One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers.…
A blog about IT, security and whatever crosses my mind.
One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers.…
One of the most useful tools in a hacker’s toolbox is a password cracker. Passwords are everywhere to protect systems, and sometimes, when there is…
I did it. My very first academic journal publication is online! It is my second publication about Android security, this time specifically targeting clickjacking attacks…
For my thesis I researched a lot of resources regarding honeypots, including a number of open-source softwares. Before I clean up my bookmark bar and…
This year 2018 has been a challenging year, at least for me. I worked a lot to achieve what could be the unreachable goal of…
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges…
One of the most popular hacking requests, besides “how to hack facebook”, is how to gain access to protected WiFi networks. Many years ago, this…
In the field of criminal investigations, it is often necessary to search for evidence on electronic devices. Digital traces can be found on computers, tablets,…
If you happen to own a Linux system, I am sure you already searched for solutions to problems on the Internet, only to find smart…
Das ist ein Beitrag für Menschen, die in ihrer Freizeit nicht mit ihrem Internet-Browser spielen, sondern etwas Sinnvolles mit ihrer Zeit anstellen. Da ich zu…