Author Archive: Mr Hacker
Mr Hacker
January 11, 2024
Building a Strong Foundation in Networking with Easy-to-Follow Steps and Practical Tips Understanding networking basics is crucial for anyone entering the field of IT or anyone who wants to set up a home network. Here’s a beginner’s guide to networking…
Read more
Mr Hacker
January 11, 2024
Wireshark is a powerful open-source network protocol analyzer that allows you to capture and analyze the data traveling back and forth on a network. If you’re a beginner, here are some steps to help you get started with Wireshark: 1….
Read more
Mr Hacker
January 11, 2024
How to Use Nmap for Beginners: A Comprehensive Guide to Network Scanning “How to Use Nmap for Beginners: A Guide to Network Scanning and Security Auditing” Nmap (Network Mapper) is a powerful open-source tool for network exploration and security auditing….
Read more
Mr Hacker
January 11, 2024
Kismet is a popular open-source wireless network detector, sniffer, and intrusion detection system. It is commonly used for wireless network monitoring and troubleshooting. Here’s a basic guide to help beginners get started with Kismet: 1. Installation: Linux: You can install…
Read more
Mr Hacker
January 11, 2024
Fluxion is a security auditing and social engineering research tool designed to capture WPA/WPA2/WEP passwords by leveraging social engineering. It’s important to note that using Fluxion or any similar tools without explicit permission to test the security of a network…
Read more
Mr Hacker
January 11, 2024
Cisco has responded swiftly to a critical security vulnerability impacting Unity Connection by releasing essential software updates. Identified as CVE-2024-20272 with a CVSS score of 7.3, this vulnerability exposes an arbitrary file upload flaw in the web-based management interface. The…
Read more
Mr Hacker
January 11, 2024
In December of 2023, a suspected nation-state group with ties to China, labeled UTA0178 by cybersecurity firm Volexity, orchestrated a sophisticated cyber-espionage campaign targeting less than 10 customers through the exploitation of a pair of zero-day vulnerabilities in Ivanti Connect…
Read more
Mr Hacker
January 11, 2024
Last week, Mandiant’s X account (formerly Twitter) experienced a cyberattack, likely executed through a “brute-force password attack” by a drainer-as-a-service (DaaS) group. Despite the typical security safeguard of two-factor authentication (2FA), the compromise transpired due to team changes and a…
Read more
Mr Hacker
January 11, 2024
A novel botnet named NoaBot, derived from the Mirai malware, has surfaced in a crypto mining campaign since the start of 2023, according to Akamai security researcher Stiv Kupchik. NoaBot boasts features such as a self-spreading worm and an SSH…
Read more
Mr Hacker
January 11, 2024
Hackers employ Remote Access Trojans (RATs) to illicitly infiltrate and remotely control a victim’s computer. These malevolent tools empower hackers to execute various malicious activities surreptitiously, including: Recently, cybersecurity experts at Cyfirma identified Silver RAT, a Trojan that adeptly circumvents…
Read more