Hacking May 6, 2021 Howard Poston 13 popular wireless hacking tools [updated 2021] These wireless monitoring and troubleshooting tools will help you secure your Wi-Fi network.
Hacking April 26, 2021 Jeff Peters Man-in-the-middle attack: Real-life example and video walkthrough [Updated 2021] Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up a MITM attack in this video walkthrough.
Hacking March 4, 2021 Howard Poston Decrypting SSL/TLS traffic with Wireshark [updated 2021] The internet wasn’t designed to be secure from the start. Many protocols (such as HTTP and DNS) were designed to serve their purpose of conveying information...
Hacking March 3, 2021 Kamal B Dumping a complete database using SQL injection [updated 2021] SQL Injection is a web-based attack used by hackers to steal sensitive information from organizations through web applications. It is one of the most...
Hacking January 28, 2021 Dejan Lukan Hacking clients with WPAD (web proxy auto-discovery) protocol [updated 2021] In this tutorial, we’ll take a look at how we can hack clients in the local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol allows automatic...
Hacking January 11, 2021 Pierluigi Paganini Hacking communities in the deep web [updated 2021] The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm's length; meanwhile...
Hacking January 10, 2021 Dan Virgillito How to hack android devices using the stagefright vulnerability [updated 2021] In July 2015, mobile-security firm Zimperium declared it discovered a high-severity vulnerability inside the Android operating system. The critical flaw exists...
Hacking December 21, 2020 Pedro Tavares Hashcat tutorial for beginners [updated 2021] Hashcat is a popular password cracker and designed to break even the most complex passwords representation. To do this, it enables the cracking of a specific...
Hacking December 21, 2020 Pedro Tavares How to hack a phone charger We live in an era where malware is targeting smartphones and other devices from the Internet of the Things (IoT) world. This is not a desirable situation,...
Hacking November 30, 2020 Pedro Tavares What is a side-channel attack? The origin of the side-channel attack is closely related to the existence of physically observable phenomena caused by the execution of computing tasks in...