We've moved! — MindVault360 is now HexLab. Better design, more content & premium notes.

Visit HexLab →

MindVault360 has moved!

We've upgraded to HexLab — a faster, more professional platform with better content, premium notes, and a modern design.

Visit us at hexlab

Saturday, March 15, 2025

Sums - Liquidators Remuneration

 

1. Assets realized: Rs. 6,30,000 including cash balance 30,000 Liquidator's remuneration 2% on the assets realized. Calculate the Liquidator's remuneration.

Solution:

    Assets realized:        6,30,000

    -) cash balance        30,000

------------

Total Assets

realized                       6,00,000

                       -------------

Liquidator's remuneration:   6,00,000 x 2/100 ==> 12,000


2. Compute Liquidator’s Remuneration from the information given below:

Secured Creditors: Rs. 60,000 (Securities realised: Rs. 80,000)

Other Assets realised: Rs. 75,000

Liquidator’s remuneration: 2 ½ % on the amounts realised (including securities with creditors


Solution:

Liquidator's Remuneration:

On Assets realized => 75,000 x 2.5%   ====>    1,875

On Securities realized ==> 80,000 x 2.5% ===>2,000

Liquidator's remuneration ==>                     3,875/-


3. The liquidator of a company is entitled to a remuneration of 2% on assets realised and 3% on the amount distributed to unsecured creditors.

Assets realised: Rs. 1,00,000 (including cash balance of Rs. 5,000)

Amount available for distribution to unsecured creditors (before paying liquidator’s remuneration): Rs. 43,100

Calculate liquidator’s remuneration.

Solution:

Liquidator's Remuneration:

Assets Realized 1,00,000

- cash in hand        5,000

---------

Total Assets realized 95,000

                       --------

On Assets realised: 95,000 x 2/100 ==========>     1,900     

On amt available to unsecured Creditors


                       43,100 x 3/103          =========>   1,255

                                                 ----------------

                      Liquidator's remuneration    3,155

                                                 ---------------


4. The liquidator of a company is entitled to a remuneration of 3% on the amounts realised (excluding cash in hand) and 2% on the amount distributed to the unsecured creditors.

Unsecured creditors (including preferential creditors of Rs. 5,000): Rs. 40,000

Debenture holders paid: Rs. 51,875 (with interest)

Preferential creditors paid in full

Expenses of liquidation: Rs. 510

Cash on hand: Rs. 1,000

Assets realised: Rs. 79,000

Calculate the liquidator’s total remuneration.

Solution:

Liquidator's Remuneration:

Assets realized:                 79,000

-  cash in hand                     1,000

                          ------------

Total assets realized             78,000

On assets realized: 78,000 x 3    ====>                            2,340


Amount available for unsecured Creditors:

Assets realized ==>       78,000

Subtract:

  Liquidation charges   ===>             510

    Liquidator's Remuneration   ===>        2340 

      Preferential Creditors    ===>            5000

          Debentures   ===>                51,875   

                        ------------

Amount available for unsecured Crs.       18,275

                        ------------


On Amount available for unsecured Crs.   18,275 x 3/103  ====>  532

                                    -----------------------


Liquidator's remuneration                                               2875

                                    ---------------------------


← Back Next →

Labels:

Monday, March 10, 2025

Liquidation - Introduction

What is Liquidation?

Liquidation is the process of winding up a company's affairs by selling its assets, settling liabilities, and distributing any remaining funds to shareholders. It marks the end of a company's legal existence.

Types of Liquidation

  1. Voluntary Liquidation – Initiated by the company's members or creditors when the business is no longer viable.
  2. Members’ Voluntary Liquidation (MVL): When the company is solvent but chooses to close.
  3. Creditors’ Voluntary Liquidation (CVL): When the company is insolvent and unable to pay debts.
  4. Compulsory Liquidation – Ordered by a court when a company fails to pay creditors or violates legal regulations.

Key Participants in Liquidation

  • Liquidator – A professional appointed to oversee the process, sell assets, and distribute funds.
  • Creditors – Entities or individuals to whom the company owes money.
  • Shareholders – Owners of the company who receive any remaining funds after debt settlement.

