Hacking

How to hack mobile communications via Unisoc baseband vulnerability

This vulnerability allows attackers can neutralize communications in a specific location.

Top tools for password-spraying attacks in active directory networks

Learn how password spraying attacks work, how popular tools are used within this context and how to defeat these kinds of attacks.

NPK: Free tool to crack password hashes with AWS

Find out why an NPK can be a beneficial tool when it comes to password cracking in penetration testing.

Tutorial: How to exfiltrate or execute files in compromised machines with DNS

Go through this tutorial on exfiltrating and executing files between machines using the well-known DNS protocol.

Top 19 tools for hardware hacking with Kali Linux

These Kali Linux tools enable hardware hacking.

Man-in-the-middle attack: Real-life example and video walkthrough

Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up a MITM attack in this video walkthrough.

Decrypting SSL/TLS traffic with Wireshark [updated 2021]

The internet wasn’t designed to be secure from the start. Many protocols (such as HTTP and DNS) were designed to serve their purpose of conveying information

Dumping a complete database using SQL injection [updated 2021]

What is SQL injection? SQL Injection is a web-based attack used by hackers to steal sensitive information from organizations through web applications. I

Hacking clients with WPAD (web proxy auto-discovery) protocol [updated 2021]

In this tutorial, we’ll take a look at how we can hack clients in the local network by using WPAD (Web Proxy Auto-Discovery). The WPAD protocol allows automa

Hacking communities in the deep web [updated 2021]

The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm's length; me