Volkswagen Golf GTE And Audi3 Sportback e-tron Car Models Vulnerable to Remote Hacking

Hacking vehicles isn't anything new. Over recent years, researchers have demonstrated through proof-of-concept experiments that many popular car models can be hacked by exploiting carefully selected vulnerabilities for a particular system integrated into the vehicle. Just ask Ford, Jeep, Nissan, and Toyota. Some of these vehicles can be remotely turned off; some of them can... Continue Reading →

A Simple Guide to Vulnerability Management

A "vulnerability assessment" discovers what vulnerabilities are present on your organization's infrastructure and classifies them according to their level of criticality. Vulnerability assessments are usually conducted by qualified personnel or Approved Scanning Vendors (ASVs) by means of a vulnerability scanner, such as Nessus, OpenVAS, QualysGuard, Nexpose, and so on. These are special forms of software... Continue Reading →

What is Penetration Testing?

Penetration testers are hired ethical hackers tasked with simulating a real-world attack on an organization's networks and systems. Think of it as an intrusive security assessment that measures the organization's level of resistance to an attack. The great thing about penetration tests are that they test the organization's capabilities to defend against real-world attacks and... Continue Reading →

Your Live Security Camera Footage May Be Broadcasted Online: And You Wouldn’t Know!

Live video feeds of home and commercial surveillance cameras around the globe are being broadcasted live and without permission on a site called Insecam, which is believed to have originated from Russia. Other sites like Shodan and Nestcamdirectory also provide visitors with the ability to look up IP cameras; however, Insecam aggregates these live video streams all into one... Continue Reading →

Session Hijacking Attacks

Today, I'll discuss "Session Hijacking" attacks. But first, we need to understand what a cookie is. What are "Cookies?" A "cookie" is nothing more than a simple text file containing an arbitrary string of characters. When you visit many of your favorite web sites, the web server stores a cookie on your HD, allowing it... Continue Reading →

PenTest Edition: Wi-Fi Testing with Wifite

Wifite is another wireless auditing tool that comes prepackaged in Kali Linux. This is perhaps the easiest tool so far, seeing as it automates the entire process, making it much easier for penetration testers to quickly test the security of wireless networks. You may be wondering if it's okay to display the SSIDs and BSSIDs... Continue Reading →

WordPress.com.

Up ↑