Manipulating Systems Using Remote Lasers

Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers — from as far as 360 feet — at the microphones on ...

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing ...
What does a hacker look like?

What does a hacker look like?

2020 has been rife with cyberattacks, but who is behind these hacks? We dig into the details ...

What are Command Injection Vulnerabilities?

| | Hacking
Introduction Command injection vulnerabilities are one of the most dangerous web vulnerabilities. Many security testers and bounty hunters aim to find command injection vulnerabilities due to the impact they can create on ...
EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
connected cars

Protecting Connected Cars from Cyberattack

The smart features built into new cars open the door to serious cyber threats. Linked to the internet, connected cars offer cybercriminals the potential ability to remotely access and manipulate the data ...
Security Boulevard

Copy-paste compromises

| | Hacking
Copy-paste compromises: Introduction and overview Although the concept of copy-paste compromises is not exactly new, there are now several different forms of the attack. In the version of copy-paste... Go on to ...

Format String Vulnerabilities Exploitation Case Study

| | Hacking
Introduction: In the previous article of this series, we discussed how format string vulnerabilities can be exploited. This article provides a case study of how format string vulnerabilities can be... Go on ...

IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications

| | Hacking
Introduction: IoT Manufacturers Favor Convenience over Security Because IoT security is still an afterthought, cybercriminals in general consider smart devices a “low-hanging fruit” – a target easy... Go on to the site ...

Video: Android Hacking Proving Ground

Watch Now to Upgrade Your Android Hacking Skills! Video and Slide Deck from EH-Net Live! Sept 2020 The world has gone mobile crazy. It seems as though no one can live without ...