Process of Liquidation

  • Appointment of Liquidator
  • Sale of Assets
  • Settlement of Liabilities (Creditors & Debentures Paid Off)
  • Distribution of Remaining Funds to Shareholders
  • Dissolution of the Company

Effects of Liquidation

  • The company ceases operations permanently.
  • Employees may lose their jobs.
  • Creditors receive payments based on priority.
  • Any surplus funds are distributed among shareholders.


Order of Payment

  1.  Secured Creditors
  2.  Cost of Liquidation (legal Charges, Liquidator's remuneration, winding up)
  3.  Preferential Creditors.
  4.  Debentures
  5.  Unsecured creditors.
  6. Pref. Shareholders.
  7. Equity Shareholders.
Explanation:

1.  Secured Creditors – Lenders with a legal claim on specific company assets, paid first from asset sales.(e.g., a bank with a mortgage on company property).

2. Cost of Liquidation – Expenses incurred in winding up, including legal fees and liquidator’s remuneration.(e.g., lawyer and auditor fees).

3. Preferential Creditors – Employees (unpaid wages), government (taxes), and other priority creditors.(e.g., unpaid salaries of staff).

4. Debentures – Company-issued debt; secured debentures are paid first, unsecured ones later.(e.g., bonds issued to raise funds).

5. Unsecured Creditors – Creditors without collateral, paid after secured and preferential creditors.(e.g., suppliers waiting for payment).

6. Preference Shareholders – Investors with fixed dividends, paid before equity shareholders in liquidation.

7. Equity Shareholders – Owners of the company, last to be paid and receive funds only if surplus remains.

Liquidator’s Remuneration :

The fee paid to the liquidator for managing the company’s liquidation process, including selling assets and paying creditors.  

Example: A court appoints a liquidator to close a failing company, and they receive a percentage of asset sales as payment.

← Back Next →

Labels:

Tuesday, February 18, 2025

Fix OneDrive Personal Vault Not Syncing – What You Need to Know!

Are you struggling with OneDrive Personal Vault not syncing on your device? You're not alone! Many users face this frustrating issue where files inside the Personal Vault fail to sync, causing delays and even potential data loss.

Why Is OneDrive Personal Vault Not Syncing?

This issue can arise due to several reasons:

Internet Connection Problems – A weak or unstable connection can prevent proper syncing.
Outdated OneDrive App – If you're using an older version, it might have bugs affecting sync.
Corrupted Cache Files – Old or damaged cached data can interfere with syncing.
Insufficient Storage – If your OneDrive storage is full, new files won’t sync.
Sync Conflicts – Multiple devices accessing the same files can cause conflicts.

What Can You Do?

If you're facing this issue, don’t worry! I’ve put together a detailed video explaining why this happens and how you can prevent it.

🎥 Watch my latest YouTube video for a full breakdown:
👉
https://youtu.be/pEhvp0C0Q3k

For more tech tips and troubleshooting guides, visit my blog regularly.

Have you encountered this issue before? Let me know in the comments how you resolved it! 🚀


Labels:

Thursday, February 13, 2025

Social Engineering: Exploiting Human Vulnerabilities

 Social engineering is one of the most effective and dangerous attack strategies in cybersecurity. Instead of exploiting technical vulnerabilities, social engineering targets the human element—tricking individuals into revealing confidential information, granting access, or performing actions that compromise security.

Attackers use psychological manipulation to exploit trust, urgency, curiosity, or authority to achieve their goals. These attacks can happen over the phone, through email (phishing), on social media, or even in person.

Common Social Engineering Methods

📞 Phone-Based Attacks (Vishing)
Attackers call employees pretending to be IT support, management, or vendors to extract sensitive details, such as passwords or internal protocols.
💡 Example: A fake IT technician asks an employee to verify their login credentials for a “system upgrade.”

📧 Email & Phishing Attacks
Attackers send emails disguised as trusted sources to trick victims into clicking malicious links, downloading malware, or sharing sensitive data.
💡 Example: A fake email from “HR” asks employees to reset their passwords using a malicious link.

