Now read exploit news from Kruptos website

We have been busy during the holidays doing small researches and publishing tools. Last week we published the IP_InfoV1, an IP OSINT tool which gives blacklist details of particular IP. Today we have made a portal where one can read about the recent Exploits which has happened. Here is the link to the website. The … Read moreNow read exploit news from Kruptos website

First minimal IP OSINT tool from Kruptos.club

We’re happy and proud to publish our first ever tool. From our experiments and research we made a small yet powerful and useful abuse IP information tool. The tool is powered by AbuseIPDB which stores abuse information of IPs under different categories. Using the APIv1 we have made our IP_Info V1 tool and is now … Read moreFirst minimal IP OSINT tool from Kruptos.club

Beta Version of Kruptos.club website now made public

We are happy to announce that Kruptos Security Club will host a refreshed website design with lots of surprises packed inside after a year when we updated our portfolio. Today we’ve launched the first public beta version and is available at https://beta.kruptos.club for viewing. We’re continuously working on the website to improve performance and security.  As mentioned … Read moreBeta Version of Kruptos.club website now made public

How much should you really invest for an antivirus?

The most common question that every windows user would ask me is, “How much should I invest for an antivirus software?” There’s no point in saying that you don’t need an antivirus, but there are so many choices, free versions, cheap ones, costly ones…. Which one to choose? It all depends on what your need … Read moreHow much should you really invest for an antivirus?

Just a week into 2018, four cyber attacks already

It’s been a week into 2018, and here we have four major cyber security breaches. From Aadhaar details getting compromised to fake apps stealing banking data, 2018 has presented us with four large scale cyber attacks which potentially affect millions, even billions of people. Here’s a quick read of the 4 attacks……. Aadhaar data access … Read moreJust a week into 2018, four cyber attacks already

Bypassing App Lock on any Android device

With rapid growth of android smartphone industries, the number of android smartphone users are increasing on fast scale. With growing digital trend, the security of these devices are highly essential as all your data is stored in your phone. Spying others phone is also easy. Suppose you have a lot a private, confidential, personal photos … Read moreBypassing App Lock on any Android device

DSCI Excellence Award 2017 in Cyber Security Education for Hindustan Institute of Technology and Science

On 14th December the DSCI Excellence Awards 2017 was presented in various disciplines to honor best practices adopted by the industry, exemplary work carried out in the field of security and privacy, and reward visionary leaders. Hindustan Institute of Technology and Science was nominated under the Category of Excellence in Cyber Security Evangelism and was awarded the … Read moreDSCI Excellence Award 2017 in Cyber Security Education for Hindustan Institute of Technology and Science

Find the Operating System of a server using ping and traceroute

It is simply possible to find or understand the OS a server is running on, using Ping and Traceroute scans. Note: There are advanced tools to detect OS type, but this is one simple method that might not just be accurate if the datacenter routing traffic to a different subnet. Ping is a computer network administration … Read moreFind the Operating System of a server using ping and traceroute

MacOS HighSierra “root” vulnerability

On November 28th , Lemi Orhan, an Agile Software Craftsman, tweeted about a bug on MacOS HighSierra which allows anyone have a root access to the computer with the username “root” with a blank password which was later confirmed by Apple. Testing this bug on your Computer If you are testing it on your machine … Read moreMacOS HighSierra “root” vulnerability