Turning your No-Touch PC screen into a touchscreen in a cheap way

What would you not give to get a touchscreen PC? To feel the screen, the technology, the keys by just stroking on the screen. To feel the smooth motion of soft, untainted skin made of glass. OOKKKAY! It got a little sexual, ain’t it?!  But here is a glitch, you can’t always afford a touch … Read more

Instagram got its first hackjob! Researcher hacks into Instagram

A researcher hacks into Instagram to reveal a flaw and he may be still screwed. Every now and then a student comes into ethical hacking and his starting question is this..”Sir, how do I hack my friends’ facebook account?”. As menial and snooze-worthy this question is, a teacher is always afraid that this just might happen … Read more

Top 10 tools for hacking wirelessly that should protect yourself from.

MODULE 14:- WiFi Hacking and Security 5 Ways to show my saved wifi password in Windows 10 KickThemOut- how to kick someone off your wifi 5 Tips, how to secure wifi from hacking – full guide Top 5 Wifi Hacking software for Linux OS Top 10 tools for hacking wirelessly that should protect yourself from … Read more

Hacker teen steals $150,000 doodling with an Airline website

$150,000 is a lot of money. So much, that it stays in your head for a while after hearing about it. But how does one earn it? Well, for starters NOT do what this hacker teen did! He hacked into an airline and sold fake tickets. 19 Year old Zhang from Heilongjiang, north-east China did the very thing. He first … Read more

“Government-hacking” warned by twitter

Twitter has warned that a number of users may be unknown victims of government hacking a.k.a the culprits of this hacking may be state sponsored actors. For the first time, the social site has come forward regarding the illicit government activities that influence peoples’ privacy. An email from Twitter warned users that their respective account information may … Read more

Hackers claw into Play Station 4 and find it “Jail-Breakable”

Ever since the release of the herald of new generation of consoles(not discounting XBOX One), hackers have been trying to tinker with it. Trying to find a away to doodle with unauthorized soft wares on the system. Well, it seems they might just have succeeded. Just bypassing the huge deal that is breaking into the … Read more

Barbie with wifi wasn’t a good idea after all

Pedo-Hackers can hack in to barbie with wifi to spy on kids. As pointless as things can be, a Barbie with wifi tops the pedestal of pointlessness to a new extent. As predicted by security researches from very early on, the new WiFi enabled barbie’s microphone can be turned into a surveillance device for spying on your kids conversation … Read more

Search engine for hackers, and it lists every device on the net

Meet Censys, a Shodan like search engine for hackers.

censys

Last month the security consultants at the SEC realized that the work-shy manufacturers of IoT(Internet Of Things) using the same old set of hardcoded cryptographic keys leaving over 3 million of IoT devices vulnerable to mass hijacking. But how did they found out the exact number??

Easy! Censys told them. A search engine that ransacks the net for vulnerable devices.

It knows everything and sees everything

Censys is designed for one purpose, to scan for the poor bastards who got logged on to the net without much thought about unauthorized access to them. Clarification, the poor bastards are the devices. In this aspect Censys is a lot like shodan .

However, the methodology used by Censys is much more complex. All this to make internet a safer place.

Released for free in October by the researchers at the University of Michigan, is powered by google, world’s biggest search engine.

As a part of an open source project, census was created to keep track of every data on the internet. And then create a database out of it. the goal of this is to help companies to unearth their vulnerabilities on the net.

Modus Operandi of Censys.

This search engine for hackers does daily scans of Ipv4 address space. By this it collects the information of hosts and websites. Two tools are plied for this purpose

  1. Zmap : Open Source network Scanner
  2. ZGrab: Application layer scanner

Then databases are maintained after the collection of data(DUH!). This gives the information about how websites are configured.

Zmap’s job is to scan over 4 billion IP addresses every day. What’s more is this helps determining to whether fix the machines right away or not. Whether the prowling eyes of hackers is upon the device already?

Flaws caused by IT administrator can’t hide either.

  So what do ya thing about this? Should this exist? And if it has to, how vulnerable are you?

Post your comments and enlighten our asses.