💬 Social Media Manipulation
Cybercriminals research employees on LinkedIn, Facebook, or Twitter to find personal details, impersonate executives, or target employees with personalized scams.
💡 Example: An attacker messages a finance employee, pretending to be the CEO, and requests an urgent wire transfer.

🏢 In-Person Attacks (Impersonation & Tailgating)
Attackers gain physical access to secure areas by posing as delivery drivers, IT staff, or visitors, often following an employee into a restricted area.
💡 Example: A hacker wearing a fake company badge walks into an office behind an employee and connects to the internal network.

Social Engineering Toolkits

🔧 The Social Engineering Toolkit (SET)
A powerful tool designed for penetration testers, SET allows professionals to simulate phishing, credential harvesting, and malicious payload attacks to test an organization’s security awareness.

🌍 Creepy
A geolocation OSINT tool that gathers location data from social media to analyze a target’s movements, habits, and frequented locations—useful for planning attacks.

💻 Metasploit
A widely used penetration testing framework that includes modules for social engineering attacks, such as email phishing campaigns and fake website cloning to harvest user credentials.

Social engineering remains one of the biggest security threats because humans are often the weakest link in cybersecurity. Organizations must implement strong training programs, multi-factor authentication, and strict verification protocols to defend against these threats.

← Back Next →

Labels:

Open Source Intelligence (OSINT) in Cybersecurity

 In today’s digital landscape, a vast amount of information is freely available online. Open Source Intelligence (OSINT) refers to the process of gathering and analyzing publicly accessible data to gain insights about an organization, its operations, and individuals associated with it. While cybersecurity professionals use OSINT to strengthen security, attackers leverage the same information to identify vulnerabilities and plan targeted attacks.

Understanding Locations and Security Measures

One of the first things an attacker or security professional looks at is an organization’s physical footprint. Publicly available details about office locations, building security, and work schedules can reveal potential entry points for a cyber or physical security breach.

💡 How this information is found:

  • Google Maps & Street View: Provides visuals of office locations, entry points, and security features.
  • Company Websites & Job Listings: Mention office addresses, facility details, and sometimes security policies.
  • Social Media Posts: Employees often share workplace images, revealing badge systems or access controls.

📌 Example: An attacker notices that a company’s front desk has RFID-based access control from an employee’s LinkedIn post. They could attempt to clone an RFID badge to gain unauthorized access.

Mapping Relationships Within an Organization

Understanding how employees, departments, and business partners are connected helps attackers craft sophisticated social engineering attacks, such as spear phishing.

💡 Where this information is found:

  • LinkedIn & Corporate Websites: Provide employee names, job roles, and team structures.
  • Press Releases & Conference Records: Reveal partnerships, leadership changes, and strategic plans.
  • Social Media Interactions: Show relationships between employees, giving insight into internal communication.

📌 Example: A cybercriminal sees that a company’s finance team frequently collaborates with a third-party vendor. They could impersonate the vendor and send a fraudulent invoice for payment.

Uncovering Organizational Structures

A well-structured organization chart provides insights into who makes decisions, who manages IT security, and who can be targeted in a phishing attack.

💡 Common sources of this information:

  • Company Websites: Many businesses publish leadership structures and department overviews.
  • SEC Filings & Annual Reports: Contain executive names, departments, and internal changes.
  • Employee Resumes & Job Listings: Indicate key responsibilities and IT security roles.

📌 Example: If an attacker knows the CIO is responsible for IT infrastructure, they could impersonate a high-level executive and request urgent access credentials for a "critical business task."

Extracting Hidden Information from Documents

Documents, PDFs, images, and emails often contain metadata—hidden details that reveal valuable insights about an organization’s internal workings.

💡 How metadata is collected:

  • FOCA (Fingerprinting Organizations with Collected Archives): Extracts metadata from publicly available documents.
  • ExifTool: Analyzes images to extract GPS locations, timestamps, and device details.
  • Google Dorking (filetype:pdf site:example.com): Finds publicly available documents with sensitive information.

📌 Example: A company’s marketing brochure contains metadata that lists internal email addresses, making it easier for attackers to craft targeted phishing emails.

