
Smart Meter Attack CONFIRMED
This is the final step prior to dumping the actual smart meter firmware. Can it be done without removing the processor?
Read More
New Zero Day Exploit – Protect your PC from Follina
The new Follina zero-day attack is being exploited in the wild. Dave explains how to lock out attackers with a simple registry fix after explaining the Top 3 styles of zero-day attack: the application exploit, the operating system exploit, and the escalation exploit.
Read More
Hacking networks with VLAN hopping and Python
- Frank
- May 26, 2022
- Cisco
- cyber security
- double tagging
- hacking cisco
- kali linux
- Python
- python hacking
- python scapy
- scapy in python
- scapy kali linux
- scapy packet crafting
- scapy python
- scapy python 3
- scapy python pcap
- scapy python tutorial
- scapy python3
- scapy tutorial
- vlan hopping
- vlan hopping attack
- vlan hopping attack explained
- vlan hopping cisco
- vlan hopping example
- vlan hopping explained
- vlan hopping kali
- vlan hopping mitigation
- vlan hopping tool
Apparently VLAN hopping is possible. This video shows you how and how to mitigate these types of attacks.
Read More
Google, Apple, and Microsoft Go Passwordless
- Frank
- May 16, 2022
- Android
- Apple
- big ip
- big-ip
- cyber security
- darren kitchen
- dns
- dns poisoning
- Enterprise
- f5
- fido
- fido alliance
- hack
- hack5
- hacker
- Hak5
- information security
- infosec
- IP Addresses
- Kernel
- Microsoft
- passwordless
- penetration testing
- pentest
- pentester
- pentesting
- red team
- shannon morse
- snubs
- Technology
An enterprise vulnerability has public exploits, big brands are going passwordless, and install this android security patch asap!
Read More
Smart Meters are Vulnerable to this Attack
Everyone wants to connect everything up to the internet, but they do not realize that the connection runs in both directions. Voltage glitching attacks have been documented for quite some time, now I am going to apply these well known techniques to extract the smart meters firmware for analysis.
Read More
Real-Time OSINT: Investigating Events as They Happen
In this presentation, Josh Huff shares his techniques and resources for conducting open- source intelligence analysis on current events as they unfold. OSINT analysis of weather emergencies, missing persons, fugitives, and active shooter events is the type of fast-paced practice that makes you step out of your normal investigative routines. Real-time OSINT will make you […]
Read More
This ATM RootKit Can Steal Banking Creds – ThreatWire
Google exposed Exotic Lily, a group that works with Conti, an ATM rootkit can steal banking data, and TrickBot targets MikroTik routers.
Read More
GPU Fingerprinting Can Track You Online
A clever and alarming way you can be tracked online.
Read More
How to automate your OSINT process with APIs
- Frank
- March 24, 2022
- API
- api security
- api security best practices
- api security testing
- cyber crime
- cyber investigation
- cyber security
- ethical hacking
- hailbytes
- open source intelligence
- OSINT
- osint api
- osint automation
- python automation
- python automation ideas
- python automation projects
- python for hacking
- python for hacking beginners
- python tutorial
- python tutorial for beginners
- ransomware protection
- reconnaissance
- REST API
- Security
- security automation
- security training
This video shows a practical example of how to create a python program to perform OSINT investigations with APIs like Social Scanner.
Read More
Cyberwarfare: Ukraine vs Russia – ThreatWire
ThreatWire is a weekly news journalism show covering cybersecurity topics for network admins, information security professionals, and consumers.
Read More