity verification has become one of the most common identity verification methods in apps. However, despite its popularity, selfie verification is not a perfect solution as it can be bypassed. In this article, we will look at one of the ways to bypass selfie verification in...
  4. Dr. Smile

    Georgia issued the organizer of the scheme for withdrawing cryptocurrencies to the United States

    The Georgian authorities, at the request of Interpol, extradited to the United States a Serbian citizen accused of creating fraudulent money laundering schemes through cryptocurrencies and binary options. According to investigators, 48-year-old Kristian Krstic led a large criminal organization...
  5. Dr. Smile

    Hackers Cyber Av3ngers claim hacking of sewage treatment plants in ten cities

    The hacker group claims to be involved in the crashes. A hacker group calling itself Cyber Av3ngers claimed on social media that it had hacked ten water treatment plants in Israel. Among the affected cities are Hedera, Palmachim, Sorek, Ashkelon, Haifa, Khorazim, Kfar Haruv, Taberia, Eilat and...
  6. Dr. Smile

    Several ways to Hide Your IP Address

    How do I hide my IP address? There are several ways to hide your computer's IP address. In this post, I will describe for you 5 ways to access blocked sites or, in other words, 5 ways to hide your IP address, which I happened to use myself. What is a proxy server? Simply put, in order to hide...
  7. Dr. Smile

    Carding via phone

    What is “payment by linking to a smartphone”? That's right, this is an opportunity to make purchases via your phone, but if you open the site and enter your card details there, you will be met with an anti-fraud message. To make users feel more comfortable, we have created a card link to the...
  8. Dr. Smile

    Setting up iOS and Android for carding

    You all have mobile phones, and did you know that the traffic from mobile devices is higher? Today I will tell you how to use your iphone and buckets, not only for what would have to sit in the FB) Let us carding with IOS and ANDROID IOS setup And so, first, let's discuss some details. Why iOS...
  9. Dr. Smile

    Hack admin

    Checking the awareness of personnel about cybersecurity threats is one of the most demanded cases. It is carried out, as a rule, by methods of social engineering. In today's article: • Our goal: to verify that employees comply with information security policies. • Methods: social engineering. •...
  10. Dr. Smile

    The most evil botnets. How the largest armies of malware appeared and died.

    Emotet Brief description: banker, downloader Lived: 2014 - present Number of infections: unknown Distribution methods: spam, SI Emotet is another tech banking Trojan. The first versions stole the banking data of just a few banks, but the botnet was rapidly improving and now it is also in the...
  11. Dr. Smile

    The most evil botnets. How the largest armies of malware appeared and died.

    Nowadays, you won't surprise anyone with a botnet: they are found all the time, and the infection underlying them is easily cleaned out by an antivirus - thanks to the club-handedness of the authors who collect malware on their knees from humus and sticks. But it happens that the pros start...
  12. Dr. Smile

    How to create a keylogger for Chrome browser on Linux

    Many associate such programs with illegal activities and malware. Despite the fact that keyloggers can be viewed as an invasion of privacy, it still does not violate the law in any way. Parents, for example, can acquire such software to protect their children on the Internet - and find out who...
  13. Dr. Smile

    LFCA: How to Improve Network Security

    Network security is increasingly becoming one of the areas in which organizations invest a lot of time and resources. This is because the company's network is the backbone of any IT infrastructure and connects all servers and network devices. If the network is compromised, the organization will...
  14. Dr. Smile

    STP attack and defense

    The topic of today's article is "STP attack and protection". STP has its pros and cons. Next, we will look at how you can take advantage of the features of STP to attack STP. Finally, let's talk about protecting STP from attacks. We will not retell the Internet and understand the STP protocol...
  15. Dr. Smile

    Use Nmap for DOS attacks, brute force, firewall bypass and more.

    Nmap is the benchmark among port scanners and one of the most important penetration tester tools. But can you say that you thoroughly studied all its features and methods of application? In this article, you will learn how to use Nmap to scan hosts behind a firewall, improve scan performance...
  16. Dr. Smile

    Solyanka from software

    Recreator phishing Recreator Phishing is a phishing utility for ANY sites. Just write the site address into the program and it will completely copy its php image !!! And she herself adds the code, which actually sends us the entered data. Works with ngrok even in Termux Crunch Crunch is a...
  17. Dr. Smile

    We fix ourselves in Active Directory. How to maintain access when attacking a domain.

    The content of the article Kerberos Golden Tickets Ticketer Mimikatz Meterpreter Kerberos Silver Ticket Ticketer Mimikatz SIDHistory Golden Ticket + SIDHistory AdminSDHolder DCShadow Imagine that we compromised privileged accounts using various privilege escalation techniques, spread across...
  18. Dr. Smile

    Application Guide: How to Bypass XSS Filters

    There are vulnerabilities in almost any web project, and I will teach you how to use this circumstance for your own purposes. Practical, of course. How to Investigate the Site Name Element Any web application works on the principle of character encoding "<"and">". First, you need to figure out...
  19. Dr. Smile

    JavaScript attacks on the example of bypassing Social Locker for WordPress

    The article "Attacks on JavaScript" shows examples of bypassing restrictions imposed by JavaScript. It is clear that there is a tutorial example, so it is rather pointless. Let's take a more realistic situation. In the article "Bypass HTML source blocking, bypass social blockers and other...
  20. Dr. Smile

    How representatives of different professions puncture you

    You don't need to have super technical knowledge to conduct open-source investigations on the Internet. Previously, such investigations were only available to large corporations. Nowadays, small businesses and in general anyone with the Internet can take advantage of the benefits of open data...
Top