<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacker Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/hacker/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 30 Mar 2022 23:44:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>What is smishing and how to avoid these dangerous attacks?</title>
		<link>https://www.osradar.com/what-is-smishing-and-how-to-avoid-these-dangerous-attacks/</link>
					<comments>https://www.osradar.com/what-is-smishing-and-how-to-avoid-these-dangerous-attacks/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Fri, 08 Apr 2022 21:42:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[smishing]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=35478</guid>

					<description><![CDATA[<p>Hello! Cybercriminals are always focused on trying to get money from their victims. With this in mind, they use any kind of method to scam and steal money from them. One of the most used methods is to steal our credentials for different online accounts, bank login and password and even credit card theft. To [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/what-is-smishing-and-how-to-avoid-these-dangerous-attacks/">What is smishing and how to avoid these dangerous attacks?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Cybercriminals are always focused on trying to get money from their victims. With this in mind, they use any kind of method to scam and steal money from them. One of the most used methods is to steal our credentials for different online accounts, bank login and password and even credit card theft. To accomplish this, they use phishing. In fact, This attack arrives by e-mail and induces the victim to click on a link. This link then leads to a website specifically designed to look like a legitimate website of a bank or any other service. It is at this point that the victim suffers the fraud. However, this is not the only large-scale attack out there. Therefore, today we are going to talk about one of the most dangerous ones, which is Smishing.</p>



<h2>What is Smishing</h2>



<p>Smishing is a very dangerous variant of the typical <a href="https://www.osradar.com/2fa-apps-to-protect-account-security/" target="_blank" rel="noreferrer noopener">Phishing</a> attacks that reach us by e-mail. Although the form of attack changes regarding Phishing, the objective is the same. The aim is to deceive the victim in an attempt to steal his or her login credentials, bank accounts and even debit or credit cards. This is done by making the victim believe that they are on an official and legitimate website. Our security and privacy is at risk from this type of attack. We could certainly leave our passwords exposed, including any bank accounts we may have, so we must be meticulous with this type of attack.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="500" height="504" src="https://www.osradar.com/wp-content/uploads/2022/03/smi.png" alt="" class="wp-image-35479" srcset="https://www.osradar.com/wp-content/uploads/2022/03/smi.png 500w, https://www.osradar.com/wp-content/uploads/2022/03/smi-298x300.png 298w, https://www.osradar.com/wp-content/uploads/2022/03/smi-150x150.png 150w" sizes="(max-width: 500px) 100vw, 500px" /></figure>



<p>Smishing uses SMS messages that we receive on our cell phones with a link. This SMS message &#8220;appears&#8221; to be from our bank. However, cybercriminals change the origin of these SMSes so that the victim trusts that he has received an SMS from <a href="https://www.bankofamerica.com/" target="_blank" rel="noreferrer noopener">BOFA</a>, Wells Fargo, Citi or any other bank.</p>



<h3>How it&#8217;s work?</h3>



<p>You will receive this SMS whether you are a customer of this particular bank. In other words, if we have an account with Wells Fargo, we can perfectly receive an SMS pretending to be from Citi.  When we receive an SMS from a bank where we do not have an account, we usually delete it. However, if it just so happens that you do have that bank, then you could trust the SMS you receive. Consequently, clicking on the link can lead to fraud.</p>



<p>Nowadays, this type of attack is aimed at stealing bank accounts or credit cards. Therefore, we must pay close attention to the SMS we receive from our bank. It is certainly critical not to click on any link in the SMS to avoid this phishing attack on the bank. What we want is to avoid that we are the victims of identity theft. Next we will see how smishing behaves.</p>



<h2>How to detect this attack and avoid it</h2>



<p>This phishing attack aims to steal our credentials. However, it can be easily and quickly detected. On the other hand, this depends on what kind of SMS we receive and how the <em>hook </em>message is constructed to make users fall for the scam.</p>



<p>The first thing to look at is the spelling of the SMS. In fact, this type of attack is usually carried out by cybercriminals who are in other countries and do not know the spelling of English. We should also look at the way they address us. This is easy to check by comparing it with legitimate SMS from our bank. In the end, the result is typically different.</p>



