Privacy Showdown: Comparing the Most Secure Browsers

Date: 17/08/2025

Browsers collect a lot of data about users and track their online activity. To counter this, there are specialized privacy-focused browsers designed to protect your confidentiality and block tracking and ads. Today, we’ll review and compare seven such browsers in their current 2023 versions and then pick the best of the bunch.
Read full article →


Beyond Packet Sniffers: How to Choose the Right Tool for Network Traffic Capture and Analysis

Date: 17/08/2025

Traffic analysis is a crucial stage of penetration testing (and even outright hacking). Network packets often contain interesting artifacts, including passwords for various services and other sensitive data. To capture and inspect traffic, we use sniffers—and there are plenty of them. Today we’ll look at the most popular sniffers for Windows.
Read full article →


Building a Pwnagotchi: Creating an AI-Powered Hacking Device

Date: 03/08/2025

Surely, Hackmag’s readers have wondered if it’s possible to build an inexpensive device that can hack something at the push of a button—or even automatically without any buttons at all. It is possible! Introducing Pwnagotchi—a DIY hacking device for breaching wireless networks, powered by artificial intelligence and featuring a digital pet inside!
Read full article →


Linux in 30 minutes. A Beginner’s Guide to Choosing and Using Linux

Date: 02/06/2025

It doesn’t matter which operating system you prefer to have on your desktop, Linux is literally everywhere today: on servers, on hardware like Raspberry Pi, on smart devices, on computers in government institutions… Well, even in Windows, you can now run LinuxLinux to make it easier, for example, to test server software. A hacker just needs to navigate Linux.
Read full article →


Pentester’s suitcase: Identifying OS on remote host

Date: 31/08/2020

As you are aware, any penetration test starts from information collection. You have to find out what operating system is running on the remote host, and only then you can start looking for vulnerabilities in it. This article presents seven useful tools used inter alia for OS detection and explains their operation principles.

Read full article →