From China, With Love
Lest anyone think that D-Link is the only vendor who puts backdoors in their products, here’s one that can be exploited with a single ...
Burp SessionAuth Extension
Overview Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session ...
Android Hack-Tool Steals PC Info
Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an ...

The most sophisticated Android Trojan
Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were en...

Cracking Credit Card Hashes with PowerShell
As penetration testers, we are frequently engaged to do penetration tests for PCI compliance. As a part of these penetration tests, w...

Stupid Little IPv6 Tricks
With the IPv6 Summit on Friday, various IPv6 related topics are of course on my mind. So I figured to put together a quick laundry list o...

Steps Toward Weaponizing the Android Platform
The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if Ken Thompson or Dennis Ritch...
Flexible Home Layout
Downloads[two]
Media[left]
Books[right]
Photos[carousel](6)
Accessories[combine]
Zebronics
Advertisements

Popular Posts
-
IPB (Invision Power Board) all versions (1.x? / 2.x / 3.x) Admin account Takeover leading to code execution Written on : 2013/05/...
-
Warning! If you want to learn about using Aircrack-ng, Linux, network and so on do not use this tutorial. If you just want to crack a WEP ...
-
After this tutorial you will be able to Make and Use a keylogger that is close to fully undetectable, without the victim getting suspiciou...
-
10-year-old hacker CyFi discovered her first zero-day exploit earlier this year, and presented her findings at the first DefCon Kids at Def...
-
Hello and welcome to my tutorial about wireless networking. Today I'll be teaching you how easy it is to obtain access to a wireless pr...
-
[Laurent Gaffi?] has discovered an exploit that effects Windows Vista, Windows 7, and possibly Windows Server 2008 (unconfirmed). This meth...
-
Expansion of Moon bases Building on the success of the Helium-3 extraction programmes, a whole series of bases are appearing on the Moon. Ot...
-
Hello friends, today i will explain you how to get IP address of any computer remotely. Using some very basic tricks we can find the IP addr...
-
Little bit old.....but still working good Mega Share 500 in 1 / Hacking Tools Trojan Horses - Yuri RAT v1.2 - MofoTro v1.7 BETA -...
-
Intercepting keystrokes Hooking Key Events There are different ways to catch the keys as they are being typed, but one of the most efficien...