• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: 84ckf1r3

Why End-to-End Encryption in Signal, WhatsApp, Telegram, and Viber Won’t Protect Your Messages from Device Hacks
Mobile

Why End-to-End Encryption in Signal, WhatsApp, Telegram, and Viber Won’t…

1 week ago13/09/202584ckf1r31430
Encryption in messaging apps became popular because it happens entirely behind the scenes. Users don’t have to generate key pairs, sign them, or revoke old and compromised keys on their own—everything is handled automatically, and the conversation…
CONTINUE READING 🡒
The Great Password Collider: Recovering Passwords from Hashes Without Heavy Computation
Security

The Great Password Collider: Recovering Passwords from Hashes Without Heavy…

2 weeks ago13/09/202584ckf1r31850
It’s often necessary to recover a password when all you have is its hash. You could brute-force it on your own machine, but it’s much faster to leverage existing databases. Even public datasets contain tens of millions…
CONTINUE READING 🡒
Two Alfa USB Wi‑Fi adapters are better than one: preparing for advanced Wi‑Fi hacking and penetration testing
Security

Two Alfa USB Wi‑Fi adapters are better than one: preparing…

1 month ago23/08/202584ckf1r31400
In earlier articles on pentesting Wi‑Fi access points, we covered the basics; now it’s time for more advanced techniques. We’ll look at adapter specifics and turn up the power on our dongle. This is necessary to use…
CONTINUE READING 🡒
Why Messaging Apps Don’t Truly Protect Your Chat Privacy—and How to Do Encryption Right
Security

Why Messaging Apps Don’t Truly Protect Your Chat Privacy—and How…

2 months ago19/08/202584ckf1r31440
End-to-end encryption (E2EE) is often touted as a cure-all against persistent attempts by hackers and law enforcement to read online conversations. It’s commonly summarized as “the keys live only on the participants’ devices and never touch the…
CONTINUE READING 🡒
Hacking with Google: Up-to-Date Google Dork Queries for OSINT and Penetration Testing
Security

Hacking with Google: Up-to-Date Google Dork Queries for OSINT and…

2 months ago16/08/202584ckf1r31070
Penetration tests usually rely on a toolkit of specialized utilities, but one of them is available to everyone and always at your fingertips—Google. You just need to know how to use it. Google dork queries are clever…
CONTINUE READING 🡒
Best Privacy-Focused Linux Distros for Bypassing Censorship and Protecting Against Surveillance
Security

Best Privacy-Focused Linux Distros for Bypassing Censorship and Protecting Against…

2 months ago11/08/202584ckf1r32610
Maybe you’ve already used the Tails distribution—or even run it daily. But it’s not the only OS that can mask your presence online and help you bypass regional restrictions. In this article, we’ll look at five Tails…
CONTINUE READING 🡒
Conducting a Wi-Fi Security Audit Using a Smartphone with Kali NetHunter and an External Wi-Fi Adapter
Security

Conducting a Wi-Fi Security Audit Using a Smartphone with Kali…

2 months ago06/08/202584ckf1r34910
Wardriving can be effectively conducted using a smartphone, but the built-in radio module and Android apps are often insufficient for advanced attacks. Instead, external Wi-Fi adapters and console programs for Linux are typically used. All the necessary…
CONTINUE READING 🡒
Earn Cryptocurrency by Renting Out Your Hard Drive Space
Security

Earn Cryptocurrency by Renting Out Your Hard Drive Space

2 months ago06/08/202584ckf1r31300
If you have unlimited internet and plenty of free disk space, you might be able to make some money from it. We'll explain how blockchain is used for data storage and conduct an experiment with the Storj…
CONTINUE READING 🡒
Understanding and Hacking BitLocker: Exploring Windows Disk Encryption and Its Vulnerabilities
Security

Understanding and Hacking BitLocker: Exploring Windows Disk Encryption and Its…

3 months ago19/07/202584ckf1r32430
The BitLocker encryption technology was first introduced ten years ago and has evolved with each new version of Windows. However, not all changes have been aimed at increasing cryptographic strength. In this article, we will take an…
CONTINUE READING 🡒
Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack Steps
Mobile

Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack…

3 months ago12/07/202584ckf1r31110
You've probably tried hacking wireless networks using a laptop and noticed that it's not very convenient to carry around, plus it attracts attention. But why use a laptop when you have a real pocket-sized computer that lets…
CONTINUE READING 🡒
Victory over “bads”: using Victoria to recover data and reset disk password
Security

Victory over “bads”: using Victoria to recover data and reset…

04.06.202584ckf1r33280
Recovering deleted files is not a problem; there are dozens of utilities for this. But what if the drive is damaged, has an erroneous geometry description, or is password protected at the controller level? Then the Victoria utility comes to the rescue. It is written in assembler, takes up…
CONTINUE READING 🡒
The deplorable four. Testing free antiviruses: Huorong, Preventon, Zoner, and FS Protection
Security

The deplorable four. Testing free antiviruses: Huorong, Preventon, Zoner, and…

31.08.202008/04/202584ckf1r32610
Today, I am going to battle-test four antivirus programs: a British one, a Chinese one (featuring an original engine), a Finnish one, and an exciting Czech project at the beta-version stage. All of them are free and…
CONTINUE READING 🡒
Wi-Fi total PWN. Mastering actual Wi-Fi pentesting techniques from scratch
Security

Wi-Fi total PWN. Mastering actual Wi-Fi pentesting techniques from scratch

04.05.202008/04/202584ckf1r3562
The best way to check the network's security is by trying to hack it. In the past, HackMag had published materials about auditing Wi-Fi networks. Unfortunately, such guides quickly become obsolete. Today, I will share some practical…
CONTINUE READING 🡒
Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe
Security

Keep your eyes open! Hacking others IP and Web cameras…

04.02.202007/03/202084ckf1r33254
Remote access to Web cameras and security cameras is a common hacking technique. It does not require any special software or even special skills. All you need is a Web browser and a few simple manipulations. In…
CONTINUE READING 🡒
Chromium Alloy. How to forge a hacking tool from a browser
Security

Chromium Alloy. How to forge a hacking tool from a…

19.01.201617/04/202584ckf1r32680
The phrase "hacking utilities" has gradually come to acquire a negative meaning. Antivirus software teams curse them out, and users look down on them, placing them on a par with potential threats. But one can perform an…
CONTINUE READING 🡒
How to find vulnerabilities in routers and what to do with it
Stuff

How to find vulnerabilities in routers and what to do…

18.08.201514/10/201584ckf1r32770
Often, the manufacturers of routers do not particularly care about the quality of their code. As a result, the vulnerabilities are not uncommon. Today, the routers are a priority target of network attacks that allows to steal…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com