Hacking

IoT: Hacking a Smart Bulb with Bluetooth - Advanced

This is the 2nd part of the Bluetooth hacking blog. I hope you have gone through the 1st part. If not, please go through it. Let's start.[pkadzone zone="main

A guide to installing and using the Nessus vulnerability scanner

Nessus is an automatic vulnerability scanner that can detect most known vulnerabilities, such as misconfiguration, default passwords, unpatched services, etc

Shellcode Analysis- Basics

In this article, we will look at how what shellcode is, what is its purpose and various shellcode patterns, etc. Please note that this article will not cover

Targeting WSUS Server

(For the first part of the series, From APK to Golden Ticket, see here ) Two servers were eligible for reaching a stable remote shell goal. The servers: WSUS

Hooking and patching android apps using Xposed framework

In part 22 of this series, we discussed the tools that control the flow of the application on the fly while the app is running. Writing Cydia Substrate exten

Metasploit cheat sheet

Metasploit is a framework and not a specific application. As a framework, the user can build their own specific tools that can be used for specific tasks. It

Mobile Hacking Tools: The Current Top Mobile Device Threats

Criminal syndicates are strategically adapting to the changing times. An estimated 25% of all mobile devices worldwide were reported by SkyCure to encounter

Google hacking overview

Google Hacking is a term that encapsulates a wide range of techniques for querying Google to reveal vulnerable Web applications and sometimes to pinpoint vul

Memory and volatility

In this article series, we will learn about how processes reside in memory and various ways to find and enumerate them. I will be using Volatility plugins to

DLL hijacking attacks revisited

This article is all about different DLL hijacking attacks techniques used by malware to achieve persistence. We will be discussing DLL search order hijacking