Conducting a Wi-Fi Security Audit Using a Smartphone with Kali NetHunter and an External Wi-Fi Adapter

Date: 08/08/2025

Wardriving can quite seriously be conducted with a smartphone, but just the built-in radio module and Android apps won’t be enough. Advanced attacks utilize external Wi-Fi adapters and command-line tools for Linux. All the necessary utilities are already available in the Kali NetHunter distribution. Today, we’ll explore how to install it and use it for attacks on access points by connecting a separate Wi-Fi dongle.
Read full article →


Earn Cryptocurrency by Renting Out Your Hard Drive Space

Date: 08/08/2025

If you have unlimited internet and plenty of free disk space, you might want to try earning some money from it. We’ll explain how blockchain is used for data storage and conduct an experiment with the Storj crypto storage platform. Fair warning: you won’t be swimming in money, but you’ll get a taste of the future.
Read full article →


Understanding and Hacking BitLocker: Exploring Windows Disk Encryption and Its Vulnerabilities

Date: 20/07/2025

BitLocker encryption technology was first introduced ten years ago and has evolved with each version of Windows. However, not all changes were aimed at enhancing its cryptographic strength. In this article, we will closely examine the structure of different BitLocker versions (including those pre-installed in the latest builds of Windows 10) and demonstrate how this built-in security mechanism can be bypassed.
Read full article →


Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack Steps

Date: 14/07/2025

You’ve probably tried hacking wireless networks using a laptop and noticed how cumbersome it can be, not to mention that it draws attention. But why bother with a laptop when you can use a real pocket-sized computer that allows you to go war driving without anyone noticing? In this article, we’ll go through the preparation steps and cover some basic attacks, and in the next article, we’ll dive into more advanced techniques.
Read full article →