BSides Leeds – an information security conference held at the Cloth Hall Court on the 24th of January 2020. I thought it would be a good idea to write a post about my experience and share what I learned from the day!
Continue reading “BSides Leeds 2020”
So a little introduction. Kpot Stealer is a piece of malware designed to steal credentials and other sensitive information (such as licence keys), from windows machines. Kpot was initially discovered on Russian language hacking forums.
Throughout the last few days, with the help of individuals in the security community, I was able to access the database files and web interface of a successful malware campaign. These databases contained over 200,000 credentials, along with other information about the victims.
In this post, I am going to cover how the command and control server was discovered, how I found the databases and also how a vulnerability lead to the destruction of the data on the web server. I will also cover how the malware spread and other bits of information I have learnt.
Continue reading “A Kpot Analysis”
On the 16th of November, I attended the Cyber Security Summit & Expo at the Business and Design Center in Islington. I thought I may as well write a post about it and share my experience and information I gained. I’ll break it down into the talks I visited and the companies I spoke to, just so it’s a little easier to read and find what you’re actually interested in.
Continue reading “Cyber Security Summit & Expo – My Experience”
What is a deauthentication attack?
A deauth attack is a type of DOS attack that will repeatedly knock a user off a specific WI-FI network. The attack can occur even if you are on a hidden network. This post is going to quickly cover how the attack works, protection, and tools.
Continue reading “Having fun with WI-FI Deauthentication”