Blog

Latest news around the world

17

Feb'22

Droopescan - a plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe

A plugin-based scanner that aids security researchers in identifying issues with several CMS. Usage of droopescan for attacking targets without …

Read More

11

Feb'22

Attacking Kerberos by Nairuz Abulhul

Trust this user/computer for delegation to any service. Delegation is the act of giving someone authority or responsibility to do …

Read More

10

Feb'22

Scripting to find named hosts | Golang tutorial [FREE COURSE CONTENT]

Scripting is a crucial skill to make your ethical hacking more streamlined and efficient. In this video from our Pentesting …

Read More

10

Feb'22

SQLRecon - a C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation

Description A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to …

Read More

10

Feb'22

Top 5 EDR Capabilities: Behavioral Protection, Whitelisting, Antimalware and more by Gilad David Maayan

What is EDR? Endpoint detection and response (EDR) solutions provide real-time continuous visibility into endpoint activity alongside automated response capabilities. …

Read More

09

Feb'22

Using AutoPWN to get a backdoor | Metasploit Tutorial [FREE COURSE CONTENT

In this video from our Client-side Attacks online course we learn how to set up AutoPWN in Metasploit to generate …

Read More

08

Feb'22

Email spoofing 101 by Matteo Cosentino

Email spoofing is a technique mostly linked to malicious activities including phishing and spamming. From a formal(ish) standpoint, email spoofing …

Read More

08

Feb'22

Winshark - Wireshark plugin to work with Event Tracing for Windows

Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were …

Read More

07

Feb'22

Digital criminology in solving cybercrime by Anastasis Vasileiadis

Digital forensics is the application of research techniques to solve digital crimes, from viruses that hold your computer and ransom …

Read More

04

Feb'22

Phant0m - Windows Event Log Killer

Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
GET A FREE EDITION!
Join our newsletter and receive for FREE, our premium edition “Brute Force and Supply Chain Attacks”
x