Few users really understand just how much secret data is hiding in their web browsers. Think about it, when you login to … [Read More...]
Featured Articles
Mobile Application Penetration Testing Basics
Mobile penetration testing is like a security check for your phone and apps. It helps find and fix any weak points that … [Read More...]
Phishing on social media
We've talked about phishing quite a bit in previous HackingLoops posts. Still, when most people they think of phishing, … [Read More...]
Editorial Picks
Remote Code Execution
We create our own sample server application and explain how to use Remote Code Execution RCE. Remote Code Execution is … [Read More...]
Python DDoS Scripting
How to DDoS with Python. We setup a sever with vulnerability and create an exploit that we will script together. We … [Read More...]
Cryptojacking: a hands-on guide for pentesters
Because attackers continuously devise new schemes for monetizing hacked machines, cryptojacking has emerged as one of … [Read More...]
Latest Blog Updates
Detect attacks on Linux servers
Even if you harden your server to the most paranoid level, it's always possible that an attacker may sneak past your defenses. Then what? That's where IDS (intrusion detection systems) enter the picture. An IDS watches your logs and alerts you if any suspicious entries appear, making it much easier to detect attacks on Linux. Most IDS software watches the logs of a single host, or an entire network. In this article, we'll create our own simple solution for watching logs from scratch. Still, we'll link you to major solutions in case you want to play with established tools. Once we're set up, we'll simulate an … [Read More...]
Setting up your own personal VPN
A VPN lets you access the internet from a network other than your local one. If you've watched Youtube, you've doubtless seen ads urging you to pay for a commercial VPN to bypass censorship, improve your privacy, and facilitate torrents, along with a myriad of other benefits. Such ads dramatically overemphasize the privacy benefits of a VPN. Especially when you compare these benefits to the much greater value provided by a personal VPN (more on that later). In practice, the main benefits are these: Obtain a different IP address.Hide traffic from your ISP.Have a consistent IP address. That last one is … [Read More...]
Popular pentesting tools: what they do and how to use them
Pentesting is a huge field, and security audits often require massive investments of time and effort. Performing a complete security audit would be impossible to do competently if it weren't for the many tools that offensive security teams rely on to do their work. Popular pentesting tools automate entire swaths of work, such as password cracking, networking mapping, phishing simulations, and much more. Imagine if you had to write software to do all of those tasks, everytime you needed to begin a new security audit? In this article, we'll introduce a cast of powerful tools to help you on your hacking journey. … [Read More...]
Networking basics for hackers
If you want to learn hacking, there's no way around it: you need to learn networking. Maybe you needn't master the ins-and-outs, but you at least need to grasp the basics and have a working understanding. Why? Because machines talk to each other through networks. Most hackers exploit machines remotely, so you need to traverse a network to reach your target. Once you pwn a box, you'll find other machines it has access to via the network. Networking often scares new hackers. It seems like a complex topic that takes too much time to master. For that reason, we made this guide to networking for hackers. As a … [Read More...]
APK Static Analysis
Hello everyone, we have already set up the lab environment. In this article, we will discuss about the static analysis of the android APK. What is an APK? Before diving into the security stuff of the application, we need to understand the APK. Android Package Kit (APK) is the most common package file format used to distribute and install apps on Android devices. The APK contains everything that is necessary for the application to run. Some of the common contents in APK are: AndroidManifest.xml file describes the name, version, access rights, activities, and other useful information about the … [Read More...]