HackMag
# Hacker Magazines & Publications

Official Website HackMag

HackMag publishes high-quality translated content about information security, cyber security, hacking, malware and devops.


31 August 2023

Megadrone. Assembling a long-range and jammer-resistant hacker drone

Imagine that you are sitting with your computer on an upper floor of a secure building located in the middle of a restricted zone fenced by electrified barbed wire. You feel completely safe: cameras and vigilant security personnel protect you. As of a sudden, you hear (...)


22 August 2023

Diving Deep into Cybersecurity: Unlocking Advanced Tech Discussions for the Inquisitive Minds

This is an external third-party advertising publication. Unveiling Cybersecurity’s Hidden Secrets: Beyond the Basics Welcome, curious readers! In this incredibly fast-paced and interconnected world, staying up-to-date with the ever-evolving cybersecurity world is becoming (...)


15 August 2023

Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use

In sci-fi movies, hackers often use small pocket devices, less than a cellphone in size, to hack a company’s wireless network, gain access to its servers, and steal passwords. This article gives you a chance to become one of such hackers; all you need for this is a (...)


29 July 2023

Invisible device. Penetrating into a local network with an ‘undetectable’ hacker gadget

Unauthorized access to someone else’s device can be gained not only through a USB port, but also via an Ethernet connection – after all, Ethernet sockets are so abundant in modern offices and public spaces. In this article, I will explain how to penetrate into a local (...)


20 July 2023

Evil modem. Establishing a foothold in the attacked system with a USB modem

If you have direct access to the target PC, you can create a permanent and continuous communication channel with it. All you need for this is a USB modem that must be slightly modified first. In this article, I will explain in detail how to deliver such an attack. What if (...)


7 July 2023

Evil Ethernet. BadUSB-ETH attack in detail

If you have a chance to plug a specially crafted device to a USB port of the target computer, you can completely intercept its traffic, collect cookies and passwords, and hack the domain controller. The attack is delivered over Wi-Fi, and this article explains how to (...)


7 July 2023

VERY bad flash drive. BadUSB attack in detail

BadUSB attacks are efficient and deadly. This article explains how to deliver such an attack, describes in detail the preparation of a malicious flash drive required for it, provides code that must be written on this device, and discusses how to make Windows and Linux users (...)


8 June 2023

Croc-in-the-middle. Using crocodile clips do dump traffic from twisted pair cable

Some people say that eavesdropping is bad. But for many security specialists, traffic sniffing is a profession, not a hobby. For some reason, it’s believed that this process requires special expensive equipment, but today, I will show how network traffic can be intercepted (...)


8 June 2023

Cold boot attack. Dumping RAM with a USB flash drive

Even if you take efforts to protect the safety of your data, don’t attach sheets with passwords to the monitor, encrypt your hard drive, and always lock your computer before leaving it unattended, this doesn’t guarantee that your information is safe. Your RAM can be easily (...)


20 April 2023

Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows

Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found a way to use the identified vulnerability for local privilege escalation. As a bonus, this article gives (...)

You Can’t Arrest An Idea

Hacker Magazines & Publication

HackRead

A Mind at Play: Rediscovering Minesweeper in the Professional Arena

By Uzair Amir Remember Minesweeper? It's not just a game - it's a hidden training ground for work skills! Sharpen your decision-making, focus, and (...)

4 May

The Hacker News

Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor (...)

4 May

Latest Hacking News

How Structured Cabling Can Help With Cyber Security Attacks

Today’s digital landscape is as perilous as it is pervasive, requiring robust measures beyond software-based… How Structured Cabling Can Help With Cyber (...)

3 May

Tor Project

New Alpha Release: Tor Browser 13.5a7

Tor Browser 13.5a7 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security (...)

30 April

Red Cross

We stand with Ukraine

The Russian government’s attack on Ukraine has put millions of innocent lives in danger. We stand with Ukraine to support their freedom and to defend democracy. If you wish to support Ukraine and its people in their time of need, please consider donating to the Red Cross.

Your data is YOUR data

eFoundation is a non-profit organization leading the development of Open Source mobile operating systems that respect users’ data privacy.

Signal

Signal

Speak Freely

Tor Browser

Tor Browser

Tor protects your privacy

NordVPN

Protect all your devices.

Secure, high-speed VPN