Posts

Showing posts from May, 2019

ZoomEye IoT Search Engine

Image
IoT Search Engines There are many known search engines for IoT such as Shodan , IoT Crawler , Thingful and Censys etc. but I will share some interesting features of a very powerful Chinese IoT search engine ZoomEye .  What is ZoomEye ZoomEye is a Cyberspace Search Engine recording information of devices, websites, services and components etc. ZoomEye has two powerful detection engines Xmap and Wmap aiming at devices and websites in the cyberspace. It can be used to identify all the services and components through 24/7 continuous detection. Therefore it is easier for researchers to understand the component coverage and the damage scope of vulnerabilities. Although being regarded as a "hacker-friendly" search engine, ZoomEye is not designed to initiate attacks towards network devices or websites. The recorded data is for security research use only. It is more like a navigational chart in the cyberspace. What ZoomEye Show You can search Zoo

Find Your Lost Phone with Google

Image
I would like to share a very nice feature of Google today. Many people might be unaware of it. "Google Find My Device" lets you remotely track, lock, and erase the data on a lost or stolen phone without installing any additional app. You can also see the battery life remaining on your phone and the Wi-Fi network it is connected to. It's the easiest way to track a lost Android phone. Follow the steps to locate your Mobile device. Login to your Google account which you have used to activate on your phone. 1. Click on Google apps icon. 2. then select Account     After selecting the account click on the Security tab in left panel. Scroll down to Your Devices section and click on "Find a lost or stolen phone" button. Select your device in case you have register more than one phone on your email address. Verify your account by entering the password of your email address. Click on Locate icon. You will see the "G

Intercepting Signalling System No. 7 (SS7) - Practical Lab

Image
Introduction  This is my first blog on blogger.com. I want it to be very interesting for people who are interested in information security field and also want learn new things. I will try to share good reads and intersting articles on my blogs. Lets begin with my favorite one here. Please note that english is not my native language I will apologize for my bad english in advance 😀. It was an awesome experience while playing around Immersive labs machines during the past month, there are much to learn from hands-on practical labs. But one lab I liked the most was Signalling System No. 7 (SS7) interception practical lab, which is used to exchange data between devices in telecommunication networks. We will use it to gain access to a fictional user’s bank account and successfully transfer funds. There are many good tutorials and online resources available for SS7, therefore I will keep it short here.   Introduction to SS7 Interception There have been a number of attacks r