Security Uncategorized AKA Non-Tech-Stuffs

Phishing Attack – Free Travel tickets with Emirates Airline

Estimated read time 3 min read

Today itself, a friend sent me a message about free travel ticket with Emirates airline through WhatsApp. On seeing the URL, I immediately doubt about the authenticity of such kind of strategy spammers are using to make money as well [Read More…]

Linux Application Security Uncategorized AKA Non-Tech-Stuffs

XpressLiteCoin – Your Litecoin payment gateway

Estimated read time 5 min read

As promised days back on my Tunnelix.com Facebook Page, I would blog about setting up a Litecoin button on your website for payment or donation purpose which I did myself. See on the top right corner of the blog. I [Read More…]

MeetUps and Presentations Security

Operation JASK – Just a Single Keystroke

Estimated read time 3 min read

Apart from the IETF hackathons, the cyberstorm.mu team also focused on internal hackathon either remotely or on-site participation. Another remote hackathon was already in progress since Saturday the 16th of June 2018. It was named Operation JASK – Just a [Read More…]

Linux System Security

Linux memory analysis with Lime and Volatility

Lime is a Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME unique as it is the first tool that allows for full memory captures on Android devices. [Read More…]

Linux System Security

Auditing Linux Operating System with Lynis

Estimated read time 6 min read

Auditing a Linux System is one of the most important aspect when it comes to security. After deploying a simple Centos 7 Linux machine on virtual box, I made an audit using Lynis. It is amazing how many tiny flaws [Read More…]