Decrypting HTTPS Traffic

Hypertext Transfer Protocol over SSL (https)  is pretty decent security. This is because https uses the Secure Sockets Layer (SSL) encryption scheme to pass keys between two parties over the Internet. These days, however, most of our Web servers are utilizing Transport Layer Security (TLS 1.2), which is an updated version of SSL 3.0. Therefore, ...

How Does HTTPS Work? The TLS Handshake Explained

http is inherently vulnerable to MitM attacks because client-server communication is transmitted in plaintext over the Internet. This makes http sessions vulnerable to MitM, Session Hijacking, and other dangerous attacks. To remediate this vulnerability, security researchers created https, which stands for Hypertext Transfer Protocol over SSL encryption. Note: Since 2008, we've been using TLS 1.2, ...

What is the DARK WEB? How to Access It

Introduction: Ever wonder what lurks on the Dark Web? Hear any scary stories about contract killings? Weapons trading? Sex trafficking? Red rooms? These are all very real (with the exception of "red rooms." They are, by and large, more of a myth). At the surface, we have the Internet or the World Wide Web (WWW). ...

Hello, You might be wondering what's going on. If you are here, you've likely fallen for a phishing email. Did it look real? If you found this page by navigating my Web site, there is nothing here for you.

Spear Phishing Attacks on Open Wi-Fi: See How It’s Done [Tutorial]

Would you like to know how easy it is for your information to be stolen over Open Wi-Fi? Joe Smith (very original name) and his friends are socializing at their local coffee shop when they remember that their friend's birthday is this weekend. Their friend's name is Sarah, and Sarah LOVES hibachi. So, Joe uses ...