Category: Hacking

PenTest Edition: Assessing WEP, WPS, WPA, and WPA2 Wi-Fi Networks with the “Fern Wi-Fi Cracker” Tool
Here's a fun assessment you can perform on your home network. I'm running Kali Linux 2018.1 in a virtual machine using VMware Workstation Player. My wireless network adapter is an Alfa AWUS036NHA with a 9dBi omni-directional antenna. Penetration testers may use the Fern Wi-Fi cracker as a security auditing tool to test the security of ...

DoS and DDoS Attacks: How They’re Executed, Detected, and Prevented
A DoS and a DDoS...What's the difference? A "Denial of Service," or "DoS" attack, is a category of advanced cyberattack in which a single malicious user denies legitimate users access to a service by blocking or exhausting the resources of a victim system. The DoS is commonly carried out through some form of flooding mechanism, ...

Covert Channels: How Insiders Abuse TCP/IP to Create Covert Channels
The TCP/IP protocol suite, our conceptual model we use to explain the way in which data travels across a network, contains a myriad of communication protocols. The TCP/IP protocol suite generically refers to two main protocols: TCP and UDP, but there are many other protocols, some of which can be abused to create covert channels. ...

Refrigerators Are Hacking People
You read that right: Refrigerators are hacking people (or at least they can). The machine that you use to keep your perishables fresh can also be used maliciously against you if a hacker hijacks it. This all stems from a concept called the "Internet of Things," or "IoT." This has become an increasingly common topic ...

Reports Claim Cellebrite Can Unlock Any iPhone: Now the Federal Gov. Can Too
Remember when the FBI and Apple were in a tug-of war to unlock the iPhone of the San Bernardino mass shooter? Not only did Apple refuse to cooperate, but the company also publicly stated that they would no longer help law enforcement unlock any of their devices, putting its customer's privacy first. At some point ...