Volkswagen Golf GTE And Audi3 Sportback e-tron Car Models Vulnerable to Remote Hacking

Hacking vehicles isn't anything new. Over recent years, researchers have demonstrated through proof-of-concept experiments that many popular car models can be hacked by exploiting carefully selected vulnerabilities for a particular system integrated into the vehicle. Just ask Ford, Jeep, Nissan, and Toyota. Some of these vehicles can be remotely turned off; some of them can... Continue Reading →

PenTest Edition: Cracking Wi-Fi Passwords with Aircrack-ng

Aircrack-ng is a suite of wireless penetration testing tools used to assess the security of Wi-Fi networks, specifically through various monitoring, attacking, testing, and cracking methods that you'll learn here. Aircrack-ng is compatible with various IEEE 802.11 standards, which is great, but it will only work if you're wireless NIC supports "monitor" mode. If you... Continue Reading →

What is Penetration Testing?

Penetration testers are hired ethical hackers tasked with simulating a real-world attack on an organization's networks and systems. Think of it as an intrusive security assessment that measures the organization's level of resistance to an attack. The great thing about penetration tests are that they test the organization's capabilities to defend against real-world attacks and... Continue Reading →

Your Live Security Camera Footage May Be Broadcasted Online: And You Wouldn’t Know!

Live video feeds of home and commercial surveillance cameras around the globe are being broadcasted live and without permission on a site called Insecam, which is believed to have originated from Russia. Other sites like Shodan and Nestcamdirectory also provide visitors with the ability to look up IP cameras; however, Insecam aggregates these live video streams all into one... Continue Reading →

PenTest Edition: Wireshark

Wireshark is a GUI, cross-platform, open-source protocol and packet analyzer available for Microsoft Windows, Linux, Mac OS, BSD, Solaris, and some other Unix-like operating systems. As a packet analyzer, Wireshark's functionality includes network troubleshooting, packet capture analysis, real-time network traffic observation, examining security problems, protocol implementation debugging, and reconnaissance. If you're already familiar with tcpdump or... Continue Reading →

Session Hijacking Attacks

Today, I'll discuss "Session Hijacking" attacks. But first, we need to understand what a cookie is. What are "Cookies?" A "cookie" is nothing more than a simple text file containing an arbitrary string of characters. When you visit many of your favorite web sites, the web server stores a cookie on your HD, allowing it... Continue Reading →

PenTest Edition: Wi-Fi Testing with Wifite

Wifite is another wireless auditing tool that comes prepackaged in Kali Linux. This is perhaps the easiest tool so far, seeing as it automates the entire process, making it much easier for penetration testers to quickly test the security of wireless networks. You may be wondering if it's okay to display the SSIDs and BSSIDs... Continue Reading →

WordPress.com.

Up ↑