Bettercap – Capturing NTLM Hashes
As many of you who follow me on twitter will know, I’m a big fan of the Bettercap project. Created by @EvilSocket, this tool is a reimagining of the historicRead More →
As many of you who follow me on twitter will know, I’m a big fan of the Bettercap project. Created by @EvilSocket, this tool is a reimagining of the historicRead More →
State election official bungles the case that DHS tried to breach his office. Accusations that the US Department of Homeland security tried to hack Georgia’s voter registration database are runningRead More →
BackBox Linux 4.7 Distro with Kernel 4.4 LTS and updated hacking tools released. After being in development for a couple of months, the BackBox distro based on Linux 4.7 andRead More →
Hacking, which was once considered the exclusive domain of the “experts” has become very common phenomenon with the rise of technology and advancements in the mobile field. Android phones areRead More →
Criminal gangs like the Cobalt gang are now focusing their efforts on the banks to steal cash directly from the ATMs with jackpotting attacks. Security experts are assisting a changeRead More →
CSV Excel Macro Injection also known as Formula Injection or CSV Injection is an attack technique used in the day today penetration testing of the application. CSV injection is aRead More →
With only a small amount of work, ExtraBacon will commandeer new versions of ASA. Recently released code that exploits Cisco System firewalls and has been linked to the National Security AgencyRead More →
The telecommunications industry keeps the world connected. Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission – and they communicate and store vastRead More →
Learn Ethical Hacking Course Online Through These 10 YouTube Channels. There has been an increasing demand for ethical hackers (also known as white hat hackers or penetration testers) in the lastRead More →
Crooks breaking into enterprise networks are holding data they steal for ransom under the guise they are doing the company a favor by exposing a flaw. The criminal act isRead More →