Fuzzing is all the rage. It is broadly used today by programmers testing their products, cybersecurity researchers, and, of course, hackers. The use of fuzzers requires a good understanding of their work principles. These top-notch tools make…
CONTINUE READING 🡒 Tails below the radar: the private portable OS
No doubt, the Tor browser is an essential privacy protection tool. However, Tor alone cannot cover you up and hide your traces. To stay undercover, you need Tails. Tails is a security-focused, Debian-based Linux distribution made to…
CONTINUE READING 🡒 Keep your eyes open! Hacking others IP and Web cameras…
Remote access to Web cameras and security cameras is a common hacking technique. It does not require any special software or even special skills. All you need is a Web browser and a few simple manipulations. In…
CONTINUE READING 🡒 Building sniffer on the basis of ESP32. Listening on Wi-Fi,…
One day, [GS Labs](http://en.gs-labs.ru/) research and development center launched a project to identify possible bugs and vulnerabilities in its systems. However, the tested device chosen to run the application was pretty tricky: no way to install the…
CONTINUE READING 🡒 Crack and research. Dissecting home gadgets: a full guide
So you've got that flashy new high-tech gadget. It could be a smart home controller or a top-notch interactive media streaming box - the one that can tune in to thousands of channels from all over the…
CONTINUE READING 🡒 Linux post-exploitation. Advancing from user to super-user in a few…
This article is dedicated to some of the most popular and, more importantly, working post-exploitation utilities for Linux servers. You are about to learn how to manipulate the system, gain root access, or steal valuable data right…
CONTINUE READING 🡒 Homemade keylogger. Writing an undetectable keylogger in C#
Commercial keyloggers supporting numerous functions and protected against detection may cost dozens and even hundreds of dollars. However, it is not that difficult to create a homemade keylogger and avoid antivirus alerts. In this article, I will…
CONTINUE READING 🡒 Counter-Forensics. Protecting your smartphone against the Five Eyes
The Editorial Board decided to publish this material after reviewing a large number of articles in various periodicals, including technical ones. All these publications, with no exceptions, repeat the same trivial recommendations: "use a complex screen lock…
CONTINUE READING 🡒 Ghidra vs. IDA Pro. Strengths and weaknesses of NSA’s free…
In March 2019, the National Security Agency of the US Department of Defense (NSA) has published Ghidra, a free reverse engineering toolkit. A couple of years ago, I had read about it on WikiLeaks and was eager…
CONTINUE READING 🡒 FUCK 2FA! Bypassing two-factor authentication with Modlishka
Underground forums are full of offers to hack an account or two (or sell you the login credentials of some ten million accounts if you like). In most cases, such attacks involve social engineering and use fake…
CONTINUE READING 🡒 Software für das Cracken von Software. Auswahl von Tools für…
Jeder Reverse Engineer, Malware-Analyst und einfacher Forscher stellt mit der Zeit ein bewährtes Set von Hilfstools zusammen, die er täglich für das Analysieren, Entpacken und Cracken anderer Software verwendet. In diesem Artikel besprechen wir meine. Sie werden…
CONTINUE READING 🡒 Software for cracking software. Selecting tools for reverse engineering
Every reverse engineer, malware analyst or simply a researcher eventually collects a set of utility software that they use on a daily basis to analyze, unpack, and crack other software. This article will cover mine. It will…
CONTINUE READING 🡒 Attacking a car alarm. How does a car alarm security…
Since such devices as bladeRF, HackRF, RTL-SDR, and software systems like GNU Radio had become widely available, reverse engineering of radio air data got really simple and entertaining.
CONTINUE READING 🡒 What to See on the Darkweb: A Travel Guide to…
We got our hands on a database containing more than 8 000 links to the websites in darknet. It is practically one complete register of what is hidden in Tor Hidden Services. We've chosen the best!
CONTINUE READING 🡒 Tips&tricks: Android’s hidden capabilities that everyone should know
At first sight, Android seems a rather simple operating system; however, it contains a lot of hidden functions and settings (especially in the latest versions) which can make your life much easier. So, before you hurry to…
CONTINUE READING 🡒 Encoder for Android: сomplete software anatomy
Until recently, based on the results of surveys and personal experience, I had the impression that users believe that the value of data stored on a device greatly exceeds the cost of the device itself. Why until…
CONTINUE READING 🡒 Android 6.0 permissions in protection and attack
Everyday, new vulnerabilities are discovered in mobile devices that can be exploited by intruders. They can send an SMS to a pay-per-call number, they can collect and sell a large database of contact details, and they can…
CONTINUE READING 🡒 The Forest Is Under Control. Taking over the entire Active…
Active Directory is a phenomenon that comes about quite often during the security testing of large companies. It is all too common to come across not a single domain in a single forest, but rather a more…
CONTINUE READING 🡒 Avian influenza. Review of *nix vulnerabilities in 2015
According to cvedetails.com, more than 1,305 vulnerabilities have been found in the Linux core since 1999. Sixty-eight of these were in 2015. Most of them don't cause many problems (they are marked as Local and Low), and…
CONTINUE READING 🡒 Chromium Alloy. How to forge a hacking tool from a…
The phrase "hacking utilities" has gradually come to acquire a negative meaning. Antivirus software teams curse them out, and users look down on them, placing them on a par with potential threats. But one can perform an…
CONTINUE READING 🡒