<p>The second thing to look at is whether they encourage you to click on the link. That is, they are looking for the user&#8217;s fear and inform us that something is wrong or that there has been an excessive charge in the bank account, and invite us to review it. It is possible that if we click on it, they may ask us for personal information. This information will later be used against us maliciously. Another aspect you should check is whether there is a hurry for you to click on the link yourself, i.e., it is something very urgent that cannot wait. This way we can easily detect if an SMS is smishing.</p>



<h3>Please use common sense</h3>



<p>We should also check if the SMS has a link to the bank&#8217;s website. In fact, you should never access your bank through a link you have received by SMS. To avoid problems, access directly through the app on your cell phone or from the official website that you have saved in your computer&#8217;s bookmarks. This way, you will be able to access your bank account safely and without fear. If you click on the link, you may be taken to a website that is specifically designed to deceive you. That is, it is the same as the official one but will be used to steal your login and password. Consequently, you should never enter your credentials on such a website.</p>



<p>A few years ago, illegitimate scam websites used the HTTP protocol for their scams. This protocol does not offer any kind of point-to-point encryption, so it was the first aspect you should check to see whether it was a legitimate website or not.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="599" height="599" src="https://www.osradar.com/wp-content/uploads/2022/03/smi2.png" alt="" class="wp-image-35482" srcset="https://www.osradar.com/wp-content/uploads/2022/03/smi2.png 599w, https://www.osradar.com/wp-content/uploads/2022/03/smi2-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/smi2-150x150.png 150w" sizes="(max-width: 599px) 100vw, 599px" /></figure>



<p>Consequently, if the user does not see the padlock, then he/she is already suspicious. Nowadays, scam websites also work with HTTPS. However, this means that the communications are encrypted with the scam website, it does not mean that the website is secure and legitimate. Therefore, although this website uses HTTPS, it could very well be a fake of the legitimate website.</p>



<h2>What should we do</h2>



<p>What you should do if you receive an illegitimate SMS is to delete it as soon as you receive it. In addition, you should never click on the link or link that we have in the SMS. This way, you will not be a victim of this type of attack. Finally, we must use common sense. In fact, the bank will never ask us for data that they already have, such as our username and password, nor the data of the debit or credit card. If you receive an SMS that urges you to hurry, you should know that your bank will never contact you by SMS for important matters, but will call you directly.</p>



<h2>What to do if we have already been victimized</h2>



<p>What you should know is that if you have not clicked on the link you are not in danger, you simply need to delete the SMS and not click on it unintentionally. It is significant that you delete this SMS as soon as possible to avoid entering the link accidentally.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="384" src="https://www.osradar.com/wp-content/uploads/2022/03/smi3-1024x384.png" alt="" class="wp-image-35483" srcset="https://www.osradar.com/wp-content/uploads/2022/03/smi3-1024x384.png 1024w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-300x113.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-768x288.png 768w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-1536x576.png 1536w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-2048x768.png 2048w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-696x261.png 696w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-1068x401.png 1068w, https://www.osradar.com/wp-content/uploads/2022/03/smi3-1920x720.png 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>If you have clicked on the link, there are some SMSes that take you to a fraudulent bank website and invite you to fill in your username and password. If you have not filled in anything on this website, simply exit this fraudulent website and delete the SMS you have received. In case you have filled on the website with personal data, you should do the following:</p>



<ul><li>Review what data we have provided and what they can do with it.</li><li>If you have entered your bank username and password, log in as soon as possible through the app or via the web and change the password. You can also call your bank manager directly to inform him/her of the issue. In consequence,  he/she can be alert in case you have suffered an intrusion in your account.</li><li>If you have entered your credit or debit card, block it as soon as possible. Even if no charge has occurred yet.</li></ul>



<h2>What to do if you download a malicious app from a link</h2>



<p>In case you click on the link, you should never install an application because it could be a banking Trojan to steal all our bank accounts. So, what you should do is delete the downloaded application or program. In the same way, you have to delete the downloaded application or program, exit the fraudulent website and also delete the SMS message you have received. If you have installed the fraudulent application, you should quickly do the following:</p>



<ul><li>Delete the app as soon as possible.</li><li>Download an antivirus for your smartphone. Start scanning as soon as possible to remove any malware that may have been installed.</li><li>Change the passwords of all the accounts you manage with your smartphone, including those of your bank.</li></ul>



<p>However, the best thing to do is to restore it to factory defaults to make 100% sure that no trace of the malware remains. In this way we have seen what smishing is and how we can protect ourselves. Bye</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/what-is-smishing-and-how-to-avoid-these-dangerous-attacks/">What is smishing and how to avoid these dangerous attacks?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/what-is-smishing-and-how-to-avoid-these-dangerous-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to install WPScan on Ubuntu 20.04/ 18.04?</title>
		<link>https://www.osradar.com/install-wpscan-on-ubuntu-20-04-18-04/</link>
					<comments>https://www.osradar.com/install-wpscan-on-ubuntu-20-04-18-04/#comments</comments>
		
		<dc:creator><![CDATA[angeloma]]></dc:creator>
		<pubDate>Mon, 22 Jun 2020 16:11:00 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Unix]]></category>
		<category><![CDATA[bionic]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[howto]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[scan]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[wordpress]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=11752</guid>

					<description><![CDATA[<p>Security is something that all of us must care about quite a bit. Especially if we have a web site that we manage. And although it is true that, the security aspects of the various applications of a server have been greatly improved, it is also true that cyber thieves have also improved. In this [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/install-wpscan-on-ubuntu-20-04-18-04/">How to install WPScan on Ubuntu 20.04/ 18.04?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security is something that all of us must care about quite a bit. Especially if we have a web site that we manage. And although it is true that, the security aspects of the various applications of a server have been greatly improved, it is also true that cyber thieves have also improved. In this sense, WordPress is one of the most popular CMS that exist today, is very well designed making it a safe option. However, it is convenient that we use tools to verify the possible vulnerabilities that our site may have built with WordPress. Therefore, I will teach you how to install WPScan on Ubuntu 20.04 / 18.04 so that you can use it and make a study on a website made with WordPress and thus know and improve the vulnerabilities.</p>
<p>According to its <a href="https://wpscan.org/">website</a>, WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner. It is written for security professionals and blog maintainers to test the security of their sites. Normally, WPScan comes pre-installed on operating systems specifically geared towards security audits.</p>
<p>Of course, this tool is Open Source so we can examine its source code to learn more. In addition, it is possible to access more information about it on <a href="https://github.com/wpscanteam/wpscan">its Github site</a>. The requirements are <a href="https://www.osradar.com/install-ruby-debian-10/">Ruby</a>, <a href="https://www.osradar.com/introduction-to-the-git-branches/">Git</a>, <a href="https://www.osradar.com/how-to-use-curl-command-linux/">Curl</a>, and RubyGems.</p>
<p>So let&#8217;s install WPScan on Ubuntu 20.04/ 18.04.</p>
<h2>Update the System</h2>
<p>The first step is to update the system. So open a terminal and run the following command.</p>
<pre>:~$ sudo apt update &amp;&amp; sudo apt upgrade -y</pre>
<p><figure id="attachment_11754" aria-describedby="caption-attachment-11754" style="width: 1365px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-11754" src="https://www.osradar.com/wp-content/uploads/2019/04/1-3.png" alt="1.- Upgrade the system" width="1365" height="510" srcset="https://www.osradar.com/wp-content/uploads/2019/04/1-3.png 1365w, https://www.osradar.com/wp-content/uploads/2019/04/1-3-300x112.png 300w, https://www.osradar.com/wp-content/uploads/2019/04/1-3-768x287.png 768w, https://www.osradar.com/wp-content/uploads/2019/04/1-3-1024x383.png 1024w, https://www.osradar.com/wp-content/uploads/2019/04/1-3-696x260.png 696w, https://www.osradar.com/wp-content/uploads/2019/04/1-3-1068x399.png 1068w, https://www.osradar.com/wp-content/uploads/2019/04/1-3-1124x420.png 1124w" sizes="(max-width: 1365px) 100vw, 1365px" /><figcaption id="caption-attachment-11754" class="wp-caption-text">1.- Upgrade the system</figcaption></figure></p>
<p>Once the system has finished installing the security patches, you will have a more stable and robust system.</p>
<h2>Install some required packages</h2>
<p>The next step to install WPScan on Ubuntu 20.04 / 18.04, is to get some packages that are necessary for the installation. Some of them are libraries and others are applications as such.</p>
