Hacking
Hacking
Learn how Android devices could be exploited through a core component named "StageFright," a native media playback library that records, processes and plays multimedia files
January 10, 2021
Dan Virgillito
Hacking
Hashcat is a popular password cracker and designed to break even the most complex passwords representation. To do this, it enables the cracking of a specific
December 21, 2020
Pedro Tavares
Hacking
Introduction We live in an era where malware is targeting smartphones and other devices from the Internet of the Things (IoT) world. This is not a desirable
December 21, 2020
Pedro Tavares
Hacking
Introduction The origin of the side-channel attack is closely related to the existence of physically observable phenomena caused by the execution of computi
November 30, 2020
Pedro Tavares
Hacking
Copy-paste compromises: Introduction and overview Although the concept of copy-paste compromises is not exactly new, there are now several different forms of
September 30, 2020
Jatin Jain
Hacking
We are living in an era where technology is part of our lives and a primary valuable resource for personal and professional tasks. The use of online videocon
September 28, 2020
Pedro Tavares
Hacking
We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in
September 26, 2020
Dejan Lukan
Hacking
Introduction Data is an organization’s most valuable asset. An organization's data can consist of their financial details, consumer information, NPI, PII inf
September 09, 2020
Jatin Jain
Hacking
In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider
August 13, 2020
Pierluigi Paganini
Hacking
In this article, we’ll discuss TCP/IP: the importance of mastering it and how this mastery can be beneficial to hackers. We will then look at how hackers are
April 14, 2020
Lester Obbayi- 12 pre-built training plans
- Employer-requested skills
- Personalized, hands-on training
In this series
- 20 best wi-fi hacking tools
- Security and hacking apps for Android devices
- Popular tools for brute-force attacks [updated for 2025]
- How to hack Facebook accounts: Methods and protection strategies
- Wi-Fi password hack: WPA and WPA2 examples and video walkthrough
- 10 most popular password cracking tools [updated 2025]
- How to become a hacker? Step-by-step guide to do it right
- The rise of ethical hacking: Protecting businesses in 2024
- How to crack a password: Demo and video walkthrough
- Inside Equifax's massive breach: Demo of the exploit
- How to hack mobile communications via Unisoc baseband vulnerability
- Top tools for password-spraying attacks in active directory networks
- NPK: Free tool to crack password hashes with AWS
- Tutorial: How to exfiltrate or execute files in compromised machines with DNS
- Top 19 tools for hardware hacking with Kali Linux
- Man-in-the-middle attack: Real-life example and video walkthrough
- Decrypting SSL/TLS traffic with Wireshark [updated 2021]
- Dumping a complete database using SQL injection [updated 2021]
- Hacking clients with WPAD (web proxy auto-discovery) protocol [updated 2021]
- Hacking communities in the deep web [updated 2021]
- How to hack Android devices using the StageFright vulnerability [updated 2021]
- Hashcat tutorial for beginners [updated 2021]
- How to hack a phone charger
- What is a side-channel attack?
- Copy-paste compromises
- Hacking Microsoft teams vulnerabilities: A step-by-step guide
- PDF file format: Basic structure [updated 2020]
- How quickly can hackers find exposed data online? Faster than you think …
- Hacking the Tor network: Follow up [updated 2020]
- Ethical hacking: TCP/IP for hackers
- Ethical hacking: SNMP recon
- How hackers check to see if your website is hackable
- Ethical hacking: Stealthy network recon techniques
- Ethical hacking: IoT hacking tools
- Ethical hacking: Wireless hacking with Kismet
- Ethical hacking: How to hack a web server
- Ethical hacking: Top 6 techniques for attacking two-factor authentication
- Ethical hacking: Top 10 browser extensions for hacking
- Ethical hacking: Social engineering basics
- Ethical hacking: Breaking windows passwords
- Ethical hacking: Passive information gathering with Maltego
- Ethical hacking: Log tampering 101
- Ethical hacking: Breaking cryptography (for hackers)
- Ethical hacking: Attacking routers
- Linux for ethical hackers 101
- Ethical hacking: Buffer overflow
- Top five remote access trojans
- Covering tracks — Hiding files on Windows/Linux/MacOS
- Top 10 network recon tools
- Nmap evade firewall and scripting [updated 2019]
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!