Category: Hacking

Decrypting HTTPS Traffic

Hypertext Transfer Protocol over SSL (https)  is pretty decent security. This is because https uses the Secure Sockets Layer (SSL) encryption scheme to pass keys between two parties over the Internet. These days, however, most of our Web servers are utilizing Transport Layer Security (TLS 1.2), which is an updated version of SSL 3.0. Therefore, ...

Stealing Your Personal Information on a Wireless Hot Spot is Painfully Easy [Demonstration]

Wi-Fi Hot Spots: Just how easy is it for a hacker to steal your personal information over an open Wi-Fi network? The answer is that it's painfully simple. Nowadays, we have https, which uses SSL/TLS encryption to encrypt our traffic between our device and the Web server hosting our favorite Web sites. But, not all ...

All Wi-Fi Networks are Currently Vulnerable to Attack

Security researchers have discovered a new attack that exploits our Wi-Fi networks, both at home and in enterprise environments. Most of our home networks are using one of the IEEE 802.11 wireless network protocols, such as 802.11b, 802.11g, 802.11n, or perhaps, 802.11ac. Our home Wi-Fi networks can likely support several 802.11 protocols; however, it is ...

PenTest Edition: Performing a Man-in-the-Middle Attack on a Wireless Network Using Cain & Abel and Wireshark Without Monitor Mode

IntroductionA man-in-the-middle attack occurs when an attacker sits in the middle of the communication between two victim devices, secretly relaying information back and forth on their behalf, similar to a proxy. It can be thought of as active eavesdropping. The attacker cannot only see the communication traveling to-and-from the victim devices, but can also inject ...