Wi-Fi Cracking
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is notRead More →
Data Security News | Infosec Blog | Cyber Security Tutorials
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is notRead More →
Dubbed as ATMJackpot, the new ATM malware has been identified by information security training researchers at Netskope Threat Research Labs. Initial investigation revealed that the malware originated from Hong Kong while theRead More →
It was recently revealed by information security training researchers that an analytics firm, Cambridge Analytica, wrongfully gained access to the data of 50 million people swept up from Facebook via a ‘personalityRead More →
You have always been warned not to share remote access to your computer with untrusted people for any reason; it’s a basic information security advice and common sense. A criticalRead More →
While performing penetration and red team services , I have always enjoyed the challenge of gaining access to a well fortified wireless network. Red teams avoid or purposely target other networkRead More →
A research team from Israel’s Ben-Gurion University of the Negev ‘s cyber security research center has discovered a new way of data extraction from air-gapped computers via using passive devicesRead More →
The number of Flash Player exploits has recently declined, due to Adobe’s introduction of various measures to strengthen Flash’s security. Occasionally, however, an exploit still arises. On January 31, Kr-Cert reported aRead More →
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commandsRead More →
Memcached is a distributed system that allows the caching of information in RAM. This software seeks to accelerate the search and access to information. Instead of going to the disk,Read More →
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t beRead More →