nullbyte.png

Cyber Weapons Lab

Article cover image
Apr 22, 2020

If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment.Using a directional Wi-Fi antenna and Wireshark, we can create a displa ...

Article cover image
Apr 17, 2020

Wi-Fi networks come in two flavors: the more common 2.4 GHz used by most routers and IoT devices, and the 5 GHz one offered as an alternative by newer routers. While it can be frustrating to attack a ...

Article cover image
Apr 13, 2020

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the ...

Article cover image
Apr 6, 2020

A macOS computer can reveal a lot of information about the owner, including which Wi-Fi network they have permission to access. With an Arduino-based attack, we'll use a five-dollar setup to inject a ...

Article cover image
Apr 6, 2020

The Digispark is a low-cost USB development board that's programmable in Arduino and capable of posing as a keyboard, allowing it to deliver a number of payloads. For only a few dollars, we can use th ...

Article cover image
Apr 3, 2020

With the macOS stager created and the attacker's system hosting the Empire listener, the malicious AppleScript can be designed and disguised to appear as a legitimate PDF using a few Unicode and icon ...

Article cover image
Mar 30, 2020

While hackers have taken advantage of numerous vulnerabilities in Adobe's products to deliver payloads to Windows users via PDF files, a malicious PDF file can also wreak havoc on a Mac that's using t ...

Article cover image
Mar 23, 2020

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session ...

Article cover image
Mar 16, 2020

A lot of people still trust their web browsers to remember every online account password for them. If you're one of those users, you need to adopt a more secure way of managing passwords, because brow ...

Article cover image
Mar 9, 2020

With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If yo ...