Links

Hacking Links / News

https://www.darktrace.com/en/

https://blog.radware.com/

https://geekflare.com/real-time-cyber-attacks/

https://geekflare.com/online-scan-website-security-vulnerabilities/

Do a Google Search on = types of hacking attacks

Google = Need control of the Domain Controller Server


Russian Hacking Groups

Sandworm or Unit 74455 aka Voodoo Bear or Sandworm = the most active cyberwarfare hacker group in the world.

Sandworm Malware called NotPetya

Unit 26165 aka Fancy Bear or a APT28

Carbanax or Carbanak Group Theft = https://en.wikipedia.org/wiki/Carbanak

Domain Controller Spear Fishing attack = https://www.youtube.com/watch?v=GSNopHdNnKE

North Korea KP domains List = https://github.com/mandatoryprogrammer/NorthKoreaDNSLeak/blob/master/README.md

North Korean Hackers Group called Lazarus Group


Hackers to Contact

Ukrainina Hacker Maksym Popov

Joe Grand (offspec.io) Hacker

P4X = Name of Security Researcher who hacked North Korea

Adam Weidermann member of Google Threat Analysis Group



Phrases to use:

  • cryptojacking malware attacks

  • placed a logic bomb to blow up the system at a specific time in the future

  • Wireshark is the world’s foremost and widely-used network protocol analyzer.

  • digital footprint

  • Code at = https://atdotde.blogspot.com/2020/05/high-performance-hackers.html

Videos

2022 How Cyberwarfare Actually Works Video = https://www.youtube.com/watch?v=U_7CGl6VWaQ

Big Data

Big Data is the collection and storage of vast amounts of data collected by various countries and corporations. China has ever increasing data farms that store communications from it's citizens using translated face to face speech, phone, text, email and turning on audio and video camera's and microphones of its citizens computers.

This data is stored in Chinese data farms that can be reviewed anytime in the future to compile a "Social Credit" that is used to evaluate whether the citizen is "Acceptable, Standard or Unacceptable" and the title is attached to each person to administer privileges for the rest of their life.

Videos

2021 Netflix Spycraft series

2019 The Economist Video "Could deepfakes weaken democracy as we know it?" = https://youtu.be/_m2dRDQEC1A

2019 The Economist" Video "China: facial recognition and state control" = https://youtu.be/lH2gMNrUuEY

2019 "Exposing China's Digital Dystopian Dictatorship" video = https://youtu.be/eViswN602_k

2018 How Israel Rules The World Of Cyber Security = https://www.youtube.com/watch?v=ca-C3voZwpM

2013 Ted Talk "Confessions of a cyber spy hunter" Eric Winsborrow = https://www.youtube.com/watch?v=YiUN35Ikdfw


Beware gifts bearing 'backdoors = https://yhoo.it/2OzCsTh

1. Huawei Mate 30 Smartphone

2. Lenovo Ideapad Laptop

3. Lexmark Printers

4. GoPro Hero Cameras

https://chinatechthreat.com/

Ransomware Defense for Dummies = http://bit.ly/34RxMgr

=======

Check out

Sandworm: A New Era of Cyberwar ( https://www.amazon.ca/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0525564632 )

https://www.bleepingcomputer.com/

FBI RagnarLocker = https://www.documentcloud.org/documents/21397387-ragnarlocker-ransomware-indicators-of-compromise

https://twitter.com/LatestAnonPress

Sniper Special = Snipex Alligator 114.5 x 114 mm

=====

https://www.metasploit.com/

1 Do a Network scan using Metasploit

2 Lookup for the ports running on the host system

3 Lookup for services running on the host system

4 By knowing the vulnerabilities of the services of host system if the services are outdated.

5 Performing the required attack if there is a vulnerability

Elliot Hacking Shayla


Read Penetration Test = https://www.freecodecamp.org/news/ethical-hacking-lifecycle-five-stages-of-a-penetration-test/

Hacker Typer Simulator = https://geekprank.com/hacker/

============ Research More on ====

Hackread.com


Unlock cell phones to view data

Celebrate. Com or accessdata or vu upturn report

MDFTs are mobile device forensic tool such as celebrity, greyshift, MSAB, magnet forensic, accessData

=========

Security Links

https://badpackets.net/

https://danielmiessler.com/

https://portswigger.net/daily-swig

helpnet security

- metasploit

- owasp

- bruce schneier

- brian krebs