Hacking March 4, 2021 Howard Poston Decrypting SSL/TLS traffic with Wireshark [updated 2021] The internet wasn’t designed to be secure from the start. Many protocols (such as HTTP and DNS) were designed to serve their purpose of conveying information...
Hacking March 3, 2021 Kamal B Dumping a complete database using SQL injection [updated 2021] SQL Injection is a web-based attack used by hackers to steal sensitive information from organizations through web applications. It is one of the most common...
Hacking February 9, 2021 Irfan Shakeel Nmap from Beginner to Advanced [Updated 2021] Network Mapper (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to...
Hacking January 28, 2021 Dejan Lukan Hacking Clients with WPAD (Web Proxy Auto-Discovery) Protocol [updated 2021] In this tutorial, we’ll take a look at how we can hack clients in the local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol allows automatic...
Hacking January 11, 2021 Pavitra Shankdhar 20 Popular Wireless Hacking Tools [Updated for 2021] Last year, I wrote an article covering popular wireless hacking tools to crack or recover password of wireless network. We added 13 tools in that article which...
Hacking January 10, 2021 Dan Virgillito How to Hack Android Devices Using the StageFright Vulnerability [Updated 2021] In July 2015, mobile-security firm Zimperium declared it discovered a high-severity vulnerability inside the Android operating system. The critical flaw exists...
Hacking December 21, 2020 Pedro Tavares Hashcat Tutorial for Beginners [updated 2021] Hashcat is a popular password cracker and designed to break even the most complex passwords representation. To do this, it enables the cracking of a specific...
Hacking December 21, 2020 Pedro Tavares How to hack a phone charger We live in an era where malware is targeting smartphones and other devices from the Internet of the Things (IoT) world. This is not a desirable situation,...
Hacking November 30, 2020 Pedro Tavares What is a side-channel attack? The origin of the side-channel attack is closely related to the existence of physically observable phenomena caused by the execution of computing tasks in...
Hacking October 28, 2020 Kurt Ellzey Fake Image Detection This is a frying pan. This is a frying pan with a badly drawn pair of eggs in it. Any questions? The phrase “X has been Photoshopped”...