• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up
Tips&tricks: Android’s hidden capabilities that everyone should know
Mobile

Tips&tricks: Android’s hidden capabilities that everyone should know

16.02.201617/04/2025Hack Mag2663
At first sight, Android seems a rather simple operating system; however, it contains a lot of hidden functions and settings (especially in the latest versions) which can make your life much easier. So, before you hurry to…
CONTINUE READING 🡒
Encoder for Android: сomplete software anatomy
Malware Mobile

Encoder for Android: сomplete software anatomy

12.02.201607/03/2020Andrei Pakhomov3320
Until recently, based on the results of surveys and personal experience, I had the impression that users believe that the value of data stored on a device greatly exceeds the cost of the device itself. Why until…
CONTINUE READING 🡒
Android 6.0 permissions in protection and attack
Coding

Android 6.0 permissions in protection and attack

09.02.201607/03/2020Hack Mag2781
Everyday, new vulnerabilities are discovered in mobile devices that can be exploited by intruders. They can send an SMS to a pay-per-call number, they can collect and sell a large database of contact details, and they can…
CONTINUE READING 🡒
The Forest Is Under Control. Taking over the entire Active Directory forest
Security

The Forest Is Under Control. Taking over the entire Active…

30.01.201607/03/2020Aleksandr Dmitrenko2831
Active Directory is a phenomenon that comes about quite often during the security testing of large companies. It is all too common to come across not a single domain in a single forest, but rather a more…
CONTINUE READING 🡒
Avian influenza. Review of *nix vulnerabilities in 2015
Malware Unix

Avian influenza. Review of *nix vulnerabilities in 2015

22.01.201617/04/2025Martin Prankevich3020
According to cvedetails.com, more than 1,305 vulnerabilities have been found in the Linux core since 1999. Sixty-eight of these were in 2015. Most of them don't cause many problems (they are marked as Local and Low), and…
CONTINUE READING 🡒
Chromium Alloy. How to forge a hacking tool from a browser
Security

Chromium Alloy. How to forge a hacking tool from a…

19.01.201617/04/202584ckf1r32680
The phrase "hacking utilities" has gradually come to acquire a negative meaning. Antivirus software teams curse them out, and users look down on them, placing them on a par with potential threats. But one can perform an…
CONTINUE READING 🡒
How to provide process isolation and not destroy Windows
Security

How to provide process isolation and not destroy Windows

07.01.201601/06/2017Vasily Bukasov3391
How can we isolate suspicious processes in Windows and not destroy the OS? How can we create a reliable and Windows-compatible sandbox without hardware virtualization and kernel function hooking, but with the use of documented default OS…
CONTINUE READING 🡒
Jailbreaking for dummies. What to do after a device has been cracked
Mobile

Jailbreaking for dummies. What to do after a device has…

05.01.201617/04/2025Mikhail Filonenko3560
So you've decided to jailbreak your device, downloaded a proper utility from the website paungu or taig, connected your smartphone to your computer, and launched the application. After several reboots, a message was displayed on the screen…
CONTINUE READING 🡒
Using Android to keep tabs on your girlfriend. With her consent, of course!
Security

Using Android to keep tabs on your girlfriend. With her…

31.12.201517/04/2025Sergey Melnikov3295
Today we're going to try out a little spy experiment and gather data on the movements of someone important to us, say a girlfriend, child or grandparent. With their written consent to collect and process their information,…
CONTINUE READING 🡒
How to Handle Malware: Complete Guide. Give it to your younger brother, let him do it himself!
Malware

How to Handle Malware: Complete Guide. Give it to your…

29.12.201517/04/2025Drobotun3800
Numerous times you used to help your friends and people when their PCs fell to onslaught of malware. So did we. But we got pretty sick and tired of all that and pulled out a trump card…
CONTINUE READING 🡒
Turning a Regular USB Flash Drive into a USB Rubber Ducky
Mobile Security