<pre>:~$ sudo apt install curl git libcurl4-openssl-dev make zlib1g-dev gawk g++ gcc libreadline6-dev libssl-dev libyaml-dev libsqlite3-dev sqlite3 autoconf libgdbm-dev libncurses5-dev automake libtool bison pkg-config ruby ruby-bundler ruby-dev</pre>
<p><figure id="attachment_11755" aria-describedby="caption-attachment-11755" style="width: 1365px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-11755" src="https://www.osradar.com/wp-content/uploads/2019/04/2-3.png" alt="2.- Install the required packages" width="1365" height="652" srcset="https://www.osradar.com/wp-content/uploads/2019/04/2-3.png 1365w, https://www.osradar.com/wp-content/uploads/2019/04/2-3-300x143.png 300w, https://www.osradar.com/wp-content/uploads/2019/04/2-3-768x367.png 768w, https://www.osradar.com/wp-content/uploads/2019/04/2-3-1024x489.png 1024w, https://www.osradar.com/wp-content/uploads/2019/04/2-3-696x332.png 696w, https://www.osradar.com/wp-content/uploads/2019/04/2-3-1068x510.png 1068w, https://www.osradar.com/wp-content/uploads/2019/04/2-3-879x420.png 879w" sizes="(max-width: 1365px) 100vw, 1365px" /><figcaption id="caption-attachment-11755" class="wp-caption-text">2.- Install the required packages</figcaption></figure></p>
<p>So, you can now install WPScan.</p>
<h2>Install WPScan on Ubuntu 20.04 / 18.04</h2>
<p>Now you start the installation process. For this, you will use RubyGems.</p>
<pre>:~$ sudo gem install wpscan</pre>
<p><figure id="attachment_11756" aria-describedby="caption-attachment-11756" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="wp-image-11756 size-full" src="https://www.osradar.com/wp-content/uploads/2019/04/3-3.png" alt="3.- Install WPScan on Ubuntu 20.04 / 18.04" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2019/04/3-3.png 1366w, https://www.osradar.com/wp-content/uploads/2019/04/3-3-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2019/04/3-3-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2019/04/3-3-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2019/04/3-3-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2019/04/3-3-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2019/04/3-3-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-11756" class="wp-caption-text">3.- Install WPScan on Ubuntu 20.04 / 18.04</figcaption></figure></p>
<p>So, that&#8217;s it.</p>
<h2>Basic usage of WPScan</h2>
<p>Using WPScan is quite simple. To make a scan on a website, the following command is enough:</p>
<pre>:~$ wpscan --url [url]</pre>
<p>It is also possible to add some extra options through text files. These are the files:</p>
<ul>
<li>~/.wpscan/cli_options.json</li>
<li>~/.wpscan/cli_options.yml</li>
</ul>
<p>And to know in depth the use of the command, it is advisable to read its help from the terminal:</p>
<pre>:~$ wpscan --help</pre>
<p><figure id="attachment_11757" aria-describedby="caption-attachment-11757" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-11757" src="https://www.osradar.com/wp-content/uploads/2019/04/4-2.png" alt="4.- WPScan help" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2019/04/4-2.png 1366w, https://www.osradar.com/wp-content/uploads/2019/04/4-2-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2019/04/4-2-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2019/04/4-2-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2019/04/4-2-696x391.png 696w, https://www.osradar.com/wp-content/uploads/2019/04/4-2-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2019/04/4-2-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-11757" class="wp-caption-text">4.- WPScan help</figcaption></figure></p>
<p>So, enjoy it.</p>
<h2>Conclusion</h2>
<p>WPScan is an important tool in the security of websites built with WordPress. Its basic use is within everyone&#8217;s reach, but the information it shows is very complete. So it&#8217;s something you should always keep in mind.</p>
<p>Please share this post with your friends and join <a href="https://t.me/osradar" target="_blank" rel="noopener noreferrer">our Telegram Channel</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/install-wpscan-on-ubuntu-20-04-18-04/">How to install WPScan on Ubuntu 20.04/ 18.04?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/install-wpscan-on-ubuntu-20-04-18-04/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>A serious security flaw affects Windows 10 and Windows Server 2016.</title>
		<link>https://www.osradar.com/a-serious-security-flaw-affects-windows-10-and-windows-server-2016/</link>
					<comments>https://www.osradar.com/a-serious-security-flaw-affects-windows-10-and-windows-server-2016/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Wed, 15 Jan 2020 20:43:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[windows Security]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=17693</guid>

