Abdul AzizBypassing Underlying Restrictions for launching successful-NTLM Relay attacksAttacks that lead to obtaining reverse shells could be troublesome in case of restrictions enforced in the environment such as network…Dec 10, 2022Dec 10, 2022
Abdul AzizMalware Detection and Prevention using Proactive ApproachesFight between hackers and security researchers is unstoppable, hackers are writing new codes creating malicious files and security…Oct 23, 2018Oct 23, 2018
Abdul AzizMitigating Cyber Threats in Financial InstitutionsBanks, Insurance Companies, Investment Banks and other organizations are vulnerable to the inside attacks, clients at the end points are…Oct 19, 2018Oct 19, 2018
Abdul AzizExtracting Wireless network Information (Wi-Fi) via Beacon Management Frame without SSIDThe access point always uses or transmits the beacon management frame defined in IEEE 802.11 based WLANS. The beacon management frame or it…Feb 4, 2018Feb 4, 2018
Abdul AzizThe RIP Protocol & Configuration Demonstrations.The Rip stands for Routing Information Protocol is kind of Distance Vector Protocol that uses the metric value of hop counts(Routers). The…Jan 31, 2018Jan 31, 2018
Abdul AzizWhat If the Biggest Solar Storm on Record Happened Today?Repeat of 1859 Carrington Event would devastate modern world, experts says…..Jan 25, 2018Jan 25, 2018
Abdul AzizPhishing Attack Is Impossible To Detectunycode is a method of depicting Unicode using the limited character subset of ASCII which is used for internet host names. It makes it…Jan 21, 2018Jan 21, 2018
Abdul AzizQuantum Computers to destroy the Internet Security:New ERAThe traditional cryptographic techniques and algorithms/ciphers are vulnerable and are at risk, the quantum computers can break them easily…Jan 21, 2018Jan 21, 2018
Abdul AzizBreath detection via WiFi Mash NetworkAs security is a big concern in the world and when it comes to the indoor security, different sensors and motion detectors are used…Jan 20, 2018Jan 20, 2018