• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

Security

Tails below the radar: the private portable OS

04.02.202007/03/2020Taras Tatarinov20
No doubt, the Tor browser is an essential privacy protection tool. However, Tor alone cannot cover you up and hide your traces. To stay undercover, you need Tails. Tails is a security-focused, Debian-based Linux distribution made to…
CONTINUE READING 🡒
Security

Keep your eyes open! Hacking others IP and Web cameras…

04.02.202007/03/202084ckf1r334
Remote access to Web cameras and security cameras is a common hacking technique. It does not require any special software or even special skills. All you need is a Web browser and a few simple manipulations. In…
CONTINUE READING 🡒
Security

Building sniffer on the basis of ESP32. Listening on Wi-Fi,…

22.01.202007/03/2020Egor Litvinov121
One day, [GS Labs](http://en.gs-labs.ru/) research and development center launched a project to identify possible bugs and vulnerabilities in its systems. However, the tested device chosen to run the application was pretty tricky: no way to install the…
CONTINUE READING 🡒
Security

Crack and research. Dissecting home gadgets: a full guide

22.01.202007/03/2020Ilya Shaposhnikov11
So you've got that flashy new high-tech gadget. It could be a smart home controller or a top-notch interactive media streaming box - the one that can tune in to thousands of channels from all over the…
CONTINUE READING 🡒
Security

Linux post-exploitation. Advancing from user to super-user in a few…

22.01.202007/03/2020Ivan Piskunov40
This article is dedicated to some of the most popular and, more importantly, working post-exploitation utilities for Linux servers. You are about to learn how to manipulate the system, gain root access, or steal valuable data right…
CONTINUE READING 🡒
Security

Ghidra vs. IDA Pro. Strengths and weaknesses of NSA’s free…

28.12.201907/03/2020Nik Zerof30
In March 2019, the National Security Agency of the US Department of Defense (NSA) has published Ghidra, a free reverse engineering toolkit. A couple of years ago, I had read about it on WikiLeaks and was eager…
CONTINUE READING 🡒
Security

FUCK 2FA! Bypassing two-factor authentication with Modlishka

28.12.201907/03/20208bit31
Underground forums are full of offers to hack an account or two (or sell you the login credentials of some ten million accounts if you like). In most cases, such attacks involve social engineering and use fake…
CONTINUE READING 🡒
Security

Software für das Cracken von Software. Auswahl von Tools für…

26.02.201907/03/2020Nik ZerofX0
Jeder Reverse Engineer, Malware-Analyst und einfacher Forscher stellt mit der Zeit ein bewährtes Set von Hilfstools zusammen, die er täglich für das Analysieren, Entpacken und Cracken anderer Software verwendet. In diesem Artikel besprechen wir meine. Sie werden…
CONTINUE READING 🡒
Security

Software for cracking software. Selecting tools for reverse engineering

20.02.201907/03/2020Nik Zerof2214
Every reverse engineer, malware analyst or simply a researcher eventually collects a set of utility software that they use on a daily basis to analyze, unpack, and crack other software. This article will cover mine. It will…
CONTINUE READING 🡒
Coding Security

Attacking a car alarm. How does a car alarm security…

01.06.201717/04/2025hackmag30
Since such devices as bladeRF, HackRF, RTL-SDR, and software systems like GNU Radio had become widely available, reverse engineering of radio air data got really simple and entertaining.
CONTINUE READING 🡒
Security

What to See on the Darkweb: A Travel Guide to…

29.05.201717/04/2025nobody21
We got our hands on a database containing more than 8 000 links to the websites in darknet. It is practically one complete register of what is hidden in Tor Hidden Services. We've chosen the best!
CONTINUE READING 🡒
Security

The Forest Is Under Control. Taking over the entire Active…

30.01.201607/03/2020Aleksandr Dmitrenko21
Active Directory is a phenomenon that comes about quite often during the security testing of large companies. It is all too common to come across not a single domain in a single forest, but rather a more…
CONTINUE READING 🡒
Security

Chromium Alloy. How to forge a hacking tool from a…

19.01.201617/04/202584ckf1r310
The phrase "hacking utilities" has gradually come to acquire a negative meaning. Antivirus software teams curse them out, and users look down on them, placing them on a par with potential threats. But one can perform an…
CONTINUE READING 🡒
Security

How to provide process isolation and not destroy Windows

07.01.201601/06/2017Vasily Bukasov41
How can we isolate suspicious processes in Windows and not destroy the OS? How can we create a reliable and Windows-compatible sandbox without hardware virtualization and kernel function hooking, but with the use of documented default OS…
CONTINUE READING 🡒
Security

Using Android to keep tabs on your girlfriend. With her…

31.12.201517/04/2025Sergey MelnikovX5
Today we're going to try out a little spy experiment and gather data on the movements of someone important to us, say a girlfriend, child or grandparent. With their written consent to collect and process their information,…
CONTINUE READING 🡒
Mobile Security

Turning a Regular USB Flash Drive into a USB Rubber…

22.12.201514/12/2015Anton 'ant' Zhukov3721
A long time ago, we reviewed some devices which should be in any hacker's toolbox. One of these devices was a USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to…
CONTINUE READING 🡒
Malware Security

Crypto-Ransomware: Russian Style. Large-scale Research on Russian Ransomware

19.11.201502/12/2015Fyodor Sinitsyn20
Nowadays the Russian segment of the Web is not dominated by CryptoWall or CTB-Locker, Russia has seen the formation of an "ecosystem" consisting of other types of ransom trojans, which generally don't enter the global arena. Today,…
CONTINUE READING 🡒
Security

Injection gloves-off: bypassing antivirus software with Shellter

13.11.201513/11/2015nobodyX0
The great problem for many pentests lies in the fact that any "charged" executable file created with Metasploit or other pentest frameworks can be tracked by any antivirus vendor. That is why a pentester has to find…
CONTINUE READING 🡒
Security

Hidden threats of the IPv6

28.10.201525/11/2015hackmag11
Why should we worry about IPv6 at all? After all, even though the last blocks of IPv4 addresses have been distributed to the regional registries, the Internet works without any changes. The thing is that IPv6 first…
CONTINUE READING 🡒
Coding Mobile Security

How to keep an eye on someone through an Android…

15.10.2015Andrei PakhomovX2
Everyone cares about their significant others' security. We all know that feeling when your calls are not answered and your Whatsapp messages not marked as read. In a moment like that you would do a lot to…
CONTINUE READING 🡒
« Previous 1 2 3 … 9 10 11 12 13 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com