Mobile penetration testing is like a security check for your phone and apps. It helps find and fix any weak points that … [Read More...]
Featured Articles
Phishing on social media
We've talked about phishing quite a bit in previous HackingLoops posts. Still, when most people they think of phishing, … [Read More...]
Social engineering for red teamers
When you think of hacking, what picture comes to mind? For me, it's a young guy in a hoodie, typing commands into a … [Read More...]
Editorial Picks
Remote Code Execution
We create our own sample server application and explain how to use Remote Code Execution RCE. Remote Code Execution is … [Read More...]
Python DDoS Scripting
How to DDoS with Python. We setup a sever with vulnerability and create an exploit that we will script together. We … [Read More...]
Cryptojacking: a hands-on guide for pentesters
Because attackers continuously devise new schemes for monetizing hacked machines, cryptojacking has emerged as one of … [Read More...]
Latest Blog Updates
Setting up your own personal VPN
A VPN lets you access the internet from a network other than your local one. If you've watched Youtube, you've doubtless seen ads urging you to pay for a commercial VPN to bypass censorship, improve your privacy, and facilitate torrents, along with a myriad of other benefits. Such ads dramatically overemphasize the privacy benefits of a VPN. Especially when you compare these benefits to the much greater value provided by a personal VPN (more on that later). In practice, the main benefits are these: Obtain a different IP address.Hide traffic from your ISP.Have a consistent IP address. That last one is … [Read More...]
Popular pentesting tools: what they do and how to use them
Pentesting is a huge field, and security audits often require massive investments of time and effort. Performing a complete security audit would be impossible to do competently if it weren't for the many tools that offensive security teams rely on to do their work. Popular pentesting tools automate entire swaths of work, such as password cracking, networking mapping, phishing simulations, and much more. Imagine if you had to write software to do all of those tasks, everytime you needed to begin a new security audit? In this article, we'll introduce a cast of powerful tools to help you on your hacking journey. … [Read More...]
Networking basics for hackers
If you want to learn hacking, there's no way around it: you need to learn networking. Maybe you needn't master the ins-and-outs, but you at least need to grasp the basics and have a working understanding. Why? Because machines talk to each other through networks. Most hackers exploit machines remotely, so you need to traverse a network to reach your target. Once you pwn a box, you'll find other machines it has access to via the network. Networking often scares new hackers. It seems like a complex topic that takes too much time to master. For that reason, we made this guide to networking for hackers. As a … [Read More...]
APK Static Analysis
Hello everyone, we have already set up the lab environment. In this article, we will discuss about the static analysis of the android APK. What is an APK? Before diving into the security stuff of the application, we need to understand the APK. Android Package Kit (APK) is the most common package file format used to distribute and install apps on Android devices. The APK contains everything that is necessary for the application to run. Some of the common contents in APK are: AndroidManifest.xml file describes the name, version, access rights, activities, and other useful information about the … [Read More...]
Linux server hardening for beginners
Linux controls 97% of the server market. As such, any budding hacker ought to know the basic defenses of a modern Linux server. For that reason, we prepared this guide as an intro to basic methods for Linux server hardening. And since the best way to learn is by doing, we'll walk you through setting up these defenses one command at a time. Linux security is a deep rabbit hole with plenty of nooks and crannies to explore. But you'll never become a master unless you take the first steps and start playing around with the many parts of this complex system. So open up your Linux command line and follow along, as … [Read More...]