Hacking

How to hack Android devices using the StageFright vulnerability [updated 2021]

Learn how Android devices could be exploited through a core component named "StageFright," a native media playback library that records, processes and plays multimedia files

Hashcat tutorial for beginners [updated 2021]

Hashcat is a popular password cracker and designed to break even the most complex passwords representation. To do this, it enables the cracking of a specific

How to hack a phone charger

Introduction We live in an era where malware is targeting smartphones and other devices from the Internet of the Things (IoT) world. This is not a desirable

What is a side-channel attack?

Introduction The origin of the side-channel attack is closely related to the existence of physically observable phenomena caused by the execution of computi

Copy-paste compromises

Copy-paste compromises: Introduction and overview Although the concept of copy-paste compromises is not exactly new, there are now several different forms of

Hacking Microsoft teams vulnerabilities: A step-by-step guide

We are living in an era where technology is part of our lives and a primary valuable resource for personal and professional tasks. The use of online videocon

PDF file format: Basic structure [updated 2020]

We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in

How quickly can hackers find exposed data online? Faster than you think …

Introduction Data is an organization’s most valuable asset. An organization's data can consist of their financial details, consumer information, NPI, PII inf

Hacking the Tor network: Follow up [updated 2020]

In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider

Ethical hacking: TCP/IP for hackers

In this article, we’ll discuss TCP/IP: the importance of mastering it and how this mastery can be beneficial to hackers. We will then look at how hackers are