This is pretty old trick but not heavily used. You can run your Virtual Machines in VMware KVM mode with VMware Workstation 10.x or higher. This has been available to VMWare Workstation users since 2014 but I sincerely don’t know how many people actually uses it or even know about …
Read More »Create MITM Test Environment using Snifflab
Snifflab is a technical test environment for capturing and decrypting WiFi data transmissions. Snifflab creates a WiFi hotspot that is continually collecting all the packets sent over it. All connected clients’ HTTPS communications are subjected to a “Man-in-the-middle” attack, whereby they can later be decrypted for analysis. This article presents …
Read More »Wireless WPA2 password cracking using KRACK attacks
We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. …
Read More »Buffer overflow attack in Kali Linux
This is a great video made by Assistant Professor Dr Mike Pound on how to make yourself root user on a computer using a buffer overflow attack in Kali Linux. Assistant Professor Dr Mike Pound details how it’s done in the following video:
Read More »Format Linux USB Drive to recover full disk space in Windows 10
This is quite a common problem when you have a USB Disk that was used to burn a Bootable Linux distro is dd mode. You plug in the USB drive in Windows 10 (or any windows for that fact) and all you see is a Drive with zero MB disk …
Read More »