Posts

Showing posts from December, 2021

What is Rubber ducky USB????

Image
USB Rubber ducky   is an HID device that looks similar to a USB Pen drive. It may be used to inject keystroke into a system, used to hack a system, steal victims essential and credential data can inject payload to the victim’s computers. The main important thing about USB Rubber ducky is that it cannot be detected by any Anti-Virus or Firewall as it acts as an HID device. Features:  USB Rubber ducky is a kind of key injection tool, can be used as malicious or non-malicious keystroke. It is one of the favorite devices of hackers penetration testers as it is very fast and did not detect by ant PC. USB Rubber Ducky can also be used for targeting vulnerable systems or programming processes and save times. Working: USB rubber ducky acts as a keyboard and has keystrokes installed in it When we connect it to PC the keystrokes run automatically. It has a high speed of approx. 1000 words per minute. So those works which can be done by keyboard can also be done by USB rubber ducky When ever it i

🔰How to Protect Yourself from Keylogger Attacks🔰

Image
When a hacker has an unnoticed backdoor on your computer, anything is possible, but there are a few things you can do to minimize the risk of having your keys captured: 🔸 Use antivirus software. While there's not a catch-all solution, and antivirus software won't protect against sophisticated and cutting-edge keyloggers, there's still no excuse for not using antivirus software which protects against most known keylogger software. 🔸 Use on-screen keyboards when entering passwords.One of the limitations of most keyloggers is that they only capture actual keystrokes being pressed on the keyboard. The Windows on-screen keyboard will provide a virtual keyboard that may help circumvent keyloggers. 🔸 Use a firewall. It's possible lazy attackers won't go through the effort of disguising their payloads to appear as being normal DNS (port 53) or HTTP (port 80) transmissions. A firewall might catch suspicious packets leaving your computer on port 35357. 🔸 Protect your comp

Google Dorks or Google hacking

Image
  What is a Google Dork? Google dorking, also known as Google hacking, can return information that is difficult to locate through simple search queries. That description includes information that is not intended for public viewing but that has not been adequately protected.  A search parameter is a limitation applied to a search. Here are a few examples of advanced search parameters: site:  returns files located on a particular website or domain. filetype:  followed (without a space) by a file extension returns files of the specified type, such as DOC, PDF, XLS and INI. Multiple file types can be searched for simultaneously by separating extensions with “|”. inurl:  followed by a particular string returns results with that sequence of characters in the URL. intext:  followed by the searcher’s chosen word or phrase returns files with the string anywhere in the text. As a  passive attack  method, Google dorking can return usernames and passwords, email lists, sensitive documents, persona