Hacking February 9, 2021 Irfan Shakeel Nmap from Beginner to Advanced [Updated 2021] Network Mapper (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to...
Hacking January 28, 2021 Dejan Lukan Hacking Clients with WPAD (Web Proxy Auto-Discovery) Protocol [updated 2021] In this tutorial, we’ll take a look at how we can hack clients in the local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol allows automatic...
Hacking January 11, 2021 Pavitra Shankdhar 20 Popular Wireless Hacking Tools [Updated for 2021] Last year, I wrote an article covering popular wireless hacking tools to crack or recover password of wireless network. We added 13 tools in that article which...
Hacking January 10, 2021 Dan Virgillito How to Hack Android Devices Using the StageFright Vulnerability [Updated 2021] In July 2015, mobile-security firm Zimperium declared it discovered a high-severity vulnerability inside the Android operating system. The critical flaw exists...
Hacking December 21, 2020 Pedro Tavares Hashcat Tutorial for Beginners [updated 2021] Hashcat is a popular password cracker and designed to break even the most complex passwords representation. To do this, it enables the cracking of a specific...
Hacking December 21, 2020 Pedro Tavares How to hack a phone charger We live in an era where malware is targeting smartphones and other devices from the Internet of the Things (IoT) world. This is not a desirable situation,...
Hacking November 30, 2020 Pedro Tavares What is a side-channel attack? The origin of the side-channel attack is closely related to the existence of physically observable phenomena caused by the execution of computing tasks in...
Hacking October 28, 2020 Kurt Ellzey Fake Image Detection This is a frying pan. This is a frying pan with a badly drawn pair of eggs in it. Any questions? The phrase “X has been Photoshopped”...
Hacking September 30, 2020 Jatin Jain Copy-paste compromises Although the concept of copy-paste compromises is not exactly new, there are now several different forms of the attack. In the version of copy-paste compromise...
Hacking September 30, 2020 Pedro Tavares Fuzzing introduction: Definition, types and tools for cybersecurity pros Fuzzing is a black-box software testing technique and consists of finding implementation flaws and bugs by using malformed/semi-malformed payloads via automation....