alvin gitongaSep 3, 20223 min read'Blue badges in 48hrs':đ§ Instagram latest phishing attack đInstagram phishing campaign đ lures victims by offering them a blue badge đ as a verified user in 48hrs â ïž
alvin gitongaSep 3, 20222 min readMontenegro đ„ hit by Cuba ransomware đ attack â ïžMontenegro Is under ATTACK by đ cuba ransomware group đ. Demands?......$10 Million â ïž
alvin gitongaSep 3, 20223 min readđ Ragnar Locker ransomware đ claims attack on Portugal's flag airline â ïžAn attack on Portugals biggest Airline by đRagnarLocker đ, One of the worlds most notorious ransomware hackers â ïž
alvin gitongaAug 28, 20225 min readIEBC Digital system: â ïž Stark Evidence alleges attempted compromise đA critique of the IEBC system and its practices
alvin gitongaAug 28, 20223 min readMicrosoftđŁ: Russian malware đ hacks ADFS allowing log in by anyone on Windowsđ„A vulnerability allowing hackers to seize ADFS.
alvin gitongaAug 14, 20227 min readđ„ Log4SHELL: đ A Ticking Time Bomb đŁ đ„đ Log4J Fiasco and a POC of malware attack exploiting it. đ
alvin gitongaAug 9, 20225 min readTor PART 2: â ïž WELCOME to the DARK WEB đâ ïž I walk you through the Dark web and its eeky dark corners where criminals. Spies and political dissidents lurk đ
alvin gitongaAug 8, 20228 min readđ SQL INJECTION â ïž : Your Database is MINE! đđ A walkthrough of how I can use SQL injection to completely take over your database đ and relevant mitigations.
alvin gitongaAug 7, 20222 min read⥠ALLAPLE Win32 Worm âĄ: Turning a victim into an Accomplice of a crime đđ today we decifer the diabolical allaple networm.đ
alvin gitongaAug 6, 20228 min readđ„ CROSS-SITE SCRIPTING đ„: How I will Hijack your website đâ ïž A showcase of Cross-site scripting (XSS) and how it used to cause havoc on the internet today đ
alvin gitongaAug 5, 20227 min readđ„ TOR đ„: Be ANONYMOUS!đ„· đ”ïž A part one introduction to staying anonymous online wit TOR browser.
alvin gitongaAug 1, 20224 min readBLUEKEEP: đ„ Analysis of CVE-2019-0708 đ„Analysis of BLUEKEEP: đ„ CVE-2019-0708 and how it works and allows for remote code execution.
alvin gitongaJul 31, 20223 min readGHIDRA: đŠ NSA Reverse Engineering tool đŠ GHIDRA reverse engineering tool overview
alvin gitongaJul 30, 20224 min readTwitter-Hacking using Twint đŠ Twint to scrape twitter information of users with no API or sign up.
alvin gitongaJul 27, 20226 min readđ OWASP Top 10 Vulnerabilities đ:2022OWASP top 10 vulnerabilities 2022
alvin gitongaJul 26, 20224 min readGOOGLE HACKING đ„·Today we learn how to seek and find sensitive information using google advanced search techniques in preparation for a pentest.
alvin gitongaJul 24, 20226 min readSHODAN: A Hacker's Guide đ„· PART 3Part 1 & 2 was funđ„ž In this final part of the trilogy, I make you a threat to national securityđ Lets find vulnerable state infrastucture
alvin gitongaJul 23, 20224 min readSHODAN: A Hacker's Guide đ„· PART 2Welcome back Cyber Warriors! đ”ïž Last time we learnt about SHODAN, what it does and even did an example search where we landed on one of...
alvin gitongaJul 20, 20223 min readSHODAN: A Hacker's Guide đ„·A series of blogs to teach infosec how to use SHODAN in Hacking and Pentesting
alvin gitongaJul 17, 20223 min readHow AI is changing personal data trackingMost of the time, you unintentionally or voluntarily divulge sensitive information like your age, location, preferences... etc. Your...