Essential Linux Commands for Hackers: 10 Practical Tips

Essential Linux Commands for Hackers: 10 Practical Tips

During penetration testing, the Linux command line is like a Swiss Army knife: compact yet powerful. Today, we will discuss ten particularly useful Linux commands that can make a hacker’s work more efficient and open the eyes of network security enthusiasts. Explore System Information: uname -a Want to know about your target machine? uname -a … Read more

DIY Guide: Build Your Own Wireless Penetration Testing Box

DIY Guide: Build Your Own Wireless Penetration Testing Box

The tools and techniques introduced in this article have a certain level of aggressiveness. Please use them responsibly and legally. Do you want to have your own mobile wireless penetration testing box? If you are interested, the devices introduced below will be very helpful. This box is called the “MiTM (Man-in-the-Middle) WiFi Box”. Using this … Read more

BlueBunny: Command Control C2 Framework Based on BLE

BlueBunny: Command Control C2 Framework Based on BLE

About BlueBunny BlueBunny is a powerful command control framework that enables data communication based on Low Energy Bluetooth, allowing researchers to send control commands directly to the Bash Bunny via Bluetooth. What is Bash Bunny Bash Bunny is a multifunctional USB attack tool similar to USB Rubber Ducky (claimed to be the world’s most advanced … Read more

General Penetration Testing Approaches for AES+SM4 Encryption

General Penetration Testing Approaches for AES+SM4 Encryption

General Penetration Testing Approaches for AES+SM4 Encryption Article originally published on: Zgao’s blog In a recent penetration testing project, the website’s traffic utilized the AES+SM4 dual-layer encryption algorithm for secure transmission. When encountering a website with encrypted transmission, it is usually impossible to perform vulnerability scanning. Manual testing is inefficient, hence the exploration of general … Read more

The Art of Chain Attacks in Internal Network Penetration

The Art of Chain Attacks in Internal Network Penetration

The Art of Chain Attacks in Internal Network Penetration This article is based on a simulated practical environment assessment conducted by Master Z for his apprentice 007, aimed at evaluating his thought process and capabilities in penetrating entry-level environments. The content is derived from 007’s retelling and records the entire chain attack path he took … Read more

ESP32 WiFi Penetration Testing Tool Tutorial

ESP32 WiFi Penetration Testing Tool Tutorial

DJI drones, Fluke multimeters, Xiaomi phones, Huawei watches, and more await you! 👆 The breadboard community DIY event is ongoing! (1) Introduction Recently, while learning about the ESP32, I came across a project on GitHub called the ESP32 Wi-Fi Penetration Tool. This tool reminded me of the WiFi killer I used to play with on … Read more

Automotive Security Testing Checklist

Automotive Security Testing Checklist

Is it really possible for hackers to remotely control all cars’ autonomous driving systems and connected vehicle terminals as depicted in “Fast and Furious”? With the commercialization of 5G technology and the continuous advancement of intelligent and connected vehicles, the emergence of high-risk vulnerabilities in systems like Jeep Uconnect and BMW ConnectedDrive poses a threat … Read more

Creating a Portable WiFi Killer with ESP-8266 Module for Penetration Testing

Creating a Portable WiFi Killer with ESP-8266 Module for Penetration Testing

This tutorial is for educational purposes and security testing experiments only. Please do not use it illegally! Background Introduction: The De-authentication Flood Attack, commonly referred to as Deauth Attack, is a form of denial-of-service attack on wireless networks. It aims to change the client’s status to unassociated/unverified by spoofing the de-authentication frames sent from the … Read more

Getting Started with Raspberry Pi: Learn Computer Security through Raspberry Pi and Kali Linux

Getting Started with Raspberry Pi: Learn Computer Security through Raspberry Pi and Kali Linux

Raspberry Pi is a great way to learn about computer security. In this series, we will explore this in our eleventh article. — Anderson Silva Is there a hotter topic in technology than protecting your computer? Some experts will tell you there is no such thing as an absolutely secure system. They joke that if … Read more

Essential Security Tools Deployment Script

Essential Security Tools Deployment Script

Disclaimer: The security tools and projects shared by this public account are sourced from the internet and are intended for security research and learning purposes only. If used for other purposes, the user assumes all legal and joint responsibilities, and is unrelated to the tool authors and this public account. Currently, only major image pushes … Read more