Analyzing Financial and Business Data

Publicly available financial records help attackers assess a company’s stability, revenue sources, and potential vulnerabilities. Organizations experiencing financial strain may have weaker cybersecurity defenses due to budget cuts.

💡 Where financial data is found:

  • SEC Filings & Stock Reports: Provide revenue, profit margins, and corporate spending details.
  • Business Credit Reports: Indicate financial stability and vendor relationships.
  • Legal & Bankruptcy Filings: Highlight financial struggles and possible operational weaknesses.

📌 Example: If an attacker learns a company recently downsized its IT security team, they might assume the company is now more vulnerable to cyberattacks.

Collecting Personal Data on Employees

Employees unknowingly share valuable information that attackers can use for impersonation, phishing, or brute-force attacks.

💡 Common sources of personal data:

  • Social Media (Facebook, Instagram, Twitter): Reveals personal habits, locations, and workplace culture.
  • Leaked Credential Databases (Have I Been Pwned, DeHashed): Exposes employee passwords from past breaches.
  • Developer Forums & GitHub: Sometimes contain accidentally leaked API keys, credentials, or system configurations.

📌 Example: A hacker sees an employee posted a picture from their work laptop showing an open terminal window. Zooming in, they spot server IP addresses and login credentials in the background.

By monitoring and managing publicly available information, organizations can stay ahead of potential security threats and minimize their exposure to cyber risks.

← Back Next →

Labels:

Wednesday, February 12, 2025

Footprinting: The First Step in Cyber Reconnaissance

Footprinting is the initial phase of cybersecurity intelligence gathering, where attackers (or ethical hackers) collect information about a target organization, system, or network. The goal is to understand the target’s security posture before attempting any exploitation.

There are two main types of footprinting: Active and Passive.

1. Active Footprinting

Active footprinting involves direct interaction with the target system. This method gathers detailed technical data but can be detected by security monitoring tools.

Key Techniques:

  • Host Scanning: Using tools like Nmap to find live hosts, open ports, and running services.
  • Vulnerability Scanning: Identifying security weaknesses using scanners like Nessus or OpenVAS.
  • DNS Enumeration: Gathering domain information, subdomains, and email records using nslookup or dig.
  • Network Sniffing: Capturing network traffic with tools like Wireshark (if inside the network).

🔹 Example: A hacker scans a company's web server and discovers an outdated Apache version, which may have known vulnerabilities.

2. Passive Footprinting

Passive footprinting involves indirectly collecting information without interacting with the target’s infrastructure, making it harder to detect.

Key Techniques:

  • Open-Source Intelligence (OSINT): Gathering publicly available data from social media, company websites, and job postings.
  • WHOIS Lookups: Finding domain registration details and contact information.
  • Google Dorking: Using advanced Google search operators to discover hidden web pages or leaked data.
  • Social Engineering: Analyzing employee posts, leaked credentials, and corporate emails for potential attacks.

🔹 Example: A hacker finds an employee’s LinkedIn profile mentioning their use of specific firewall software, which helps in planning a targeted attack.

Comparison of Active vs. Passive Footprinting

Feature Active Footprinting Passive Footprinting
Interaction Direct (scanning tools) Indirect (OSINT, search engines)
Detection Risk High (can trigger alerts) Low (harder to trace)
Detail Level Deep technical insights General intelligence
Tools Used Nmap, Nessus, Wireshark Google Dorking, WHOIS, LinkedIn

Port Scanning & Service Discovery Techniques and Tools

Port scanning and service discovery are essential techniques used in ethical hacking, penetration testing, and cybersecurity assessments to identify live hosts, open ports, running services, and system vulnerabilities.

These techniques help security professionals understand an organization's attack surface and detect potential misconfigurations or weaknesses before attackers exploit them.

1. Host Discovery

Host discovery is the process of identifying active devices on a network. This helps testers determine which machines are online and available for scanning.

✅ Techniques for Host Discovery:

  • ICMP Echo Requests (Ping Sweep): Uses ICMP packets to check if a system responds.
  • ARP Scanning: Identifies devices in the local subnet (since ARP requests don’t get blocked by firewalls).
  • TCP SYN Scan (Half-Open Scan): Sends SYN packets and waits for SYN-ACK responses to determine live hosts.
  • UDP Discovery: Uses UDP packets to detect services running on a machine (since some services only respond to UDP).

