Links
Hacking Links / News
https://geekflare.com/real-time-cyber-attacks/
https://geekflare.com/online-scan-website-security-vulnerabilities/
Do a Google Search on = types of hacking attacks
Google = Need control of the Domain Controller Server
Russian Hacking Groups
Sandworm or Unit 74455 aka Voodoo Bear or Sandworm = the most active cyberwarfare hacker group in the world.
Sandworm Malware called NotPetya
Unit 26165 aka Fancy Bear or a APT28
Carbanax or Carbanak Group Theft = https://en.wikipedia.org/wiki/Carbanak
Domain Controller Spear Fishing attack = https://www.youtube.com/watch?v=GSNopHdNnKE
North Korea KP domains List = https://github.com/mandatoryprogrammer/NorthKoreaDNSLeak/blob/master/README.md
North Korean Hackers Group called Lazarus Group
Hackers to Contact
Ukrainina Hacker Maksym Popov
Joe Grand (offspec.io) Hacker
P4X = Name of Security Researcher who hacked North Korea
Adam Weidermann member of Google Threat Analysis Group
Phrases to use:
cryptojacking malware attacks
placed a logic bomb to blow up the system at a specific time in the future
Wireshark is the world’s foremost and widely-used network protocol analyzer.
digital footprint
Code at = https://atdotde.blogspot.com/2020/05/high-performance-hackers.html
Videos
2022 How Cyberwarfare Actually Works Video = https://www.youtube.com/watch?v=U_7CGl6VWaQ
Big Data
Big Data is the collection and storage of vast amounts of data collected by various countries and corporations. China has ever increasing data farms that store communications from it's citizens using translated face to face speech, phone, text, email and turning on audio and video camera's and microphones of its citizens computers.
This data is stored in Chinese data farms that can be reviewed anytime in the future to compile a "Social Credit" that is used to evaluate whether the citizen is "Acceptable, Standard or Unacceptable" and the title is attached to each person to administer privileges for the rest of their life.
Videos
2021 Netflix Spycraft series
2019 The Economist Video "Could deepfakes weaken democracy as we know it?" = https://youtu.be/_m2dRDQEC1A
2019 The Economist" Video "China: facial recognition and state control" = https://youtu.be/lH2gMNrUuEY
2019 "Exposing China's Digital Dystopian Dictatorship" video = https://youtu.be/eViswN602_k
2018 How Israel Rules The World Of Cyber Security = https://www.youtube.com/watch?v=ca-C3voZwpM
2013 Ted Talk "Confessions of a cyber spy hunter" Eric Winsborrow = https://www.youtube.com/watch?v=YiUN35Ikdfw
Beware gifts bearing 'backdoors = https://yhoo.it/2OzCsTh
1. Huawei Mate 30 Smartphone
2. Lenovo Ideapad Laptop
3. Lexmark Printers
4. GoPro Hero Cameras
Ransomware Defense for Dummies = http://bit.ly/34RxMgr
=======
Check out
Sandworm: A New Era of Cyberwar ( https://www.amazon.ca/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0525564632 )
https://www.bleepingcomputer.com/
FBI RagnarLocker = https://www.documentcloud.org/documents/21397387-ragnarlocker-ransomware-indicators-of-compromise
https://twitter.com/LatestAnonPress
Sniper Special = Snipex Alligator 114.5 x 114 mm
=====
1 Do a Network scan using Metasploit
2 Lookup for the ports running on the host system
3 Lookup for services running on the host system
4 By knowing the vulnerabilities of the services of host system if the services are outdated.
5 Performing the required attack if there is a vulnerability
Elliot Hacking Shayla
Read Penetration Test = https://www.freecodecamp.org/news/ethical-hacking-lifecycle-five-stages-of-a-penetration-test/
Hacker Typer Simulator = https://geekprank.com/hacker/
============ Research More on ====
Unlock cell phones to view data
Celebrate. Com or accessdata or vu upturn report
MDFTs are mobile device forensic tool such as celebrity, greyshift, MSAB, magnet forensic, accessData
=========
Security Links
https://portswigger.net/daily-swig
helpnet security
- metasploit
- owasp
- bruce schneier
- brian krebs