Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Tag: Tools

Archive for Tools

You are browsing the archives of Tools.

Android Network Toolkit for Pentesting

ANTi is a smartphone, android based, penetration testing toolkit that can scan a network, find vulnerabilities, run exploits, produce reports and more. There is a free version with limited functions and several paid versions that scale up in functionality. The videos linked at the bottom of this article are interesting. ANTi – Android Network Toolkit […]

Cloud Security Layers

Situational awareness is one of the most difficult things to get right in doing cloud security, and hand in hand with that goes inventory awareness. To understand why, take a look at the layers involved with cloud security: Facility physical environment – the building and physical environment in which the data center infrastructure resides Infrastructure […]

DNA Ink Branding

From footballs to food to luxury goods, branding an item with ink that contains a specific DNA marker is becoming the latest technique to stop counterfeiters. Plant DNA Helps Catch Criminals and Thwart Counterfeiters – [popsci.com] Counterfeiters are skilled at making knockoffs of even the most high-end tech and luxury products. But one European luxury […]

The Bluetooth Dilemma

This article describes how criminals have begun to integrate bluetooth technology into card reader skimmers to make it more effective for them to collect stolen card information. Josh Wright is an expert on bluetooth and wireless security in general and is a Senior Instructor at the SANS Institute, where he authored (and often teaches) the […]

Evil Mouse Penetration Tool

Netragard’s Hacker Interface Device (HID) – [snosoft.com] We (Netragard) recently completed an engagement for a client with a rather restricted scope. The scope included a single IP address bound to a firewall that offered no services what so ever. It also excluded the use of social attack vectors based on social networks, telephone, or email […]

Software Assurance Tools

Software Assurance deals with making sure that software acts as it was intended and is free from vulnerabilities. Too often these days, our software is distributed while it is still filled with undiscovered flaws that attackers may be able to use to penetrate our systems. It is far more cost effective to spend the time […]

GPU Password Cracking

Using GPUs to aid in password cracking continues to become more effective in both speed and cost. GPU Password Cracking – Bruteforceing a Windows Password Using a Graphic Card – [mytechencounters.wordpress.com] GPGPU computing is getting lots of attention these days. GPGPU computing simply means doing general calculations on graphic cards (GPUs) rather than CPUs. Traditionally, […]

Hacking Exposed – Wireless

The new second edition update to “Hacking Exposed – Wireless” has a companion web site that includes several extended versions of chapters. Hacking Exposed Wireless 2nd Edition – [hackingexposedwireless.com] Online Chapters Wireless is a very complex topic, and some may want to dig even further into the WiFi and Bluetooth specifications while learning more about […]

Hacking Wireless Keyboards

Hacking Wireless Keyboards With Keykeriki – [securitytube.net] KeyKeriki is a hardware + software tool released by Remote Exploit to exploit wireless keyboards. You can download the theory slides from here. The details about the software and hardware requirements is available on their website. According to them: “Now 1.5 years after releasing our whitepaper “27Mhz Wireless […]

Security Terminology Definitions

Assessment – the process of testing the effectiveness of security controls to discover the level of protection they offer and any weaknesses. Assessment and Authorization – formerly known as C&A. The combination of the Assessment process and the Authorization process that together allow an information system to operate as safely as possible. SEE ALSO: Assessment, […]