					<description><![CDATA[<p>Several media specialized in technology have reported the presence of a vulnerability that affected Windows 10 in all its versions and Windows Server 2016. Interestingly, this threat was discovered by the U.S. National Security Agency. Consequently, the agency decided to inform Microsoft to find a solution as soon as possible. Recently Microsoft confirmed the vulnerability [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/a-serious-security-flaw-affects-windows-10-and-windows-server-2016/">A serious security flaw affects Windows 10 and Windows Server 2016.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Several media specialized in technology have reported the presence of a vulnerability that affected Windows 10 in all its versions and Windows Server 2016. Interestingly, this threat was discovered by the U.S. National Security Agency. Consequently, the agency decided to inform Microsoft to find a solution as soon as possible. Recently Microsoft confirmed the vulnerability in both operating systems. It has also published the patch for the systems. A quick update is recommended. Next, we will see, how this security flaw affects Windows 10 and Windows Server 2016.</p>



<h2>The failure affects the handling of certificates and encrypted messaging.</h2>



<p>The security flaw is a phishing vulnerability that affects Windows CryptoAPI (Crypt32.dll) Under these circumstances, Elliptic Curve Cryptography (ECC) certificates are eventually validated. This would allow an attacker to forge digital signatures, making the malware look like a legitimate application. In other words, a false code signing certificate is created to sign a malicious executable. This way it appears that the file comes from a legitimate and trusted source. Consequently, it would be difficult for the user to know that the file is malicious since the digital signature would seem to come from a reliable provider.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="576" src="//1723336065.rsc.cdn77.org/wp-content/uploads/2020/01/hack-813290_1280-1024x576.jpg" alt="" class="wp-image-17695" srcset="https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280-1024x576.jpg 1024w, https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280-300x169.jpg 300w, https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280-768x432.jpg 768w, https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280-696x392.jpg 696w, https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280-1068x601.jpg 1068w, https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280-747x420.jpg 747w, https://www.osradar.com/wp-content/uploads/2020/01/hack-813290_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>As a consequence of this vulnerability, the attacker could perform <em>man-in-the-middle attacks</em>. And in this way decode confidential information about user connections within almost any application on Windows 10 and Server 2016. Consequently, authentication on Windows desktops and servers is under threat. Similarly, sensitive data entered into Internet Explorer and Edge could be affected. On the other hand, Microsoft claims that it has no reports that the bug has been exploited. However, it is still a major security flaw.</p>



<h2>How to solve the failure.</h2>



<p>As mentioned, Microsoft has already detected the bug and released the respective patches. This way the operating system can detect and block malware that tries to exploit the vulnerability. One of the first entities to receive the patch was the United States Army. Similarly, other high-level customers and other potential targets. However, Microsoft has made available to the public the update <em>CVE-2020-0601</em>. It can be downloaded from this <a rel="noreferrer noopener" aria-label="link. (opens in a new tab)" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601" target="_blank">link.</a> We have finally seen how this security flaw affects Windows 10 and Windows Server 2016. As always, it is advisable to take precautions to protect the operating system. Please keep Windows up to date, surf wisely and always use a good antivirus. That&#8217;s all for now before I go I invite you to see our post about <a href="https://www.osradar.com/easily-install-ruby-on-windows-10-with-rubyinstaller/" target="_blank" rel="noreferrer noopener" aria-label="Ruby (opens in a new tab)">Ruby</a> on Windows 10.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/a-serious-security-flaw-affects-windows-10-and-windows-server-2016/">A serious security flaw affects Windows 10 and Windows Server 2016.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/a-serious-security-flaw-affects-windows-10-and-windows-server-2016/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is kernel hacking?</title>
		<link>https://www.osradar.com/what-is-kernel-hacking/</link>
					<comments>https://www.osradar.com/what-is-kernel-hacking/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Tue, 02 Jan 2018 10:36:46 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Kernel]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=918</guid>

