Skip to content

Security_Guy

Internet Security Research & info sec news

  • Security Alerts
  • News Feed
  • PoC’s
  • E-Learning

The 15 Most Popular Talks from DEFCON’s Hacking Conferences

August 2, 2019 by Hoid
Hoid
Every summer for the last 26 years, hoards of hackers have descended on the Las Vegas Strip for DEFCON, the biggest hacker conference in the US. There's a wealth of talks every season (DEFCON 27 has at least 95 scheduled), and there have been some essential topics to learn from…
Continue Reading

Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small

July 12, 2019 by Hoid
Hoid
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilities, there are other options available. For those unfamiliar,…
Continue Reading

How to Hack Together a YouTube Playing Botnet Using Chromecasts

May 30, 2019 by Hoid
Hoid
Imagine being able to play a video instantly on hundreds of thousands of devices across the globe. It's totally possible, as long as all of those devices have a Chromecast plugged in. When Chromecasts are left exposed to the internet, hackers can use add them to a botnet that can…
Continue Reading

Buyer’s Guide: Top 20 Hacker Holiday Gifts of 2018

November 20, 2018 by Hoid
Hoid
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or…
Continue Reading

How Hackers Use Hidden Data on Airline Boarding Passes to Hack Flights

January 5, 2018 by Hoid
Hoid
Millions of travelers pass through airports each day without understanding how powerful and insecure a boarding pass can be. Anyone can scan the boarding pass barcode with a mobile app, allowing access to frequent-flyer accounts and even a passenger's temporary airline account. In this guide, we will explore how hackers…
Continue Reading

How to Use the Chrome Browser Secure Shell App to SSH into Remote Devices

January 5, 2018 by Hoid
Hoid
Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by…
Continue Reading

How to Enable the New Native SSH Client on Windows 10

January 4, 2018 by Hoid
Hoid
For years, PuTTy has reigned supreme as the way to establish a Secure Shell (SSH) connection. However, those days are numbered with the addition of the OpenSSH server and client in the Windows 10 Fall Creators Update, which brings Windows up to par with macOS and Linux's ability to use…
Continue Reading

How to Create a Native SSH Server on Your Windows 10 System

January 2, 2018 by Hoid
Hoid
With the addition of the OpenSSH client and server in the Windows 10 Fall Creators Update, you no longer have to rely on third-party programs to open an SSH server and connect to a Windows machine. While still a beta feature, this represents a long-overdue update fulfilling a promise made…
Continue Reading

Buyer’s Guide: Top 20 Hacker Holiday Gifts for Christmas 2017

November 29, 2017 by Hoid
Hoid
Hackers can be notoriously difficult to buy gifts for, so we've curated a list of the top 20 most popular items Null Byte readers are buying during their ethical-hacking studies. Whether you're buying a gift for a friend or have been dying to share this list with someone shopping for…
Continue Reading

How to Find a Politician’s Private Phone Number Using Facebook

November 21, 2017 by Hoid
Hoid
Facebook really wants your phone number, nagging to you connect one as soon as you join. This isn't all bad, since it can be useful in securing your account with two-factor authentication. On the flipside, this makes it easy to reveal the private phone numbers of virtually anyone on Facebook,…
Continue Reading

How to Find Anyone’s Private Phone Number Using Facebook

November 21, 2017 by Hoid
Hoid
Facebook really wants your phone number, nagging you for one as soon as you join. This isn't all bad since it can help secure your account with two-factor authentication. On the flipside, this makes it easy to reveal the private phone numbers of virtually anyone on Facebook, including celebrities and…
Continue Reading

How to Gain Complete Control of Any Android Phone with the AhMyth RAT

November 10, 2017 by Hoid
Hoid
There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration (RAT) tool. Today, we will learn how to download and use AhMyth, an open source Android RAT that uses a simple GUI interface. With it, we'll…
Continue Reading

How to Hide DDE Based Attacks in MS Word

November 2, 2017 by Hoid
Hoid
In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a MS Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I…
Continue Reading

How to Exploit DDE in Microsoft Office & Defend Against DDE Based Attacks

October 27, 2017 by Hoid
Hoid
In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one-time or continuously between applications, we…
Continue Reading

How to Detect BlueBorne Vulnerable Devices & What It Means

October 13, 2017 by Hoid
Hoid
Armis Labs has revealed eight vulnerabilities, called "BlueBorne", which put 5.3 billion Android, iOS, Windows, and Linux devices that use Bluetooth at risk. With it, hackers can control devices, access data, and spread malware to other vulnerable devices through networks. In this post, we will learn about the vulnerabilities, then…
Continue Reading

Recent Posts

  • DuckDuckGo passes 100M daily search queries for the first time in 12 years
  • Banning Parler Was Like Banning Hate Speech or Pornography (See Common)
  • After a decade, NASA’s big rocket fails its first real test
  • What motivates the motivated reasoning of pro-Trump conspiracists?
  • WhatsApp Delays Controversial ‘Data-Sharing’ Privacy Policy Update By 3 Months

Recent Comments

    Archives

    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • July 2014
    • June 2014
    • May 2014
    • April 2014
    • March 2014
    • February 2014
    • January 2014
    • December 2013
    • November 2013
    • October 2013
    • June 2013
    • May 2013
    • April 2013
    • March 2013
    • January 2013
    • December 2012
    • November 2012
    • October 2012
    • September 2012
    • July 2012
    • December 2011
    • September 2011
    • July 2011
    • April 2011
    • March 2011
    • June 2010
    • March 2010
    • February 2010
    • January 2010
    • December 2009
    • November 2009
    • October 2009
    • September 2009
    • August 2009
    1 2 Next »
    Copyright 2016 - S3cur1ty_Guy Gmbh
    • Security Alerts
    • News Feed
    • PoC’s
    • E-Learning

    Design by Smartcat