• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Month: 29.12.2024

Malformed ELFs. How to make executable Linux files debug-resistant
Security

Malformed ELFs. How to make executable Linux files debug-resistant

29.12.202408/04/2025kclo31700
Plenty of anti-debugging techniques are available nowadays, but one of them stands distinctive. Its main principle is not to detect a debugger, but to prevent the app from running in it. This article explains how such a goal can be achieved using parser differentials and fuzzing. You will…
CONTINUE READING 🡒
YARA to the maximum. Learn to write effective YARA rules by examples
Security

YARA to the maximum. Learn to write effective YARA rules…

21.12.202408/04/2025Nikolai Potolenskii1670
Sometimes, YARA is called the Swiss Army knife of virus analysts. This tool makes it possible to create a set of rules to detect malicious and potentially dangerous programs quickly and accurately. In this article, I will explain how to write perfect YARA rules so that its engine…
CONTINUE READING 🡒
Cyberphone. Transforming an Android smartphone into a hacker tool
Mobile

Cyberphone. Transforming an Android smartphone into a hacker tool

21.12.202408/04/2025s0i372650
From a hacker’s perspective, a mobile phone is the most handy tool for computer attacks, especially for attacks that require semiphysical access and are delivered over a radio channel. In this article, I will explain how to transform an ordinary Android smartphone into a powerful hacker…
CONTINUE READING 🡒
KARMAgeddon. Attacking client devices with Karma
Security

KARMAgeddon. Attacking client devices with Karma

21.12.202408/04/2025s0i372890
Even if your client device isn’t connected to Wi-Fi, it still can be attacked. There is a special category of attacks called Karma that compromise client devices equipped with Wi-Fi modules. This article explains in simple terms how such attacks work.
CONTINUE READING 🡒
Brute-force on-the-fly. Attacking wireless networks in a simple and effective way
Security

Brute-force on-the-fly. Attacking wireless networks in a simple and effective…

21.12.202408/04/2025s0i371660
Attacks on Wi-Fi are extremely diverse: your targets are both client devices and access points who, in turn, can use various protocols and authentication methods. This article presents a simple but effective brute-forcing technique for wireless networks.
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com