Hacking March 4, 2021 Howard Poston Decrypting SSL/TLS traffic with Wireshark [updated 2021] The internet wasn’t designed to be secure from the start. Many protocols (such as HTTP and DNS) were designed to serve their purpose of conveying information...
Hacking March 3, 2021 Kamal B Dumping a complete database using SQL injection [updated 2021] SQL Injection is a web-based attack used by hackers to steal sensitive information from organizations through web applications. It is one of the most...
Hacking January 28, 2021 Dejan Lukan Hacking Clients with WPAD (Web Proxy Auto-Discovery) Protocol [updated 2021] In this tutorial, we’ll take a look at how we can hack clients in the local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol allows automatic...
Hacking January 11, 2021 Pavitra Shankdhar 13 Popular Wireless Hacking Tools [Updated for 2021] Internet is now the basic need of our daily life. With the increasing use of smartphones, most of the things are now online. Every time we have to do something,...
Hacking January 11, 2021 Pavitra Shankdhar 20 Popular Wireless Hacking Tools [Updated for 2021] Last year, I wrote an article covering popular wireless hacking tools to crack or recover password of wireless network. We added 13 tools in that article which...
Hacking January 11, 2021 Pierluigi Paganini Hacking communities in the Deep Web [Updated 2021] The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm's length; meanwhile...
Hacking January 10, 2021 Dan Virgillito How to Hack Android Devices Using the StageFright Vulnerability [Updated 2021] In July 2015, mobile-security firm Zimperium declared it discovered a high-severity vulnerability inside the Android operating system. The critical flaw exists...
Hacking December 21, 2020 Pedro Tavares Hashcat Tutorial for Beginners [updated 2021] Hashcat is a popular password cracker and designed to break even the most complex passwords representation. To do this, it enables the cracking of a specific...
Hacking December 21, 2020 Pedro Tavares How to hack a phone charger We live in an era where malware is targeting smartphones and other devices from the Internet of the Things (IoT) world. This is not a desirable situation,...
Hacking November 30, 2020 Pedro Tavares What is a side-channel attack? The origin of the side-channel attack is closely related to the existence of physically observable phenomena caused by the execution of computing tasks in...