Hacking

Ethical hacking: Passive information gathering with Maltego

In this article, we’ll discuss passive information gathering. We’ll first look at how we can use Maltego, a common information-gathering tool, to perform thi

Ethical hacking: Log tampering 101

Getting caught is exactly what every hacker does not want. They want to be able to gain entry into a system and then quickly withdraw to the safety of the in

Ethical hacking: Breaking cryptography (for hackers)

Cryptography is the science of protecting secrets. As a result, it’s designed to make it impossible for an unauthorized party (like a hacker) to gain access

Ethical hacking: Attacking routers

Routers are one of the most attractive points of a network for attackers to prey upon. These ubiquitous network devices often have more than one vulnerabilit

Linux for ethical hackers 101

In this article, we’ll discuss the Linux operating system and how it ties in with ethical hacking. We will explore the Linux distributions that have been des

Ethical hacking: Buffer overflow

When taking external input, an application needs to allocate memory to store that input. Many high-level programming languages will do this behind the scenes

Top five remote access trojans

Once a hacker has gained initial access to a target machine, expanding and solidifying that foothold is the next logical step. In the case of a phishing atta

Covering tracks — Hiding files on Windows/Linux/MacOS

Introduction to hiding files After gaining access to a system, a hacker commonly needs to cover their tracks in order to avoid detection. Many antiviruses op

Top 10 network recon tools

Reconnaissance is an important first stage in any ethical hacking attempt. Before it’s possible to exploit a vulnerability in the target system, it’s necessa

Nmap evade firewall and scripting [updated 2019]

Nmap is the most powerful scanner that is used to perform so many functions including port scanning, service detection, and even vulnerability detection. Nma