Posts

Hard drive hacking

Hard drive hacking

Hard drives: if you are reading this article, it is very likely that you have one or more such devices. They are quite simple and are basically a set of 512-byte sectors numbered with increasing addresses, also called LBA (Logical…

HOW DO HACKERS USE QR CODES TO BREAK INTO SYSTEMS?

HOW DO HACKERS USE QR CODES TO BREAK INTO SYSTEMS?

During the last years two-dimensional (matrix) QR codes (from the English Quick Response, that is “quick response”) have got the widest distribution: they are often used in advertisements, in various signs and museum signs, at the posters and in magazines….

Hacking infrastructure and criminal services

Hacking infrastructure and criminal services

All online businesses need a stable and reliable infrastructure. The most advanced advertising campaigns, market entry and customer retention strategies become meaningless if the store’s website is systematically inaccessible and payment acceptance is triggered at a time. All this is…

NetBIOS in hacker hands

NetBIOS in hacker hands

This article will give a brief account of what NetBIOS can tell us. What kind of information it can provide to a potential attacker/pentester. The demonstrated scope of intelligence techniques refers to internal networks, i.e., isolated and inaccessible from the…

Perform a Pixie Dust attack without having to switch to monitor mode

Perform a Pixie Dust attack without having to switch to monitor mode

OneShot is a script on Python that executes the Pixie Dust attack without switching to monitor mode. To get the necessary data wpa_supplicant is used. Trequirements: Python 3.6 and above; Wpa supplicant; Pixiewps. Homepage: https://github.com/drygdryg/OneShot (current mod), https://github.com/rofl0r/oneshot  Installation in…

Let’s write Keylogger for C++

Let’s write Keylogger for C++

Today we will write a keyboard spy in C++ as an example and only for introductory purposes. Have a nice reading! KeyLogger is malicious software that registers various user actions (typed keys on the keyboard, mouse clicks, etc.). What is…

Web server for pentester thing is very necessary

Web server for pentester thing is very necessary

Today the market has many different manufacturers and versions of web servers, here is a list of some: Apache is a free web server, most commonly used in UNIX-like operating systems, nginx – a free web server developed by Igor Sysoev…

Hack via PDF

Hack via PDF

To launch the attack, just generate and send the target PDF file. The utility is available at GitHub so it is easy to perform the attack on any Linux OS or emulator with Python.   Installation > git clone https://github.com/deepzec/Bad-Pdf.git….

Webmin: backdoor in the server control panel

Webmin: backdoor in the server control panel

Webmin is fully written in Perl, without using non-standard modules. It consists of a simple web server and several scripts – they link the commands that the user gives in the web interface, at the operating system level and external…

How hackers hack two-factor authentication

How hackers hack two-factor authentication

Hacker forums abound with proposals for hacking into accounts. In most cases, attacks are arranged with the help of phishing with a spoofed authorization page. However, this method is ineffective if the user receives SMS with a verification code. The…

Semi-automatic WiFi hacking

Semi-automatic WiFi hacking

Almost everyone already knows about the method of hacking WiFi with the help of handshake interception and decryption. It is implemented by the aircrack utility and involves a fairly large number of commands. Airgeddon automates this process and allows to…

CodeRed worm and all about it

CodeRed worm and all about it

Type: network worm author: unknown, country: China, host: Windows 2000; MS IIS server CodeRed is a worm that caused billions of dollars in damage in the summer of 2001. It is also one of the few worms that can work…

How to crack your Asterisk

How to crack your Asterisk

You must have heard something about IP-PBX hacking, when the attackers call to other countries on international calls, and the victim gets a large bill from the provider. Unfortunately, that’s true and now I’m going to bone up the method…

DNSCAT – Backdoor via DNS

DNSCAT – Backdoor via DNS

dnscat2 – program to create a C&C channel using DNS. Includes the server part that is written in Ruby and the client part that is written in C. Command and Control server is a computer controlled by an attacker, which…

Website Pentest

Website Pentest

Testing for site penetration is one of the most common types of cybercrimes. The reason is simple: sites have a lot of vulnerabilities and exploits for them. The most common purpose of the crack is to place malicious code on…

DDoS attack on Bluetooth

DDoS attack on Bluetooth

While modern Wi-Fi-routers are able to filter unwanted packets, most Bluetooth adapters, to put it mildly, are dumb. They by and large do not care what package and how many of these packets you will send. Therefore it is absolutely…

Top 7 Hacker Distributions

Top 7 Hacker Distributions

Gathering your own collection of hacking tools is great, but now it is customary to take as a basis one of the specialized distributions. Usually it is Kali Linux but we will not only look at it but we will…

Do NOT follow this link or you will be banned from the site!