Understanding and Hacking BitLocker: Exploring Windows Disk Encryption and Its Vulnerabilities

Date: 20/07/2025

BitLocker encryption technology was first introduced ten years ago and has evolved with each version of Windows. However, not all changes were aimed at enhancing its cryptographic strength. In this article, we will closely examine the structure of different BitLocker versions (including those pre-installed in the latest builds of Windows 10) and demonstrate how this built-in security mechanism can be bypassed.
Read full article →


Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack Steps

Date: 14/07/2025

You’ve probably tried hacking wireless networks using a laptop and noticed how cumbersome it can be, not to mention that it draws attention. But why bother with a laptop when you can use a real pocket-sized computer that allows you to go war driving without anyone noticing? In this article, we’ll go through the preparation steps and cover some basic attacks, and in the next article, we’ll dive into more advanced techniques.
Read full article →


The deplorable four. Testing free antiviruses: Huorong, Preventon, Zoner, and FS Protection

Date: 31/08/2020

Today, I am going to battle-test four antivirus programs: a British one, a Chinese one (featuring an original engine), a Finnish one, and an exciting Czech project at the beta-version stage. All of them are free and offer extra protection features aside from the basic system scan. Let’s pit the new antiviruses against hordes of trojans and worms I prepared for them!

Read full article →


Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe

Date: 04/02/2020

Remote access to Web cameras and security cameras is a common hacking technique. It does not require any special software or even special skills. All you need is a Web browser and a few simple manipulations. In other words, you may gain access to thousands of electronic eyes around the world if you know how to find their IP addresses and exploit their vulnerabilities.

Read full article →


Chromium Alloy. How to forge a hacking tool from a browser

Date: 19/01/2016

The phrase “hacking utilities” has gradually come to acquire a negative meaning. Antivirus software teams curse them out, and users look down on them, placing them on a par with potential threats. But one can perform an audit and other relatively significant tasks simply from the browser, if it is prepared properly. In this article we take a look at the respective add-ons to Chrome, but one can find similar additions for Firefox as well.

Read full article →