Covert Channels: How Insiders Abuse TCP/IP to Create Covert Channels
The TCP/IP protocol suite, our conceptual model we use to explain the way in which data travels across a network, contains a myriad of communication protocols. The TCP/IP protocol suite generically refers to two main protocols: TCP and UDP, but there are many other protocols, some of which can be abused to create covert channels. ...
Refrigerators Are Hacking People
You read that right: Refrigerators are hacking people (or at least they can). The machine that you use to keep your perishables fresh can also be used maliciously against you if a hacker hijacks it. This all stems from a concept called the "Internet of Things," or "IoT." This has become an increasingly common topic ...
Reports Claim Cellebrite Can Unlock Any iPhone: Now the Federal Gov. Can Too
Remember when the FBI and Apple were in a tug-of war to unlock the iPhone of the San Bernardino mass shooter? Not only did Apple refuse to cooperate, but the company also publicly stated that they would no longer help law enforcement unlock any of their devices, putting its customer's privacy first. At some point ...
Breaking HTTPS with a Proxy
I have previously discussed other ways to decrpyt HTTPS traffic, such as sslstrip and key logging, but let's discuss another way. When you link to a Web site, you're hopefully using HTTPS and not HTTP. Our Web traffic used to be encrypted using Netscape's "Secure Sockets Layer version 3 (SSLv3)"; however, due to some inherent ...
PenTest Edition: Active Reconnaissance and Port Scanning Using Nmap
Nmap, or "Network Mapper," is a network discovery, analysis, and auditing tool utilized by both network defenders and network attackers. As an exceedingly flexible tool with dozens of methods for mapping out networks, Nmap has become a critically acclaimed and well-supported cyber tool. Using Nmap, we can perform network sweeps to discover available hosts on ...
