Category: Hacking

PenTest Edition: Using Shodan to Locate Internet-Connected Devices (Webcams, Servers, Routers, and More)
With Shodan, there's no hiding on the Internet. Shodan is a search engine that allows users to locate devices that are connected to the Internet, such as webcams, routers, servers, traffic lights, baby monitors, SCADA systems, Internet of Things (IoT) devices, and so forth. Shodan began back in 2009 as a small project created by ...

Timehop was Hacked – Data Breach Exposes 21 Million Users
Timehop, the extremely popular app that allows users to share their previous moments, has reported that it was the victim of a major data breach over the holiday, which took place on the Fourth of July. Timehop is available for both iOS and Android smartphone users and, since its startup in 2011, the app has ...

The Recent 4G LTE Network Vulnerabilities and Attacks
In this blog post, I'll discuss the design and operation of a 4G LTE network. In hindsight, I realize topics such as these can get extremely lengthy. For that reason, I'll limit this discussion down to only the necessary technical details required to understand these new LTE attacks, while excluding any complicating, non-essentials. These new ...

PenTest Edition: Testing Strong WPA2 Wi-Fi Passwords Using Fluxion
Fluxion Is The Future! Fluxion is accurately just a Wi-Fi analysis tool that comes with a list of very useful penetration testing programs, such as Aircrack-ng, Aireplay-ng, Airodump-ng, awk, bully, curl, dhcpd, hostapd, lighttpd etc. It is a remake of linset by vk496, available on Github. Unlike many other Wi-Fi analysis tools that use a dictionary ...

PenTest Edition: Capture Images On Your Home Network Using Driftnet and WebSploit
WebSploit is an advanced MitM framework of penetration testing tools used to assess wired/wireless network security, web vulnerabilities, and exploitation techniques. This demonstration uses the network/mitm module to set up a Man-in-the-Middle (MitM) attack between the target and the gateway in addition to using Driftnet to steal any unencrypted (and possibly encrypted) images that the ...