The rise of ethical hacking: Protecting businesses in 2024

Understand the rising trends of Ethical Hacking and its impact on your organization. Learn what to expect in 2024, and the role of cybersecurity education.

How to crack a password: Demo and video walkthrough

Infosec Skills author Mike Meyers shows just how easy it is to use a brute-force attack or a password dictionary attack to crack a password.

Inside Equifax's massive breach: Demo of the exploit

The Equifax data breach affected nearly half of the U.S. population. In this episode of Cyber Work Applied, see how the attack actually happened.

Wi-Fi password hack: WPA and WPA2 examples and video walkthrough

Infosec Skills author Mike Meyers demos a Wi-Fi WPA key hack. He uses Aircrack-ng and Airodump-ng to access 802.11 WPA and WPA2 connections.

How to hack mobile communications via Unisoc baseband vulnerability

This vulnerability allows attackers can neutralize communications in a specific location.

How to build a hook syscall detector

Learn the principal motivation for implementing hook syscalls, and how to detect them in a Windows operating system.

Top tools for password-spraying attacks in active directory networks

Learn how password spraying attacks work, how popular tools are used within this context and how to defeat these kinds of attacks.

NPK: Free tool to crack password hashes with AWS

Find out why an NPK can be a beneficial tool when it comes to password cracking in penetration testing.

Tutorial: How to exfiltrate or execute files in compromised machines with DNS

Go through this tutorial on exfiltrating and executing files between machines using the well-known DNS protocol.

Top 19 tools for hardware hacking with Kali Linux

These Kali Linux tools enable hardware hacking.