🔹 Example: A penetration tester uses nmap -sn <target-ip-range> to detect all active hosts in a network.

🛠 Common Tools:

  • Nmap (nmap -sn <IP range>) – Network scanning and host discovery.
  • Angry IP Scanner – Fast scanning of live hosts.
  • Netdiscover – ARP scanning tool for identifying active hosts in a subnet.

2. Port Scanning & Service Identification

Port scanning identifies open ports and services running on a system. Attackers use this to find vulnerabilities, while security professionals use it to check for unintended service exposure.

✅ Types of Port Scanning:

  • TCP SYN Scan (Stealth Scan): Sends a SYN packet and waits for SYN-ACK responses to detect open ports (nmap -sS).
  • TCP Connect Scan: Establishes a full three-way handshake to determine open ports (nmap -sT).
  • UDP Scan: Checks for open UDP ports, but UDP services often don’t respond (nmap -sU).
  • Xmas Scan: Sends packets with unusual flags to detect vulnerabilities (nmap -sX).

🔹 Example: nmap -p 1-65535 -sS <target> scans all 65,535 ports on a system for open services.

🛠 Common Tools:

  • Nmap (nmap -sS -p 1-1000 <target>) – Industry-standard tool for port scanning.
  • Masscan – Extremely fast port scanner capable of scanning the entire internet.
  • Unicornscan – Asynchronous port scanner for large-scale assessments.

3. Service Version Identification

Once open ports are found, security professionals analyze which services and software versions are running. This helps identify outdated or vulnerable software.

✅ Techniques for Service Identification:

  • Banner Grabbing: Extracting service details from responses (telnet <target> <port>).
  • Nmap Version Scan: Queries running services for detailed version information (nmap -sV <target>).
  • Netcat Probing: Manually connecting to a port to read its response (nc <target> <port>).

🔹 Example: nmap -sV -p 22,80,443 <target> identifies software versions on ports 22 (SSH), 80 (HTTP), and 443 (HTTPS).

🛠 Common Tools:

  • Nmap (nmap -sV <target>) – Service version detection.
  • Netcat (nc) (nc -v <target> <port>) – Manual service interaction.
  • WhatWeb – Web application fingerprinting tool.

4. Operating System Identification

OS fingerprinting determines the operating system and version of a target machine. This helps attackers choose the right exploits, while security teams use it to verify OS security updates.

✅ Techniques for OS Identification:

  • TCP/IP Stack Fingerprinting: Analyzes differences in packet responses (nmap -O <target>).
  • TTL and Window Size Analysis: Different operating systems have unique default TTL values.
  • Banner Analysis: Extracting OS details from service responses.

🔹 Example: nmap -O <target> detects whether a system is running Windows, Linux, or macOS.

🛠 Common Tools:

  • Nmap (nmap -O <target>) – OS fingerprinting.
  • Xprobe2 – Active OS detection tool.
  • p0f – Passive OS fingerprinting tool (analyzes traffic without scanning).


← Back Next →

Labels:

Monday, February 10, 2025

Penetration Testing Process

Penetration Testing (Pen Testing) is a controlled cybersecurity assessment where ethical hackers simulate real-world attacks to identify vulnerabilities in an organization's systems, networks, and applications. The goal is to uncover security weaknesses before malicious attackers can exploit them.

Key Phases of Penetration Testing

1. Planning & Reconnaissance

  • Define the scope (which systems, networks, or applications will be tested).
  • Identify testing objectives (data theft, privilege escalation, service disruption, etc.).
  • Gather intelligence on the target using open-source intelligence (OSINT), social engineering, or passive scanning.

🔹 Example: A tester may collect domain information, employee email addresses, or exposed IP addresses before launching an attack.

2. Scanning & Enumeration

  • Identify live hosts, services, and open ports using tools like Nmap.
  • Analyze security vulnerabilities in applications, networks, and databases using scanners like Nessus or OpenVAS.
  • Enumerate user accounts, shared files, and system misconfigurations.