Turning a Regular USB Flash Drive into a USB Rubber…

22.12.201514/12/2015Anton 'ant' Zhukov86621
A long time ago, we reviewed some devices which should be in any hacker's toolbox. One of these devices was a USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to…
CONTINUE READING 🡒
The Children of CryptoLocker, Part 2. TeslaCrypt, TorLocker, TorrentLocker
Malware

The Children of CryptoLocker, Part 2. TeslaCrypt, TorLocker, TorrentLocker

15.12.201514/12/2015Drobotun3590
The first examples of malware that encrypts files and then demands money for decryption appeared a long time ago. Just remember Trojan.Xorist with its primitive encryption algorithm based on XOR, or Trojan.ArchiveLock written in PureBasic, which used…
CONTINUE READING 🡒
The Children of CryptoLocker, Part 1. Critroni, CryptoWall, DirCrypt
Malware

The Children of CryptoLocker, Part 1. Critroni, CryptoWall, DirCrypt

10.12.201514/12/2015Drobotun5520
The first examples of malware that encrypts files and then demands money for decryption appeared a long time ago. Just remember Trojan.Xorist with its primitive encryption algorithm based on XOR, or Trojan.ArchiveLock written in PureBasic, which used…
CONTINUE READING 🡒
Crypto-Ransomware: Russian Style. Large-scale Research on Russian Ransomware
Malware Security

Crypto-Ransomware: Russian Style. Large-scale Research on Russian Ransomware

19.11.201502/12/2015Fyodor Sinitsyn2660
Nowadays the Russian segment of the Web is not dominated by CryptoWall or CTB-Locker, Russia has seen the formation of an "ecosystem" consisting of other types of ransom trojans, which generally don't enter the global arena. Today,…
CONTINUE READING 🡒
Injection gloves-off: bypassing antivirus software with Shellter
Security

Injection gloves-off: bypassing antivirus software with Shellter

13.11.201513/11/2015nobody6960
The great problem for many pentests lies in the fact that any "charged" executable file created with Metasploit or other pentest frameworks can be tracked by any antivirus vendor. That is why a pentester has to find…
CONTINUE READING 🡒
Hidden threats of the IPv6
Security

Hidden threats of the IPv6

28.10.201525/11/2015Hack Mag4171
Why should we worry about IPv6 at all? After all, even though the last blocks of IPv4 addresses have been distributed to the regional registries, the Internet works without any changes. The thing is that IPv6 first…
CONTINUE READING 🡒
How to keep an eye on someone through an Android phone without bothering the owner
Coding Mobile Security

How to keep an eye on someone through an Android…

15.10.2015Andrei Pakhomov3222
Everyone cares about their significant others' security. We all know that feeling when your calls are not answered and your Whatsapp messages not marked as read. In a moment like that you would do a lot to…
CONTINUE READING 🡒
What data Windows 10 sends to Microsoft and how to stop it
Malware Security

What data Windows 10 sends to Microsoft and how to…

14.10.201515/12/2015Hack Mag3818
Since its rise Windows was a natural habitat for all kinds of malware. Now the OS itself seems to have become one big trojan. Right after being installed it starts acting weird. The data flows in rivers…
CONTINUE READING 🡒
Сode injections for Windows applications
Malware

Сode injections for Windows applications

14.10.201528/10/2015Hack Mag5612
Code Injection is a process of injection code (often malicious) into third party application’s memory. A lot of software is using this technique: from malware to game bots. To show this approach, let’s try to execute third…
CONTINUE READING 🡒
How to use WSUS to get control over Windows
Malware Security

How to use WSUS to get control over Windows

14.10.201514/10/2015Alexey Turin3021
This was one of the most interesting attacks showed on Black Hat Las Vegas 2015. Let’s imagine the situation: there’s a large park of Windows computers in a large organization, and they all need to be updated.…
CONTINUE READING 🡒
« Previous 1 2 3 … 35 36 37 38 39 40 41 42 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com