Open in app

Sign In

Write

Sign In

Mr Carlo
Mr Carlo

36 Followers

Home

About

Pinned

How to set up a Pwnagotchi

What is a Pwnagotcchi ? A pwnagotchi is a Tamagotchi like digital toy,but it feeds on Wi-Fi handshakes.The pwnagotchi is made with the help of a raspberry pi zero. It sniff around for the Wi-Fi signals around it and deauthenticate the client from the access point and captures the handshakes…

9 min read

How to set up a Pwnagotchi
How to set up a Pwnagotchi

9 min read


Pinned

How to start a career in Cyber Security for free in 2022

Introduction Cybersecurity jobs are very exciting. The fast-paced field that is perfect for anyone who loves a challenge and the thrill of problem-solving.Cyber Security is a booming career choice in our present world and choosing a learning path seems to be very confusing and difficult now. I would like to…

5 min read

How to start a career in Cyber Security for free in 2022
How to start a career in Cyber Security for free in 2022

5 min read


Pinned

Car Hacking 101, Is your car hackable?

A car consists of multiple computers to control the engine, transmission, windows, locks, lights, etc. These computers are called electronic control unit (ECU) and communicate with each other over a network. For example, when you press the button on your steering wheel to increase the volume of the radio, the…

4 min read

Car Hacking 101, Is your car hackable?
Car Hacking 101, Is your car hackable?

4 min read


Pinned

Mr Robot CTF-Walkthrough

Based on the Mr. Robot show, can you root this box? Official walk through is available in DarkSec’s YouTube channel. This CTF room can be considered as a very beginner friendly room.This was personally my first CTF room I have solved,so this is a special room for me. Mr.Robot…

Ctf Writeup

6 min read

Mr Robot CTF-Walkthrough
Mr Robot CTF-Walkthrough
Ctf Writeup

6 min read


Apr 12

Lazy Admin- TryHackMe Walkthrough

TryHackMe | LazyAdmin Easy Linux machine to practice your skillstryhackme.com This is an easy Linux box and it contains 2 flags. Our aim is to find a user flag and root flag in the vulnerable machine. STEP 1: Connect VPN. Download the VPN file from TryHackMe-> Access -> Download My Configuration File.

6 min read

Lazy Admin- TryHackMe Walkthrough
Lazy Admin- TryHackMe Walkthrough

6 min read


Feb 19

Cybersecurity in edutech

The exposure of technology to the life of children at a very young age have made the brains of children look for faster and easier ways to learn new things. They get easily bored in a traditional classroom environment. EdTech has seen tremendous growth in the past few years in…

5 min read

Cybersecurity in edutech
Cybersecurity in edutech

5 min read


Feb 19

AppleJeus malware spread in the name of fake crypto currency apps by North Korean Hackers.

What is it? The Lazarus Group threat actor has been observed spreading fake cryptocurrency apps as a bait to deliver a previously undocumented version of the AppleJeus malware. How is it? This activity notably involves a campaign likely targeting cryptocurrency users and organizations with a variant of the AppleJeus malware…

2 min read

AppleJeus malware spread in the name of fake crypto currency apps by North Korean Hackers.
AppleJeus malware spread in the name of fake crypto currency apps by North Korean Hackers.

2 min read


Feb 19

WhatsApp users can send and receive messages during internet blackouts. (WhatsApp proxy)

Popular instant messaging service WhatsApp has launched support for proxy servers in the latest version of its Android and iOS apps, letting users circumvent government-imposed censorship and internet shutdowns. “Choosing a proxy enables you to connect to WhatsApp through servers set up by volunteers and organizations around the world dedicated…

2 min read

WhatsApp users can send and receive messages during internet blackouts. (WhatsApp proxy)
WhatsApp users can send and receive messages during internet blackouts. (WhatsApp proxy)

2 min read


Feb 19

Tata Power hit by Cyber attack

The Indian power producing giant Tata Power has been the victim of a cyberattack. The Mumbai-based firm issued a short statement on Friday (14–10–2022) admitting that some of its IT systems had been affected by the hack. The organization is actively working to recover and restore the systems. …

3 min read

Tata Power hit by Cyber attack
Tata Power hit by Cyber attack

3 min read


Feb 19

Cyber Security in the healthcare industry, Is your medical data safe?

The use of digital technology in the healthcare sector is growing significantly. Acute care hospitals, health insurance companies, private sector enterprises, health agencies, and other healthcare system actors rely on computer systems for a variety of purposes, including the provision of medical care, administrative management, disease prevention, and emergency response…

11 min read

11 min read

Mr Carlo

Mr Carlo

36 Followers

(ISC)2 CC | EJPT | CEH | Passionate about Cybersecurity

Following
  • Ahmet Göker

    Ahmet Göker

  • Harish SG

    Harish SG

  • Karthika Nair

    Karthika Nair

  • Taylor Armerding

    Taylor Armerding

  • Mohamed Anani

    Mohamed Anani

See all (118)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams