Hacking
Manipulating Systems Using Remote Lasers
Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers — from as far as 360 feet — at the microphones on ...
Sophisticated phishing
Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing ...
What does a hacker look like?
2020 has been rife with cyberattacks, but who is behind these hacks? We dig into the details ...
What are Command Injection Vulnerabilities?
Introduction Command injection vulnerabilities are one of the most dangerous web vulnerabilities. Many security testers and bounty hunters aim to find command injection vulnerabilities due to the impact they can create on ...
Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
Protecting Connected Cars from Cyberattack
The smart features built into new cars open the door to serious cyber threats. Linked to the internet, connected cars offer cybercriminals the potential ability to remotely access and manipulate the data ...
Copy-paste compromises
Copy-paste compromises: Introduction and overview Although the concept of copy-paste compromises is not exactly new, there are now several different forms of the attack. In the version of copy-paste... Go on to ...
Format String Vulnerabilities Exploitation Case Study
Introduction: In the previous article of this series, we discussed how format string vulnerabilities can be exploited. This article provides a case study of how format string vulnerabilities can be... Go on ...
IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications
Introduction: IoT Manufacturers Favor Convenience over Security Because IoT security is still an afterthought, cybercriminals in general consider smart devices a “low-hanging fruit” – a target easy... Go on to the site ...
Video: Android Hacking Proving Ground
Watch Now to Upgrade Your Android Hacking Skills! Video and Slide Deck from EH-Net Live! Sept 2020 The world has gone mobile crazy. It seems as though no one can live without ...

