Cyber Security Tips – Working From Home For Senior Management Note – Enable sound – this video has an audio track.
Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video 1 Video 2 Video 3
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes code generated by the device OEM or another trusted party. Use of protected boot technology Read more…
Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the generated payload file saved in “/var/www/html” folder is essential. We use the command shown in Read more…
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to create a TCP tunnel. This can be done using a freely available application called ‘ngrok’. Read more…
Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure. There is a great deal of confusions around IoT and Industry 4.0, in terms of Read more…
Cyber Security Tips – Working From Home For Software Developers Note – Enable sound – this video has an audio track.
Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.
Cyber Security Tips – Working From Home For Sysadmins Note – Enable sound – this video has an audio track.
This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment and penetration testing of each of the app types. The difference is simple really – Read more…