We've all been there - you want to level up your hacking repertoire, but there are hundreds of exciting new programming … [Read More...]
Featured Articles
Urbit for hackers
Urbit is a mysterious networking technology that's had the techie underground conflicted for decades. Is Urbit the … [Read More...]
Linux malware: beginner’s guide to avoiding detection
All too often, Linux users indulge in the fantasy that using Linux makes you immune to malware. The fact is, the safety … [Read More...]
Editorial Picks
Latest Blog Updates
Hacking Urbit apps
Urbit is a peer-to-peer computing platform that reimagines the idea of an operating system from the ground up. Hacking Urbit apps is also very, very fun. I want to show you why Urbit is a really interesting hacker playground by just picking an Urbit app and finding a bug in it. Just be careful, once you fall into this rabbithole you won't want to climb back out into the normal old internet. Let's go! What even is Urbit? Simply, it's a virtual machine that can communicate directly with other Urbit VM's with full end-to-end encryption. It accomplishes this with a bunch of mindblowing ideas that you can … [Read More...]
Introduction to JPEG and PNG steganalysis
Stegonagraphy is the art of hiding information in plain sight. Unlike crypto, which hides data by protecting it with math so only the intended reader can read it, stego hides data by making it appear as though you are not hiding anything at all. Steganalysis is the art of detecting and breaking steganography. In this article, we'll focus on JPEG and PNG steganalysis specifically. To demonstrate how this works concretely - imagine a young person wants to share a file that contains a graphic video game with their friend. However, their parents read all of their emails, and they don't want their parents to see … [Read More...]
Android Pentesting Lab Setup
In this article, we will go through the Android Pentesting Lab Setup. We will install the tools that will make Android Pentest easier for you. We will be setting up the following tools: Android StudioAndroid Emulator (from Android Studio OR Nox)Jadx GUIMobSFadb (Android Debug Bridge)fridaBurp with Emulator Android Lab Setup Installing Android Studio We must have a way to examine, build, debug, and run the Android application. You will need to install Android Studio IDE, which you can download here. Installation is pretty simple and straightforward and you need to click Next throughout the … [Read More...]
How Hackers Steal PGP Keys
Learn how hackers steal your PGP keys. What may seem secure is not always so and hackers stealing PGP keys happens all the time. We are here to show you exactly how they get that done. … [Read More...]
Shell via Buffer Overflow
This is the last article in the Buffer Overflow series. This article will cover finding the right module and then finally, we will generate shellcode to gain shell via a buffer overflow. Recap So far we have gone through the following Buffer Overflow steps SpikingFuzzingFinding the OffsetOverwriting the EIPFinding Bad Characters Having performed these steps, we have the following information from each of the above steps TRUN is the vulnerable command (Spiking)The program crashes at around 20500 bytes (Fuzzing)We have an exact match at the offset 2003 for controlling EIP (Finding the Offset)We are … [Read More...]