Recent content by Dr. Smile

  1. Dr. Smile

    Hackers have attacked the heart of the US nuclear program

    SiegedSec claims a leak of critical information. On Sunday, the hacker group SiegedSec, known for its politically motivated attacks, announced on Telegram that it had hacked the Idaho National Laboratory's personnel management app. The Group claims to have received detailed information about...
  2. Dr. Smile

    How Binance lost the US: chronology of the confrontation with the authorities

    Binance's summer began with an SEC lawsuit, and the fall ended with a $4.3 billion fine and the departure of the company's founder, Changpeng Zhao (CZ), from the position of CEO. ForkLog recalled the difficult last six months for the cryptocurrency exchange and highlighted key events. June On...
  3. Dr. Smile

    Bypass selfie verification in apps [Fake Camera] 2023

    Selfie identity verification has become one of the most common identity verification methods in apps. However, despite its popularity, selfie verification is not a perfect solution as it can be bypassed. In this article, we will look at one of the ways to bypass selfie verification in...
  4. Dr. Smile

    Georgia issued the organizer of the scheme for withdrawing cryptocurrencies to the United States

    The Georgian authorities, at the request of Interpol, extradited to the United States a Serbian citizen accused of creating fraudulent money laundering schemes through cryptocurrencies and binary options. According to investigators, 48-year-old Kristian Krstic led a large criminal organization...
  5. Dr. Smile

    Hackers Cyber Av3ngers claim hacking of sewage treatment plants in ten cities

    The hacker group claims to be involved in the crashes. A hacker group calling itself Cyber Av3ngers claimed on social media that it had hacked ten water treatment plants in Israel. Among the affected cities are Hedera, Palmachim, Sorek, Ashkelon, Haifa, Khorazim, Kfar Haruv, Taberia, Eilat and...
  6. Dr. Smile

    Several ways to Hide Your IP Address

    How do I hide my IP address? There are several ways to hide your computer's IP address. In this post, I will describe for you 5 ways to access blocked sites or, in other words, 5 ways to hide your IP address, which I happened to use myself. What is a proxy server? Simply put, in order to hide...
  7. Dr. Smile

    Carding via phone

    What is “payment by linking to a smartphone”? That's right, this is an opportunity to make purchases via your phone, but if you open the site and enter your card details there, you will be met with an anti-fraud message. To make users feel more comfortable, we have created a card link to the...
  8. Dr. Smile

    Setting up iOS and Android for carding

    You all have mobile phones, and did you know that the traffic from mobile devices is higher? Today I will tell you how to use your iphone and buckets, not only for what would have to sit in the FB) Let us carding with IOS and ANDROID IOS setup And so, first, let's discuss some details. Why iOS...
  9. Dr. Smile

    Hack admin

    Checking the awareness of personnel about cybersecurity threats is one of the most demanded cases. It is carried out, as a rule, by methods of social engineering. In today's article: • Our goal: to verify that employees comply with information security policies. • Methods: social engineering. •...
  10. Dr. Smile

    The most evil botnets. How the largest armies of malware appeared and died.

    Emotet Brief description: banker, downloader Lived: 2014 - present Number of infections: unknown Distribution methods: spam, SI Emotet is another tech banking Trojan. The first versions stole the banking data of just a few banks, but the botnet was rapidly improving and now it is also in the...
  11. Dr. Smile

    The most evil botnets. How the largest armies of malware appeared and died.

    Nowadays, you won't surprise anyone with a botnet: they are found all the time, and the infection underlying them is easily cleaned out by an antivirus - thanks to the club-handedness of the authors who collect malware on their knees from humus and sticks. But it happens that the pros start...
  12. Dr. Smile

    How to create a keylogger for Chrome browser on Linux

    Many associate such programs with illegal activities and malware. Despite the fact that keyloggers can be viewed as an invasion of privacy, it still does not violate the law in any way. Parents, for example, can acquire such software to protect their children on the Internet - and find out who...
  13. Dr. Smile

    LFCA: How to Improve Network Security

    Network security is increasingly becoming one of the areas in which organizations invest a lot of time and resources. This is because the company's network is the backbone of any IT infrastructure and connects all servers and network devices. If the network is compromised, the organization will...
  14. Dr. Smile

    STP attack and defense

    The topic of today's article is "STP attack and protection". STP has its pros and cons. Next, we will look at how you can take advantage of the features of STP to attack STP. Finally, let's talk about protecting STP from attacks. We will not retell the Internet and understand the STP protocol...
  15. Dr. Smile

    Use Nmap for DOS attacks, brute force, firewall bypass and more.

    Nmap is the benchmark among port scanners and one of the most important penetration tester tools. But can you say that you thoroughly studied all its features and methods of application? In this article, you will learn how to use Nmap to scan hosts behind a firewall, improve scan performance...
Top