HackDig : Dig high-quality web security articles for hacker

WiNX: The Ultra-Portable Wireless Attacking Platform

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not
Publish At:2017-09-29 02:25 | Read:4470 | Comments:0 | Tags:Pentesting Security Social Engineering Hardware WiFi WiNX Wi

Tips to Stay Secure on Summer Vacations

In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber goons always remain on work. Therefore, here we have listed some essential steps that are must to secure your sensitive information you carry with yourself while
Publish At:2017-07-07 02:35 | Read:3362 | Comments:0 | Tags:Breaking News Security Cybersecurity GPS Hacking Identity Th

RSA Conference 2017 attendees hacked with rogue access points

Experts at Pwnie Express discovered multiple rogue access points on the show floor that were used to hack the RSA conference attendees. The news is very curious, the attendees at the 2017 RSA conference, one of the world’s largest security events, may have been hacked. Security researchers at reports at Pwnie Express were scanning the conference floor
Publish At:2017-02-19 19:45 | Read:3101 | Comments:0 | Tags:Breaking News Hacking EvilAP attack RSA Conference security

The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool wa
Publish At:2015-11-09 04:30 | Read:5037 | Comments:0 | Tags:Breaking News Hacking Infernal-Twin penetration testing Pier

Beware, connected ikettles can leak WiFi passwords

The Pen Test Partners researcher Ken Munro mapped and hacked connected iKettles across London demonstrating they leak WiFi passwords. The Pen Test Partners researcher Ken Munro has conducted a very singular experiment, he mapped and hacked connected kettles across London, demonstrating they leak WiFi passwords. Once again Inte
Publish At:2015-10-19 22:20 | Read:3256 | Comments:0 | Tags:Breaking News Hacking Security iKettles Internet of Things I

Hackers can disable high-tech sniper rifles and change the target

A couple of married researchers demonstrated hot to disable high-tech sniper rifles and change their targets with unpredictable consequences. Hacking, hacking, always hacking … this time we will discuss remote hacking of High-tech Sniper Rifles. Hackers can compromise High-tech Sniper Rifles and causing problems pointin
Publish At:2015-07-31 08:20 | Read:2012 | Comments:0 | Tags:Breaking News Hacking high-tech sniper rifles WIFI

Mythbusters: Is an open (unencrypted) WiFi more dangerous than a WPA2-PSK? Actually, it is not.

IntroductionWhenever security professionals recommend the 5 most important IT security practices to average users, one of the items is usually something like: “Avoid using open Wifi” or “Always use VPN while using open WiFi” or “Avoid sensitive websites (e.g. online banking) while using open WiFI”, etc.What I think about
Publish At:2015-07-23 18:55 | Read:2797 | Comments:0 | Tags:VPN wifi wireless WPA2 WPA2-PSK

Three UK politicians hacked while using open WiFi networks

A team of experts hacked three UK politicians while they were using unsecured WiFi networks to demonstrate the risks they are daily exposed. Public Wi-Fi networks are dangerous places for our digital identity, we have explained several times the risks related to the connections to open WiFi hotspots. Security  experts have exp
Publish At:2015-07-11 17:50 | Read:2536 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking awareness F-Sec

Web Security for the Tech Impaired: Connecting to WiFi

We’ve all been at an airport or coffee shop and checked our phone to see that your internet connection is incredibly slow. You curse the heavens in frustration and then you notice that they offer free WiFi. “What fortuitous circumstances!” you think. You look on your phone for what networks are available around you and you see: Starbucks FREE_Starbucks Publi
Publish At:2015-06-30 18:15 | Read:2253 | Comments:0 | Tags:Technical Insight Vulnerabilities Web Application Security p

9 Ways to Avoid Online Shopping Traps (Just in Time for Mother’s Day)

 So it’s a week or so before Mother’s Day and you’re thinking about what to get for your mom. Buy her a book on Amazon? Send her a bouquet of flowers via an online florist? Buy tickets online for an upcoming show?If you’re like millions of sons and daughters, you’ll probably shop for your mother online this year. It’s a great convenience, that’s true, b
Publish At:2015-04-29 18:40 | Read:3466 | Comments:0 | Tags:Mobile Security Online Privacy Online Safety Uncategorized e

4 Ways to Protect Your Privacy on Public WiFi

Public Wifi is convenient, but is it safe?Internet cafés are so 2014. Today, almost every café worth its coffee beans offers free public WiFi. So do fast food restaurants, bus stops, intercity trains, airports, malls, libraries, hotels, and public toilets. Yes, even public toilets.But the fact that WiFi is public and free doesn’t mean that it’s safe. To the
Publish At:2015-04-16 19:35 | Read:3474 | Comments:0 | Tags:Mobile Security Online Privacy identity theft man in the mid

How to Detect and Attack Evil Twin WiFi Access Points

The evil twin is not just a schlocky plot device for TV crime shows and absurd soap operas, it’s also a threat to your company’s data.It’s relatively easy for a criminal to set up an evil twin rogue wireless access point that mimics one that your users and visitors connect to, whether on your premises or in a public place, with the intentio
Publish At:2015-04-03 00:25 | Read:3106 | Comments:0 | Tags:Cyber Security IT Security and Data Protection access point

Marriott Agrees to Stop Blocking Guest WiFi Devices

Marriott, which last year paid a $600,000 fine for blocking customers’ WiFi devices in its hotels, has said that it no longer will prevent guests from using personal hotspots or similar devices.The situation resulted from a complaint by a guest who stayed at Marriott’s Gaylord Opryland hotel in 2013 and found that he couldn’t use a personal
Publish At:2015-01-15 13:30 | Read:2587 | Comments:0 | Tags:Government Mobile Security Privacy Web Security government M

WiFiPhisher- Fast automated phishing attacks against WiFi networks

Usual scenario for compromising a system starts with a phishing attack. this allows to run a targeted attack against the user and it is always adapted to specific user. If you need to implement a phishing attack in wifi network you can use WiFiPhisher. This is a security tool for rapid implementation of phishing attacks on the network to steal passphrase wi
Publish At:2015-01-11 18:55 | Read:3550 | Comments:0 | Tags:Pentesting Social engineering Awareness open source Phishing

Wifiphisher – Automated phishing attacks against Wifi networks

A Greek security researcher has developed WiFiPhisher, a Wi-Fi social engineering tool that is designed to steal credentials from users of WPA networks. The Greek security expert George Chatzisofroniou has developed WiFiPhisher, a WiFi social engineering tool that allows an attacker to steal credentials from users of secure
Publish At:2015-01-06 13:00 | Read:4246 | Comments:0 | Tags:Hacking Kali man-in-the-middle Social Engineering WIFI WifiP

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud