• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

A brief guide to programmable logic controllers. Searching for vulnerabilities in industrial PLC devices
Security

A brief guide to programmable logic controllers. Searching for vulnerabilities…

28.02.202017/04/2025Egor Litvinov390
Many users believe that controllers installed in buildings and factories are protected better than home gadgets. They are wrong. Today, I will show you how to hack programmable logic controllers using a Linux-based computer. A Linx-150 automation…
CONTINUE READING 🡒
Hide-and-seek with Windows 10. Testing spyware and privacy protection tools
Security

Hide-and-seek with Windows 10. Testing spyware and privacy protection tools

28.02.202017/04/20258bit422
Over four years have passed since the release of Windows 10, and throughout this entire period, user data have been 'leaking' to Microsoft servers. The problem has been further exacerbated by Microsoft repeatedly forcing a reset of…
CONTINUE READING 🡒
The phishing harvester. Stealing account credentials with Evilginx 2
Security

The phishing harvester. Stealing account credentials with Evilginx 2

04.02.202007/03/20208bit732
Today, we are going to examine Evilginx 2, a reverse proxy toolkit. We will also find out how to use it to bypass two-factor authentication and steal Instagram login credentials. Finally, we will build and launch a…
CONTINUE READING 🡒
“Luke, I am your fuzzer”. Automating vulnerability management
Security

“Luke, I am your fuzzer”. Automating vulnerability management

04.02.202007/03/2020Nik Zerof590
Fuzzing is all the rage. It is broadly used today by programmers testing their products, cybersecurity researchers, and, of course, hackers. The use of fuzzers requires a good understanding of their work principles. These top-notch tools make…
CONTINUE READING 🡒
Tails below the radar: the private portable OS
Security

Tails below the radar: the private portable OS

04.02.202007/03/2020Taras Tatarinov420
No doubt, the Tor browser is an essential privacy protection tool. However, Tor alone cannot cover you up and hide your traces. To stay undercover, you need Tails. Tails is a security-focused, Debian-based Linux distribution made to…
CONTINUE READING 🡒
Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe
Security

Keep your eyes open! Hacking others IP and Web cameras…

04.02.202007/03/202084ckf1r3804
Remote access to Web cameras and security cameras is a common hacking technique. It does not require any special software or even special skills. All you need is a Web browser and a few simple manipulations. In…
CONTINUE READING 🡒
Building sniffer on the basis of ESP32. Listening on Wi-Fi, aiming at Bluetooth!
Security

Building sniffer on the basis of ESP32. Listening on Wi-Fi,…

22.01.202007/03/2020Egor Litvinov4971
One day, [GS Labs](http://en.gs-labs.ru/) research and development center launched a project to identify possible bugs and vulnerabilities in its systems. However, the tested device chosen to run the application was pretty tricky: no way to install the…
CONTINUE READING 🡒
Crack and research. Dissecting home gadgets: a full guide
Security

Crack and research. Dissecting home gadgets: a full guide

22.01.202007/03/2020Ilya Shaposhnikov401
So you've got that flashy new high-tech gadget. It could be a smart home controller or a top-notch interactive media streaming box - the one that can tune in to thousands of channels from all over the…
CONTINUE READING 🡒
Linux post-exploitation. Advancing from user to super-user in a few clicks
Security

Linux post-exploitation. Advancing from user to super-user in a few…

22.01.202007/03/2020Ivan Piskunov590
This article is dedicated to some of the most popular and, more importantly, working post-exploitation utilities for Linux servers. You are about to learn how to manipulate the system, gain root access, or steal valuable data right…
CONTINUE READING 🡒
Ghidra vs. IDA Pro. Strengths and weaknesses of NSA’s free reverse engineering toolkit
Security

Ghidra vs. IDA Pro. Strengths and weaknesses of NSA’s free…

28.12.201907/03/2020Nik Zerof770
In March 2019, the National Security Agency of the US Department of Defense (NSA) has published Ghidra, a free reverse engineering toolkit. A couple of years ago, I had read about it on WikiLeaks and was eager…
CONTINUE READING 🡒
FUCK 2FA! Bypassing two-factor authentication with Modlishka
Security

