Category: Hacking

Breaking HTTPS with a Proxy

I have previously discussed other ways to decrpyt HTTPS traffic, such as sslstrip and key logging, but let's discuss another way. When you link to a Web site, you're hopefully using HTTPS and not HTTP. Our Web traffic used to be encrypted using Netscape's "Secure Sockets Layer version 3 (SSLv3)"; however, due to some inherent ...

PenTest Edition: Active Reconnaissance and Port Scanning Using Nmap

Nmap, or "Network Mapper," is a network discovery, analysis, and auditing tool utilized by both network defenders and network attackers. As an exceedingly flexible tool with dozens of methods for mapping out networks, Nmap has become a critically acclaimed and well-supported cyber tool. Using Nmap, we can perform network sweeps to discover available hosts on ...

A Single Text Character From The Telugu Language Can Crash Any Apple Device

An Italian researcher has recently discovered a text bug that can crash any Apple iPhone, iPad, or Mac. A single character from the Telugu language, which is a language native to India, will crash the device when sent via the iOS messaging app, What’s app, Facebook Messenger, Gmail, or even in the iOS Notes The ...

The Ping of Death

The "Ping of Death" abuses the "Internet Control Message Protocol," which we rely on for troubleshooting and reporting utilities on our network, such as the "Ping" command. Network folks usually "ping" another host or system, either on the local network or on the Internet, to test its reachability. For example, you could ping a Web ...

PenTest Edition: My Favorite Wi-Fi Assessment Tools – 2018

Penetration testing and security analysis is an integral aspect of cybersecurity. The ability to master some of these tools is certainly indispensable. Penetration testers and other cybersecurity professionals use these tools everyday to examine the security posture of their networks. All of these tools are free to download; however, whether you can use them or ...