Attackers can compromise even the most hardened systems, and administrators may go months without noticing an intruder who has gained a foothold and is exfiltrating data. To prevent this and detect attacks, there are intrusion detection systems…
CONTINUE READING 🡒 Author: 8bit
DIY USB HID Attack Device: Building and Programming a BadUSB…
USB’s versatility creates a broad attack surface: researchers at Ben-Gurion University have identified nearly three dozen ways to weaponize USB. In this article, we’ll examine one of the most effective approaches—automating keystroke injection using a DIY HID-class…
CONTINUE READING 🡒 Windows 10 Privacy Tools: Testing Apps to Disable Telemetry and…
It’s been more than three years since Windows 10 launched, and the issue of user data being sent to Microsoft’s servers still hasn’t been resolved. Worse, it’s been compounded by forced resets of privacy settings and the…
CONTINUE READING 🡒 Modlishka Reverse-Proxy Phishing: How Attackers Bypass Two-Factor Authentication
Underground forums are rife with offers to hack accounts. In most cases, attackers rely on phishing with spoofed login pages. However, that approach doesn’t work when the user receives an SMS verification code. I’ll show how to…
CONTINUE READING 🡒 Hack the web! Checking web sites for vulnerabilities and exploiting…
Hacking web sites is one of the most common attack types. This article is dedicated to such attacks and protection against them. I will address the pentesting basics for web applications and explain how to deal with…
CONTINUE READING 🡒 Hide-and-seek with Windows 10. Testing spyware and privacy protection tools
Over four years have passed since the release of Windows 10, and throughout this entire period, user data have been 'leaking' to Microsoft servers. The problem has been further exacerbated by Microsoft repeatedly forcing a reset of…
CONTINUE READING 🡒 The phishing harvester. Stealing account credentials with Evilginx 2
Today, we are going to examine Evilginx 2, a reverse proxy toolkit. We will also find out how to use it to bypass two-factor authentication and steal Instagram login credentials. Finally, we will build and launch a…
CONTINUE READING 🡒 FUCK 2FA! Bypassing two-factor authentication with Modlishka
Underground forums are full of offers to hack an account or two (or sell you the login credentials of some ten million accounts if you like). In most cases, such attacks involve social engineering and use fake…
CONTINUE READING 🡒