Brent Robinson

37 Flips | 6 Magazines | 16 Likes | 2 Followers | @BrentRobins2016 | Keep up with Brent Robinson on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Brent Robinson”

How To: Attack Web Applications with Burp Suite & SQL Injection

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on …

Information Security

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this …

Information Security

Raspberry Pi Powered Nerf Sentry Gun

Maker Tyler Lugger has published a great project to the Hackster.io website which details how you can use a Pi mini PC to create a Raspberry Pi …

Raspberry Pi

Building a FAQ Chatbot in Python – The Future of Information Searching

We use cookies on Analytics Vidhya websites to deliver our services, analyze web traffic, and improve your experience on the site. By using Analytics …

Raspberry Pi Internet of Things Introduction

Raspberry Pi enthusiasts or those looking to learn the basics of Internet of Things integration with the Raspberry Pi mini PC. May be interested in a …

New web browsing security tool arrives: DNS over TLS

Tenta DNS, an open-source DNS over TLS resolver, will help preserve users' privacy after the fall of net neutrality.<p>Net neutrality is on its death …

InfoSec Cheat Sheets

Reverse Engineering:<p>http://r00ted.com/cheat%20sheet%20reverse%20v6.png<p>Linux …

So You Want to Build a Chat Bot – Here's How (Complete with Code!)

You’re busy and (depending on effective keyword targeting) you’ve come here looking for something to shave months off the process of learning to …

Biohackers have encoded malware in a strand of DNA

When biologists synthesise DNA, they take pains not to create or spread a dangerous stretch of genetic code that could be used to create a toxin or, …

9 Simple Ways To Learn Python (For Any Reason)

<i>This piece was written by the people who run the Cracked Store to tell you about products that are being sold there.</i><p>This might surprise you, but …

Mac malware that let its operator spy on its victims went unnoticed for years

That's according to Synack security researcher Patrick Wardle, who spoke to both Ars Technica and ZDNet about his findings ahead of a talk at the Defcon hacker conference on Wednesday.<p>A piece of Mac malware, called Fruitfly, was first discovered and patched by Apple back in January 2017.<p>But Wardle …

Spying

How to use Group Policy to resolve Active Directory account lockouts

Determining the source of locked accounts can be difficult and time-consuming. Use this technique to help troubleshoot this problem.<p>I wrote recently …

Best Portable Travel Apple Watch Chargers

Looking to charge your Apple Watch while you're out and about? Check out these portable chargers!Being able to charge your Apple Watch on the go can …

10 Dream Cycling Vacations in the U.S. and Europe

Bike vacations mean you earn every meal guilt-free. Plus, there’s no more rewarding way to explore the world than from a bike saddle. From the French …

ZIP Bombs Can Protect Websites From Getting Hacked

Webmasters can use so-called ZIP bombs to crash a hacker's vulnerability and port scanner and prevent him from gaining access to their website.<p>The …

Information Security

Prepare for the OWASP Top 10 Web Application Vulnerabilities Using AWS WAF and Our New White Paper | Amazon Web Services

Are you aware of the Open Web Application Security Project (OWASP) and the work that they do to improve the security of web applications? Among many …

Cloud Computing

Desperately Seeking Security: 6 Skills Most In Demand

When people say there's a security skills gap, this is what they really mean.<p>1 of 7<p><i>Image Source: Adobe Stock</i><p>The last several years have seen a slew …

How to Hack Wi-Fi: Automating Wi-Fi Hacking with Besside-ng

In this how-to, I will be demonstrating a few of the tactical applications of Besside-ng, the hidden gem of the Aircrack-ng suite of Wi-Fi hacking …

NSA Malware Used to Infect Windows PCs with Cryptocurrency Miner

Malware authors are using an NSA hacking tool to infect Windows computers with a new cryptocurrency miner. Detected under the generic name of …

Cryptocurrency

Getting started with “IoT Security” – Mapping the attack surface

IoT or the Internet of Things is the new buzzword all around. However, not enough attention has been paid to the security aspect of these so-called …

Internet of Things

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, …

TheFatRat – Massive Exploitation Tool

TheFatRat is an easy-to-use Exploitation Tool that can help you to generate backdoors and post exploitation attacks like browser attack DLL files. …

Linux

Little experience in bugbounty hunting

Hello friends, hope you are doing well. Yesterday, I had gone for LinuxChix india meetup. I found some people interested in magic the bugbounty …

For $28, you can hack into a stranger's internet-enabled webcam

If you have an web-connected camera, you should change your password ASAP.<p>For just 188 yuan ($28), you can buy software that would allow you to hack …

Cybersecurity

Top Ten Historic Sites on the New Chicago to New York City Bicycle Route

Adventure Cycling’s new bicycle route, Chicago to New York City (CNYC), is ripe with historic sites. Here are the 10 we picked, but we need your help …

New York City

Mac users beware! Hackers are selling 'the most sophisticated' Mac malware ever

Two new security threats, a malware-as-a-service (MaaS) platform and a ransomware-as-a-service (RaaS) program, are designed to specifically target …

How to get started with an Apple smart home

Designing your own smart-home setup may sound daunting, but it's much easier than you think. A "smart home" can have one connected device or several; it's entirely up to you. And fortunately, you've already figured out the toughest part -- which voice control platform to use as the main point of …

Facebook patent application describes spying on users through their webcams

Your worst internet nightmare could be on its way to becoming a reality.<p>A newly discovered patent application shows Facebook has come up with plans …

Crysis ransomware master keys released to the public

A total of 200 master keys can now be used by victims to decrypt and unlock their systems.<p>The world has been rocked by WannaCry causing disruption …

Man in the Middle iOS Attacks: The Danger of Relying on a Single Layer of Security

<i>Author Note: This write-up will not examine any new vulnerability. Rather, it explores a common methodology used in trivially hacking iOS apps, in</i> …