Category Archives: Vulnerabilities & attacks

2FAssassin – Bypass Two-Factor-Authentication

2FAssassin is a tool that will help in exploiting certain misconfiguration or vulnerabilities on remote system to extract private keys from memory.

Striker – Offensive vulnerability scanner

Striker is an offensive information and vulnerability scanner that will make enumeration of remote system mostly using some online services this will make the attack not depending on user connection and it will make attacker avoid being detected or prevented

Researchers Remotely Hijack Facebook single sign-on

Single Sign-On is becoming the first way used to allow users logging into several web resources. This technology may include several vulnerabilities and here as any technology will have some advantages and disadvantages

Rakos Malware that targets IoT devices and servers under SSH

Rakos Malware that targets IoT devices and servers under SSH. Security researchers at ESET uncovered a new malware that targets IoT-devices and servers running Linux.

Pocsuite – Remote Vulnerability Testing Framework

Scanning systems is very important when you are evaluating the security on your internal assets. One of the tools that can be used during a security assessment is Pocsuite.

Several Compromised WordPress Sites Serving Malwares

Several Compromised WordPress Sites Serving Malwares Malwarebytes security researchers have reported recently another malicious campaigned using WordPress..

OpenSSL Fixed a Critical Vulnerability

This week OpenSSL Fixed a Critical Vulnerability, the new security vulnerability discovered in OpenSSL. CVE-2015-1793 is due to a problem with authentication certificate processing which may lead to MITM man in the middle attack. OpenSSL Foundation released the patch to