FUCK 2FA! Bypassing two-factor authentication with Modlishka

28.12.201907/03/20208bit651
Underground forums are full of offers to hack an account or two (or sell you the login credentials of some ten million accounts if you like). In most cases, such attacks involve social engineering and use fake…
CONTINUE READING 🡒
Software für das Cracken von Software. Auswahl von Tools für das Reverse Engineering
Security

Software für das Cracken von Software. Auswahl von Tools für…

26.02.201907/03/2020Nik Zerof380
Jeder Reverse Engineer, Malware-Analyst und einfacher Forscher stellt mit der Zeit ein bewährtes Set von Hilfstools zusammen, die er täglich für das Analysieren, Entpacken und Cracken anderer Software verwendet. In diesem Artikel besprechen wir meine. Sie werden…
CONTINUE READING 🡒
Software for cracking software. Selecting tools for reverse engineering
Security

Software for cracking software. Selecting tools for reverse engineering

20.02.201907/03/2020Nik Zerof39914
Every reverse engineer, malware analyst or simply a researcher eventually collects a set of utility software that they use on a daily basis to analyze, unpack, and crack other software. This article will cover mine. It will…
CONTINUE READING 🡒
Attacking a car alarm. How does a car alarm security system work?
Coding Security

Attacking a car alarm. How does a car alarm security…

01.06.201717/04/2025hackmag360
Since such devices as bladeRF, HackRF, RTL-SDR, and software systems like GNU Radio had become widely available, reverse engineering of radio air data got really simple and entertaining.
CONTINUE READING 🡒
What to See on the Darkweb: A Travel Guide to Hidden Services
Security

What to See on the Darkweb: A Travel Guide to…

29.05.201717/04/2025nobody431
We got our hands on a database containing more than 8 000 links to the websites in darknet. It is practically one complete register of what is hidden in Tor Hidden Services. We've chosen the best!
CONTINUE READING 🡒
The Forest Is Under Control. Taking over the entire Active Directory forest
Security

The Forest Is Under Control. Taking over the entire Active…

30.01.201607/03/2020Aleksandr Dmitrenko361
Active Directory is a phenomenon that comes about quite often during the security testing of large companies. It is all too common to come across not a single domain in a single forest, but rather a more…
CONTINUE READING 🡒
Chromium Alloy. How to forge a hacking tool from a browser
Security

Chromium Alloy. How to forge a hacking tool from a…

19.01.201617/04/202584ckf1r3440
The phrase "hacking utilities" has gradually come to acquire a negative meaning. Antivirus software teams curse them out, and users look down on them, placing them on a par with potential threats. But one can perform an…
CONTINUE READING 🡒
How to provide process isolation and not destroy Windows
Security

How to provide process isolation and not destroy Windows

07.01.201601/06/2017Vasily Bukasov511
How can we isolate suspicious processes in Windows and not destroy the OS? How can we create a reliable and Windows-compatible sandbox without hardware virtualization and kernel function hooking, but with the use of documented default OS…
CONTINUE READING 🡒
Using Android to keep tabs on your girlfriend. With her consent, of course!
Security

Using Android to keep tabs on your girlfriend. With her…

31.12.201517/04/2025Sergey Melnikov385
Today we're going to try out a little spy experiment and gather data on the movements of someone important to us, say a girlfriend, child or grandparent. With their written consent to collect and process their information,…
CONTINUE READING 🡒
Turning a Regular USB Flash Drive into a USB Rubber Ducky
Mobile Security

Turning a Regular USB Flash Drive into a USB Rubber…

22.12.201514/12/2015Anton 'ant' Zhukov36721
A long time ago, we reviewed some devices which should be in any hacker's toolbox. One of these devices was a USB Rubber Ducky — a device which resembles a regular USB flash drive. When connected to…
CONTINUE READING 🡒
« Previous 1 2 3 … 10 11 12 13 14 15 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com