Cracking WPA/WPA2 for Non-Dictionary Passphrase Read

WPA/WPA2 password can be cracked simply by capturing WPA handshake and then apply dictionary. And if passphrase is in dictionary then password will be cracked. But what if password is not in dictionary? Are there other ways to crack the non-dictionary passphrases? …

Malware Memory Forensics Read

Introduction Memory Forensics is the analysis of the memory image taken from the running computer. In this article, we will learn how to use Memory Forensic Toolkits such as Volatility to analyze the memory artifacts with practical real life forensics scenario.Why Memory …

VARIOUS AUTHORITIES UNDER THE IT ACT Read

(1)     Controller of Certifying Authorities (CCA) CCA is appointed by the Central Government under section 17 of the IT Act. Some of the functions of CCA are – Act. To exercise supervision over the activities of Certifying Authorities; To supervise public …

Matriux  Ec-Centric Read

Matriux Ec-Centric

Hello every readers, Matriux is been successfully running and getting a big support over the past 2 years and we have been working hard to provide the best security solutions and quality tools for all the penetration testing and forensic needs. On …

Apple iOS vulnerabilities Read

Introduction Apple iOS has successfully emerged as one of the most widely used Operating System today. It runs on Apple devices such as iPhone, iPad, iPod touch and Apple TV. Apple AppStore has the highest number of applications (500,000) with 25 billion …

Tamper Data Read

Tamper Data

What is Tamper Data? Tamper data, an add-on (extension) for Mozilla Firefox, is a fast, simple yet effective tool which can used to do penetration testing. Tamper Data basically gives us the power to view, record and even modify outgoing HTTP requests. …

Basics of Android Secure Coding Read

header.jpg Android is an OS designed for Smart phones. The phones are meant for office productivity apps, games, social networks etc. The phone comes pre-installed with a selection of system applications, e.g., phone dialer, address book, but the platform gives ample opportunities …

Private Browsing Read

Private Browsing

While trying to read what “private browsing” means, I came across its page in Wikipedia. It has a very interesting definition. It reads as follows: Privacy mode or "private browsing" is a term that refers to privacy features in some web browsers. …

PHP Shells Read

PHP Shells

Hi boyz’n’girls. This is my first appearance on ClubHack, hope not the last. 😀 Anyway straight to the point. I will talk about “PHP shells”. PHP shells are used by Blackhats to maintain persistence into a compromised machine, typically a webserver. A …