Checkmate
  • Services
    • Assessment
      • Web Applications
      • Application Security
      • Mobile Applications
      • SCADA and ICS
      • Telecom Networks
      • SAP & ERP Security
      • Sharepoint
      • Network Architecture Review
      • Wireless Auditing
      • Security Audit
      • Penetration Testing
      • DDos
      • Spear Phishing
      • IT Audits
      • Network Audit
    • Advisory
      • Strategy
      • Policies & Procedures
      • Risk Assessment
      • Security Awareness
      • ISO 27001
      • ISO 20000/ITIL
      • Security Metrics
      • COBIT Framework
      • PCI DSS
      • PA DSS
      • SSAE 16
    • Breach Response
      • Breach Response
      • Digital Forensics
      • Financial Fraud Risk Management
      • Anti Phishing
      • Revenue Assurance
  • Solutions
    • 2-Factor Authentication
    • Application Whitelisting
    • Database Activity Monitoring
    • Data Leakage Prevention
    • Information Rights Management
    • Intrusion Prevention Systems
    • Mobile Device Management
    • Next Generation Firewalls
    • Security Incident & Event Management
    • System Hardening
    • Web Application Firewalls
    • Web Application Security
    • Wireless Security
  • Products
    • AuditPro Enterprise
    • Firesec
  • Industry
    • Finance
    • Telecom
    • Healthcare
    • IT BPO
    • Manufacturing
    • Energy
  • Research
    • Blog
    • Security Advisories
    • Articles
    • Security Tools
    • Books
  • Showcase
    • SCADA Security Assessment
    • Mobile Security Assessment
    • SOX Compliance for Applications
    • Fraud Risk Management Study
  • About Us
    • Company
    • Philosophy
    • Our Team
    • Testimonials
    • Clients
    • Corporate Milestones
  • Contact

Month: June 2014

No Picture

IT Act 2000 – Penalties, Offences With Case Studies

June 24, 2014 Lionel Faleiro 5

Objectives of IT legislation in India The Government of India enacted its Information Technology Act 2000 with the objectives stating officially as: “to provide legal recognition for transactions carried out [more]

Search

Subscribe via Email

Enter your email address to subscribe to this blog

Top Posts

  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Bypassing Detection for a Reverse Meterpreter Shell
    Bypassing Detection for a Reverse Meterpreter Shell

Recent

  • LLMNR/NBT-NS Poisoning in Windows environment
  • RBI Guidelines for Tokenization
  • Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
  • Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment
  • Malware on Steroids – Part 1: Simple CMD Reverse Shell
  • Manipulating Host Headers – Not Anymore !
  • Password-less Remote Desktop Protocol (RDP) Session Hijacking
  • Bypassing Detection for a Reverse Meterpreter Shell
  • Ransomware Simulation
  • Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer
C++ CnC coding Cyber Security Elasticsearch ELK forensics FUD fully undetectable hacking keylogger Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting red team remote access reverse shell security trojan virus winapi
  • Tota: It works fine. tnx
  • Chetan Nayak: Updated the post. Thanks :)
  • Chetan Nayak: We found them to be RC4

Copyright © 2019 | WordPress Theme by MH Themes