Dear Readers,

We are glad to present our first THE BEST OF HAKIN9 in 2014. This time we wanted to sum up last 3 years of our work and thus, we prepared a special collection of 48 top Hakin9 articles. Inside you will find more than 400 pages of “how-to” and step-by-step” tutorials that will surely contribute to your development as a professional pentester, exploiter or ethical hacker.


Using Amazon AMI for Cracking the WPA2 WiFi Hack

by Bruno Rodrigues

VoIP Hacking Techniques

by Mirko Raimondi

A Crash Course in Pentesting with Backtrack

by Nick Hensley

Using Hydra To Crack The Door Open

by Nikolaos Mitropoulos

NMAP and Metasploit for MS-SQL Auditing

by Jose Ruiz

Nmap: a “Hacker Tool” for Security Professionals

by Justin Hutchens

How To Reverse Engineer .NET files

by Jaromir Horejsi

Digital Forensics on the Apple OSX Platform

by David Lister

Passwords Cracking: Theory and Practice

by Theodosis Mourouzis

How to Use OpenVAS (Vulnerability Assessment System)?

by Willie Pritchett

How Do I phish? Advanced Email Phishing Tactics

by Brandon McCann

How to Brute-force Drupal6 Login Pages?

by Kevin Simons

How to Conduct VPN Pivoting?

by Ayman Hammoudeh

Cracking WPA/WPA2 Key Using Reavar

by Badrish Dubey

How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering?

by Shane R. Spencer

How to Identify and Bypass Anti-reversing Techniques?

by Eoin Ward

Capturing WiFi traffic with Wireshark

by Steve Williams


by Jörg Kalsbach

Tracing ContikiOs Based IoT communications over Cooja simulations

with Wireshark Using Wireshark with Cooja simulator

by Pedro Moreno-Sanchez and Rogelio Martinez-Perez

Digital Security and Risk Analysis Side Channel Attack

with Brain Leading to Data and ID Theft

by Massimiliano Sembiante

Raspberry Pi Hacking Loving your pi and hacking it too…

by Jeremiah Brott

Bluetooth Hacking Tools

by Dennis Browning

Create a Basic Web Application Scan Policy

by Johan Loos

Create a Basic Scan Policy in Nessus 5

by Johan Loos

Cross-Site Scripting (XSS)

by Badrish Dubey

Implementing Rsylog to forward log messages on an IP network

by Lara Sanz

Weak Wi-Fi Security, Evil Hotspots and Pentesting with Android

by Dan Dieterle3

Pentesting with BackTrack distribution

by Jan Hrach, Miroslav Ludvik, Michal Srnec

Use Metasploit in Backtrack 5

by Johan Loos

Using REMnux to analyze PE files

by Glenn P. Edwards Jr

Recovering Passwords and Encrypted Data Remotely in Plain Text

by Daniel Dieterle

Trojan-izing USB Sticks

by Gerasimos Kassaras

Deceiving Networks Defenses with Nmap Camouflaged Scanning

by Roberto Saia

Cross Site Request Forgery – Session Riding

by Miroslav Ludvik and Michal Srnec

Data Logging with Syslog A Troubleshooting and Auditing Mechanism

by Abdy Martinez

Caffe Latte Attack

by David Jardin

Reverse Engineering C++, a case study with the Win32/Kelihos Malware Family

by Benjamin Vanheuverzwijn, Pierre-Marc Bureau

Cyber Warfare Network Attacks

by Daniel Dieterle

Understanding conditionals in shellcode

by Craig Wright

Creating a Fake Wi-Fi Hotspot to Capture Connected Users Information

by Roberto Saia

Accurate Time Synchronization with NTP Hardening your Cisco IOS Device

by Abdy Martinez

DNS Cache Poisoning

by Jesus Rivero

Beyond Automated Tools and Frameworks: the ShellCode Injection Process

by Craig Wright

Tabnapping Attack Hijacking Browser Tabs

by Abdy Martinez

Using the Social Engineering Toolkit to Test Network Security

by Daniel Dieterle

Starting to Write Your Own Linux Shellcode

by Craig Wright

How to Recover Passwords from a Memory Dump

by Daniel Dieterle

Tag: You’re Infected! QR Codes as Attack Vectors

by Tim Klup


August 20, 2021
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Oldest Most Voted
Inline Feedbacks
View all comments
Erick Campos
7 years ago

i like thakfull for the colaborations for me

8 years ago

It´s very cool your site and contribution. Thanks a lot.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023