We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. …
Read More »Find Linux Exploits by Kernel version
Sometimes it’s really hard to find the correct exploit for the device that you are pentesting. I found two good references that may be helpful or least will give you a good starting point. Both of these resources can suggest Linux exploits based on kernel version. The first one is …
Read More »Kali Linux Cheat Sheet for Penetration Testers
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet for Penetration testers is a high level overview for typical penetration testing environment ranging from nmap, sqlmap, ipv4, enumeration, fingerprinting …
Read More »FBI hacked iPhone and wont disclose details
FBI successfully hacked iPhone and they wont disclose how it got data from seized San Bernardino shooters iPhone. The iPhone has been at the center of a bitter dispute between Apple and the Federal Bureau of Investigation. But that legal battle—in which a judge last month had ordered Apple to …
Read More »Crack passwords in Kali Linux with Hydra
Using FTP as a target service and will show how to crack passwords in Kali Linux with Hydra.
Read More »