The Art of Chain Attacks in Internal Network Penetration

The Art of Chain Attacks in Internal Network Penetration

The Art of Chain Attacks in Internal Network Penetration This article is based on a simulated practical environment assessment conducted by Master Z for his apprentice 007, aimed at evaluating his thought process and capabilities in penetrating entry-level environments. The content is derived from 007’s retelling and records the entire chain attack path he took … Read more

ESP32 WiFi Penetration Testing Tool Tutorial

ESP32 WiFi Penetration Testing Tool Tutorial

DJI drones, Fluke multimeters, Xiaomi phones, Huawei watches, and more await you! 👆 The breadboard community DIY event is ongoing! (1) Introduction Recently, while learning about the ESP32, I came across a project on GitHub called the ESP32 Wi-Fi Penetration Tool. This tool reminded me of the WiFi killer I used to play with on … Read more

Automotive Security Testing Checklist

Automotive Security Testing Checklist

Is it really possible for hackers to remotely control all cars’ autonomous driving systems and connected vehicle terminals as depicted in “Fast and Furious”? With the commercialization of 5G technology and the continuous advancement of intelligent and connected vehicles, the emergence of high-risk vulnerabilities in systems like Jeep Uconnect and BMW ConnectedDrive poses a threat … Read more

Creating a Portable WiFi Killer with ESP-8266 Module for Penetration Testing

Creating a Portable WiFi Killer with ESP-8266 Module for Penetration Testing

This tutorial is for educational purposes and security testing experiments only. Please do not use it illegally! Background Introduction: The De-authentication Flood Attack, commonly referred to as Deauth Attack, is a form of denial-of-service attack on wireless networks. It aims to change the client’s status to unassociated/unverified by spoofing the de-authentication frames sent from the … Read more

Getting Started with Raspberry Pi: Learn Computer Security through Raspberry Pi and Kali Linux

Getting Started with Raspberry Pi: Learn Computer Security through Raspberry Pi and Kali Linux

Raspberry Pi is a great way to learn about computer security. In this series, we will explore this in our eleventh article. — Anderson Silva Is there a hotter topic in technology than protecting your computer? Some experts will tell you there is no such thing as an absolutely secure system. They joke that if … Read more

Essential Security Tools Deployment Script

Essential Security Tools Deployment Script

Disclaimer: The security tools and projects shared by this public account are sourced from the internet and are intended for security research and learning purposes only. If used for other purposes, the user assumes all legal and joint responsibilities, and is unrelated to the tool authors and this public account. Currently, only major image pushes … Read more

Practical BadUSB Attack Based on Arduino Leonardo

Practical BadUSB Attack Based on Arduino Leonardo

* Original Author: Professor X, this article is part of the FreeBuf original reward plan, reprinting without permission is prohibited. Introduction Many students on Freebuf have shared their views on HID attacks, such as Viks’ ‘Quickly Making Teensy BadUSB with Arduino’, which provides a detailed description of the BadUSB production process both from a popular … Read more

Exploring Hardware Security on a Budget: BadUSB with Arduino

Exploring Hardware Security on a Budget: BadUSB with Arduino

*This article is originally written by: ya0guang. It is part of the FreeBuf original reward program, and reproduction without permission is prohibited. Introduction Given that hardware security is a subject that most newcomers have little exposure to, and it is very appealing, the high prices of some professional security research equipment can be daunting. In … Read more

A Comprehensive Guide to Android Root Detection and Bypass

A Comprehensive Guide to Android Root Detection and Bypass

0x01 Introduction Android is based on the Linux multi-user access control mechanism. By default, applications cannot execute other applications, including reading and writing users’ private data. The process of an application is a secure sandbox (running the application in a restricted security environment, with all changes in the sandbox having no harm to the operating … Read more

DIY Raspberry Pi with Kali Linux: A Step-by-Step Guide

DIY Raspberry Pi with Kali Linux: A Step-by-Step Guide

Due to the impact of the pandemic, I have spent more time at home, and finally have the opportunity to tinker with the Raspberry Pi 4B that I purchased last year. During a large-scale offensive and defensive exercise last year, I heard about the incredible operation of using a drone + Raspberry Pi for wireless … Read more