Home » Articles

Articles

μProxy – A Hardware Relay Solution for Protecting Geolocation Anonymity of Internet Users

Anonymity and privacy of internet users have attracted considerable attention during the past few years. A pivotal privacy issue is that a user’s geographical location can be pinpointed, if his/her IP address has been detected, giving the attacker a relatively precise real-time location. In most cases, this information is adequate for an attacker, to close in and eventually determine the ... Read More »

Installing VMware Player in Linux (Tutorial)

In this article, I will be showing you how to install the latest version of Vmware Player on a Linux Distro. For the tutorial I will be using Ubuntu, in particular Ubuntu Mate. I choose Vmware Player over Oracles Virtual Box, due to a number of reasons including simplicity and performance. Navigate to the official Vmware website which currently is ... Read More »

The Art Of Google Hacking

When it comes to Google, everyone feels confident in knowing what we’re talking about. Google is that nice site that allows us to search whatever we want on the web. More technically, it’s a search engine, something that knows our preferences, our tastes and even (sometimes) our secrets. Google is easy, isn’t it? It appears as a blank page with ... Read More »

An Overview of Modern Tor Deanonymization Attacks

Tor was designed to provide a decentralized, censorship resistant network that can offer internet users, websites and various web services anonymity via easy-to-implement means. Nevertheless, since the advent of Tor, some users have failed to maintain their anonymity. Throughout this article, we will discuss Tor’s deanonymization techniques that are available today. We will go through traffic and timing correlation attacks, ... Read More »

How Hackers Avoid Honeypots

  Honeypots are networks, servers or web applications purposely built to appear vulnerable, thus showing obsolete operating systems and software, open services and ports, in order to attract malign visitors and induce them to try exploiting the system. While in a preceding tutorial I explained how to build your own honeypot, here I will explain how hackers try to avoid ... Read More »

Tutorial – How To Host Your Own DNS Website Domain On Ethereum’s Blockchain

You can now host DNS domains on Ethereum’s blockchain through ENS, which is short for Ethereum Name Service, a distributed, extensible domain naming system that relies on Ethereum’s blockchain. This is possible via adjusting the domain name server settings to point to gateway DNS servers, which resolve lookups through checking an ENS registry that points to resolvers including the zone ... Read More »

How To Setup Your Own Pentest Lab

Are you an aspiring penetration tester, or a wannabe hacker? You started from the basics, querying google with a few simple words: hacking, hacker, how to be a hacker…then you found a lot of stupid tutorials that taught you how to hack your neighbour’s wpa with a network adapter called alfa awus036h (but didn’t work, did it ?) and finally ... Read More »

Introduction to Bitcoin Transaction Accelerators

As we watch Bitcoin blockchain scaling issues popup, their weight can be felt by users. The waiting list for BTC transaction sometime grows beyond control, causing users either to pay a large fee or to content with delayed transactions. Some Bitcoin service providers, however, offer Bitcoin transaction accelerator services intended to help clear the pending Bitcoin transactions and make them ... Read More »

port_scan_monitor_sc.gif

Examining Port Scan Attacks Via Data From Darknets

Port scanning is a preliminary approach that is most commonly used by hackers in order to determine vulnerable hosts that they can attack successfully. Scanning is a fully automated process that is utilized by hackers to detect machines, servers and peripherals that exist on a given network. A successful scan can yield details of machines discovered on the scanned network ... Read More »

How To Setup Your Own Honeypot?

A honeypot is a system designed to appear vulnerable to attackers. The goal of a honeypot is to log all the attackers’ activities to study their behaviour, log their Ips, track their location, collect zero-days. The idea of “honeypot” is nothing but a server that offers any kind of services to the attacker, from SSH to telnet, showing several well ... Read More »

A Novel Hybrid Web Crawler For Searching Both The Surface and Deep Web

  The spread of terrorism over the globe has led to an increase in the efforts of law enforcement agencies (LEAs) along the rough path of discovering information related to terrorist activities via taking advantage of the most recent innovations in the web search sector. Their efforts have been centered upon the “surface web” which represents parts of the internet ... Read More »

Targeting Adversaries & Deanonymization Attacks Against Tor Users

  Tor is a P2P network for promoting traffic security of various forms of internet communications for millions of users worldwide. In most cases, Tor users are very unlikely to become the target of an adversary, as they are namely shielded via Tor against opportunistic local hackers, local censorship authorities and hostile destinations. Deanonymizing adversaries act through attempting to attack ... Read More »

The Ghost Telephonist Allows Hackers to Make Calls and Texts from Your Phone Number

Chinese researchers unveiled a new mobile phone hacking technique they have created during a talk at this year’s Black Hat hacker conference in Las Vegas, Nevada. The researchers are from Qihoo 360’s Unicorn Team. The Unicorn Team specializes in hacking radio and cellular technology. On Thursday, July 27th, the Unicorn Team delivered a presentation at Black Hat on their new ... Read More »

Top Exploits and Hacks Debuted at Black Hat and DEFCON This Year

Every July hackers from around the globe descend on Las Vegas, Nevada for a week of hacker conferences which includes Black Hat USA, DEFCON, and BSides Las Vegas. The annual week of hacker conferences brings security researchers who present their latest findings on computer vulnerabilities and exploits. 2017 marked the 25th DEFCON, which has been held in Las Vegas every ... Read More »

Malicious Websites Explained

Surfing the web you will have heard about the existence of malicious websites. Virustotal is a well known website that helps you to discover which site is malicious and which is not before actually requesting the suspected URL in your browser. But what does it mean that a website is classified as “malicious”? What actions do these sites perform and ... Read More »