HackDig : Dig high-quality web security articles for hacker

Should you ditch charging cables?

The latest Android and Apple smartphones all offer a new technology called ‘inductive charging’. You simply place the phone on a compatible ‘pad’ and the battery recharges wirelessly. Obviously this is great news for those of us who regularly lose our charging cables, or struggle to insert the plug correctly. But is inductive charging as useful as the manufa
Publish At:2019-09-23 10:35 | Read:525 | Comments:0 | Tags:Mobile News Technology Charging cybersecurity smartphones Wi

WiNX: The Ultra-Portable Wireless Attacking Platform

When you are performing penetration tests for your customers, you need to build your personal arsenal. Tools, pieces of hardware and software are collected here and there depending on your engagements to increase your toolbox. To perform Wireless intrusion tests, I’m a big fan of the WiFi Pineapple. I’ve one for years (model MK5). It’s not
Publish At:2017-09-29 02:25 | Read:4999 | Comments:0 | Tags:Pentesting Security Social Engineering Hardware WiFi WiNX Wi

Breaching Physical Security and Causing Mayhem with Wireless Signals

Wireless technology is fast replacing wired technology in most industry sectors where some form of communication between devices is required. The recent surge in Internet Of Things (IoT) devices has also pushed wireless communication to be implemented on more devices than ever before.Benefits such as ease of setup, flexibility in device placement, and improv
Publish At:2017-03-08 04:10 | Read:4032 | Comments:0 | Tags:Off Topic security Wired wireless

Remotely Disabling a Wireless Burglar Alarm

By Andrew Zonenberg @azonenbergCountless movies feature hackers remotely turning offsecurity systems in order to infiltrate buildings without being noticed. Buthow realistic are these depictions? Time to find out.Today we’re releasing information on a critical securityvulnerability in a wireless home security system from SimpliSafe. This system consis
Publish At:2016-11-19 20:15 | Read:5018 | Comments:0 | Tags:0-day 0day alarm Andrew Zonenberg burglar cyber attack hacki

The Infernal-Twin tool, easy hacking wireless networks

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool wa
Publish At:2015-11-09 04:30 | Read:5510 | Comments:0 | Tags:Breaking News Hacking Infernal-Twin penetration testing Pier

Mythbusters: Is an open (unencrypted) WiFi more dangerous than a WPA2-PSK? Actually, it is not.

IntroductionWhenever security professionals recommend the 5 most important IT security practices to average users, one of the items is usually something like: “Avoid using open Wifi” or “Always use VPN while using open WiFi” or “Avoid sensitive websites (e.g. online banking) while using open WiFI”, etc.What I think about
Publish At:2015-07-23 18:55 | Read:3160 | Comments:0 | Tags:VPN wifi wireless WPA2 WPA2-PSK

CONNECTED CARS: Which are risks for automated vehicles?

Findings reveal that there is a clear lack of appropriate security measures to protect drivers of a connected car against hackers. “Findings reveal that there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to collect
Publish At:2015-03-22 17:40 | Read:4523 | Comments:0 | Tags:Breaking News Hacking Security Car hacking connected car IoT

hostapd-wpe: Now with More Pwnage!

By Brad Antoniewicz.A major component of hacking IEEE 802.11 wireless networks is targeting the client's system. This is because of the trusting nature of wireless and corporate systems can be tricky to configure correctly. But don't forget that the same client-side attacks against 802.11 wireless networks can be used on wired networks with port security wh
Publish At:2014-09-17 02:40 | Read:6356 | Comments:0 | Tags:network penetration testing penetration testing wireless wir

Using WPS on your Wi-Fi router may be even more dangerous than you think

A Swiss security researcher has found yet more problems with Wi-Fi Protected Setup (WPS), a system built into many wireless routers to make it easier for you help guests and visitors to get online.The idea of WPS is to provide a controlled way for someone whom you trust to connect to your Wi-Fi network by typing in just an 8-digit PIN instead of your full wi
Publish At:2014-09-02 20:30 | Read:3467 | Comments:0 | Tags:Cryptography Featured Vulnerability cracking password PIN Wi

802.11 Recommended USB Wireless Cards for Kali Linux

802.11 Recommended USB Wireless Cards for Kali Linux This post lists some of the best performing, supported and recommended USB Wireless Cards for Kali Linux.There isn’t a “best” card. There is whatever is right for YOU.Following recommended USB Wireless cards appears to be working for Kali Linux (i.e. monitor, injec
Publish At:2014-08-12 19:39 | Read:9289 | Comments:0 | Tags:Kali Linux Linux Security Wifi Linux Laptop Recommended Wire

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud