Refrigerators Are Hacking People

You read that right: Refrigerators are hacking people (or at least they can). The machine that you use to keep your perishables fresh can also be used maliciously against you if a hacker hijacks it. This all stems from a concept called the "Internet of Things," or "IoT." This has become an increasingly common topic... Continue Reading →

Breaking HTTPS with a Proxy

I have previously discussed other ways to decrpyt HTTPS traffic, such as sslstrip and key logging, but let's discuss another way. When you link to a Web site, you're hopefully using HTTPS and not HTTP. Our Web traffic used to be encrypted using Netscape's "Secure Sockets Layer version 3 (SSLv3)"; however, due to some inherent... Continue Reading →

Active Reconnaissance and Port Scanning Using Nmap

Nmap, or "Network Mapper," is a network discovery, analysis, and auditing tool utilized by both network defenders and network attackers. As an exceedingly flexible tool with dozens of methods for mapping out networks, Nmap has become a critically acclaimed and well-supported cyber tool. Using Nmap, we can perform network sweeps to discover available hosts on... Continue Reading →

The Ping of Death

The "Ping of Death" abuses the "Internet Control Message Protocol," which we rely on for troubleshooting and reporting utilities on our network, such as the "Ping" command. Network folks usually "ping" another host or system, either on the local network or on the Internet, to test its reachability. For example, you could ping a Web... Continue Reading →

Up ↑