					<description><![CDATA[<p>Hacking is a really complicated stuff to most of the people. The term “kernel hacking” might feel like a really complicated stuff as well, but it isn’t. Let’s dissect kernel hacking and if interested, how to be a “kernel hacker”. What is a kernel? The Kernel is a program, in short. It’s the root of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/what-is-kernel-hacking/">What is kernel hacking?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hacking is a really complicated stuff to most of the people. The term “kernel hacking” might feel like a really complicated stuff as well, but it isn’t. Let’s dissect kernel hacking and if interested, how to be a “kernel hacker”.</p>
<p>What is a kernel? The Kernel is a program, in short. It’s the root of all the operating systems all over the world. No matter what operating system you’re using, there’s always a kernel working from the root level to make everything function as it was meant to be. It’s the most fundamental part of any OS.</p>
<p>Why is kernel important? The kernel is the bunch of codes that interact with the hardware. Kernel functions at a basic level, maintaining resources like RAM and CPU, communicating with hardware. The hardware of a computer only knows how to manage bits of 1 and 0. To combine all the parts together, the kernel takes the job. The kernel performs system checks and identifies hardware components like processor, memory, and GPU. All the other peripherals are also checked. Since the computer’s startup, the kernel starts running and before the final shutdown, it keeps working in the background.</p>
<p>Now, what’s kernel hacking? There are lots of kernels available for different systems. Windows and Linux are the 2 most popular OS, having the unique kernel for both. By far, Linux kernel is the most popular as this kernel is open-source and anyone can get access to it. The process of modifying Linux kernel and evaluating the impact of the changes is known as kernel hacking.</p>
<p>Who’s a kernel hacker? A developer who maintains the Linux kernel code is called a “kernel hacker”. Linux kernel is open-source and so, a large community of the maintainers have grown up who maintains and develops the kernel to better quality. They’re the kernel hackers.</p>
<p>One thing to remember that most of the kernel hackers aren’t “all-rounders”. They specialize in one specific thing of the kernel. After mastering that, they branch out on other parts. There are very few true master kernel hackers who understand the entire kernel. In fact, Linux kernel isn’t something small to master within weeks/months. It took decades for the masters to understand the whole Linux kernel. However, you can call yourself a kernel hacker within the next couple years with great focus and patience.</p>
<p>Interested in being a kernel hacker? Here’s what you need to know.</p>
<ul>
<li>Programming: Linux kernel is mostly written in C, the rest of Assembly. Both are very easy to learn, simple and powerful for kernel programming for sure. If you’re a person having the problem with pointer arithmetic and relative concepts, learn hard.</li>
<li>Compiling: Make sure that you understand how to compile and run the Kernel. It’s crucial for testing out your modifications and understanding of the code.</li>
<li>Guides: Linux kernel is very well documented. After downloading the Linux kernel source, you’ll have a directory named “documentation”.<br />
There are many awesome books for starting being a kernel developer. Here’s some of them</p>
<ul>
<li>The C Programming Language</li>
<li>Introduction to Algorithms</li>
<li>Linux Kernel Development (3<sup>rd</sup> Edition)</li>
<li><a href="https://kernelnewbies.org">kernelnewbies</a></li>
</ul>
</li>
<li>Patience: It’s a true testimony of patience. It’ll take years to master Linux kernel. Before you start, make sure that you can stick with it as long as it takes.</li>
</ul>
<p>After you’ve picked up the understanding of Linux kernel, you can start sharpening your skills by solving problems from the <a href="https://bugzilla.kernel.org/buglist.cgi?bug_status=NEW&amp;bug_status=ASSIGNED&amp;bugidtype=include&amp;chfieldto=Now&amp;emailassigned_to1=1&amp;emailassigned_to2=1&amp;emailcc2=1&amp;emailreporter2=1&amp;emailtype1=substring&amp;emailtype2=substring&amp;field0-0-0=noop&amp;kernel_version_type=allwordssubstr&amp;long_desc_type=allwordssubstr&amp;short_desc_type=allwordssubstr&amp;type0-0-0=noop">open bugs</a>. Some of them can’t be fixed without owning the particular hardware. However, most of the bugs can be solved by just code inspection. There are always new bugs filled all the time and fixing them is a really great way for mastering Linux kernel.</p>
<p>For a kernel hacker, there are not many jobs available related to kernel. The available ones are pretty rewarding. However, kernel hacking could be your testimony for getting a really lucrative job in a company. Interested? Get started right away!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/what-is-kernel-hacking/">What is kernel hacking?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/what-is-kernel-hacking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
