Hacking December 26, 2022 Bianca Gonzalez How to crack a password: Demo and video walkthrough Infosec Skills author Mike Meyers shows just how easy it is to use a brute-force attack or a password dictionary attack to crack a password.
Hacking December 19, 2022 Bianca Gonzalez Inside Equifax’s massive breach: Demo of the exploit The Equifax data breach affected nearly half of the U.S. population. In this episode of Cyber Work Applied, see how the attack actually happened.
Hacking November 1, 2022 Bianca Gonzalez Wi-Fi password hack: WPA and WPA2 examples and video walkthrough Infosec Skills author Mike Meyers demos a Wi-Fi WPA key hack. He uses Aircrack-ng and Airodump-ng to access 802.11 WPA and WPA2 connections.
Hacking August 4, 2022 Pedro Tavares How to hack mobile communications via Unisoc baseband vulnerability This vulnerability allows attackers can neutralize communications in a specific location.
Hacking May 17, 2022 Pedro Tavares How to build a hook syscall detector Learn the principal motivation for implementing hook syscalls, and how to detect them in a Windows operating system.
Hacking January 25, 2022 Pedro Tavares Top tools for password-spraying attacks in active directory networks Learn how password spraying attacks work, how popular tools are used within this context and how to defeat these kinds of attacks.
Hacking December 16, 2021 Lester Obbayi NPK: Free tool to crack password hashes with AWS Find out why an NPK can be a beneficial tool when it comes to password cracking in penetration testing.
Hacking September 7, 2021 Pedro Tavares Tutorial: How to exfiltrate or execute files in compromised machines with DNS Go through this tutorial on exfiltrating and executing files between machines using the well-known DNS protocol.
Hacking July 5, 2021 Lester Obbayi Top 19 tools for hardware hacking with Kali Linux These Kali Linux tools enable hardware hacking.
Hacking May 12, 2021 Howard Poston 20 popular wireless hacking tools [updated 2021] These tools can help support your wireless hacking skills for penetration testing