🔹 Example: A tester finds an unpatched web server running an outdated CMS, which could be exploited for unauthorized access.

3. Gaining Access (Exploitation)

  • Use exploits and attack techniques (SQL injection, phishing, password cracking, privilege escalation) to gain access.
  • Test security weaknesses just like real-world attackers would.
  • Deploy payloads, backdoors, or privilege escalation techniques if authorized.

🔹 Example: A tester successfully exploits a misconfigured database and retrieves sensitive customer records.

4. Maintaining Access (Post-Exploitation)

  • Assess if an attacker could persist within the system undetected.
  • Attempt data exfiltration or lateral movement within the network.
  • Evaluate logging and detection capabilities of security systems.

🔹 Example: The tester installs a hidden backdoor to demonstrate how an attacker could maintain long-term access without detection.

5. Analysis & Reporting

  • Document all exploited vulnerabilities, attack vectors, and security weaknesses.
  • Provide risk assessments and impact analysis to management.
  • Recommend remediation strategies (patching, security training, access control improvements).

🔹 Example: The report highlights that weak passwords and outdated software were the primary risks and suggests multi-factor authentication (MFA) and system updates.

6. Remediation & Retesting

  • The organization fixes the identified vulnerabilities.
  • Testers re-run penetration tests to verify the fixes.
  • Security teams improve policies, monitoring, and awareness based on the findings.

🔹 Example: After patching a critical vulnerability, the tester rechecks the system to confirm that the exploit is no longer possible.



NIST Penetration Testing Phases

The National Institute of Standards and Technology (NIST) outlines a structured approach to penetration testing, dividing it into four key phases. These phases ensure a comprehensive assessment of an organization's cybersecurity defenses while maintaining ethical and legal compliance.

1. Planning a Penetration Test

This phase establishes the foundation for a successful test by defining the objectives, scope, and rules of engagement.

Key Activities:

  • Identify goals and objectives (e.g., test web applications, network security, employee awareness).
  • Define the scope (specific systems, networks, or applications to be tested).
  • Establish rules of engagement (allowed attack techniques, testing hours, reporting protocols).
  • Obtain legal and managerial approval to ensure compliance with regulations.

🔹 Example: A company may decide to test only its external-facing systems, excluding internal networks and employee devices.

2. Conducting Discovery

In this phase, testers gather intelligence about the target environment to identify vulnerabilities and attack vectors.

Key Activities:

  • Passive reconnaissance: Use Open-Source Intelligence (OSINT) tools to gather public information (e.g., WHOIS records, leaked credentials).
  • Active scanning: Identify live hosts, open ports, and services using tools like Nmap and Nessus.
  • Enumeration: Extract user accounts, system details, and misconfigurations.

🔹 Example: The tester finds an unpatched web server running outdated software, making it a prime target for exploitation.

3. Executing a Penetration Test

This is the attack phase, where testers simulate real-world cyberattacks to exploit identified vulnerabilities.

Key Activities:

  • Exploitation: Use ethical hacking techniques such as SQL injection, phishing, and password cracking to gain access.
  • Privilege Escalation: Attempt to gain higher-level access within the system.
  • Persistence Testing: Determine whether an attacker could maintain access undetected.
  • Lateral Movement: Test whether an attacker could move between different systems or networks.

🔹 Example: A tester successfully exploits a weak admin password, gains system access, and escalates privileges to obtain sensitive company data.

4. Communicating Penetration Test Results

After testing, findings are documented in a structured report, including vulnerabilities, risks, and remediation steps.

Key Activities:

  • Risk assessment: Categorize vulnerabilities based on their impact and likelihood.
  • Detailed report: Include exploited weaknesses, attack methods used, and potential business impact.
  • Remediation recommendations: Provide actionable security fixes (e.g., patching, stronger access controls).
  • Final presentation: Discuss findings with IT and executive teams, ensuring they understand risks and necessary mitigations.

🔹 Example: The final report reveals that weak authentication and outdated software were the biggest security risks, recommending multi-factor authentication (MFA) and regular patching.



← Back Next →

Labels: