Mobile penetration testing is like a security check for your phone and apps. It helps find and fix any weak points that … [Read More...]
Featured Articles
Phishing on social media
We've talked about phishing quite a bit in previous HackingLoops posts. Still, when most people they think of phishing, … [Read More...]
Social engineering for red teamers
When you think of hacking, what picture comes to mind? For me, it's a young guy in a hoodie, typing commands into a … [Read More...]
Editorial Picks
How Hackers Steal PGP Keys
Learn how hackers steal your PGP keys. What may seem secure is not always so and hackers stealing PGP keys happens all … [Read More...]
Automate Your Own CTF Solution
Learn how to code your own solution to CTF (Capture The Flag) exercises. After you manually solve a part of the capture … [Read More...]
How To Create A Social Media Keylogger
Learn how to create your own social media keylogger and by extension how to defend yourself from this kind of invasion … [Read More...]
Latest Blog Updates
Mobile Application Penetration Testing Basics
Mobile penetration testing is like a security check for your phone and apps. It helps find and fix any weak points that hackers could use. This is important because as we use smartphones more, we want to make sure our personal information is safe. The testing looks for problems, like where data is stored or how it's protected, and helps fix them before bad guys can take advantage. Doing these checks regularly is like keeping our phones' security up-to-date to stay safe from online threats. Let's discuss the steps involved in penetration testing of mobile applications Extracting application details and … [Read More...]
Phishing on social media
We've talked about phishing quite a bit in previous HackingLoops posts. Still, when most people they think of phishing, think of an image from the distant past. Even in the infosec world, the word "phishing" evokes Nigerian prince scams offering millions of dollars to gullible email recipients. While these threats still exist, the phishing world has advanced quite a bit since those days. In particular, phishing on social media now represents the main attack vector for this genre of attacks. In this article, we'll give you a sample of what modern phishing looks like on Twitter. Hands-on learning matters much … [Read More...]
Social engineering for red teamers
When you think of hacking, what picture comes to mind? For me, it's a young guy in a hoodie, typing commands into a green and black terminal. Of course, this Hollywood hallucination couldn't be farther from reality. So what does a hacker really do? If you look up guides to hacking, you'll likely find hundreds of articles about exploits, programming languages, networking, crypto, and so on. But there's one link in the tech stack that will always be vulnerable: the human mind. That's why social engineering for red teamers is indispensable. Pentesting a company is hard. Thus, knowing how to get what you want from … [Read More...]
Detect attacks on Linux servers
Even if you harden your server to the most paranoid level, it's always possible that an attacker may sneak past your defenses. Then what? That's where IDS (intrusion detection systems) enter the picture. An IDS watches your logs and alerts you if any suspicious entries appear, making it much easier to detect attacks on Linux. Most IDS software watches the logs of a single host, or an entire network. In this article, we'll create our own simple solution for watching logs from scratch. Still, we'll link you to major solutions in case you want to play with established tools. Once we're set up, we'll simulate an … [Read More...]
Setting up your own personal VPN
A VPN lets you access the internet from a network other than your local one. If you've watched Youtube, you've doubtless seen ads urging you to pay for a commercial VPN to bypass censorship, improve your privacy, and facilitate torrents, along with a myriad of other benefits. Such ads dramatically overemphasize the privacy benefits of a VPN. Especially when you compare these benefits to the much greater value provided by a personal VPN (more on that later). In practice, the main benefits are these: Obtain a different IP address.Hide traffic from your ISP.Have a consistent IP address. That last one is … [Read More...]