Android Hacking, Part 2: How to Embed a Backdoor into an Android APK

Welcome back, my fledgling hackers! Mobile devices–smartphones and tablets–are proliferating around the world and slowly overtaking desktop and laptop machines. These mobile devices generally run either the iOS or the Android operating system, with Android comprising the bulk of all mobile device OS’s (82%). Considering the growth of the mobile market and the dominance of […]

Continue Reading

MiTM Attack with Ettercap

Welcome back, my rookie cyber warriors! Man-in-the-Middle attacks can be among the most productive and nefarious attacks. If the attacker/hacker can place themselves between two systems (usually client and server) they can control the flow of traffic between the two systems. In this way they can eavesdrop on the traffic, delete the traffic, inject malware […]

Continue Reading

Automobile Hacking, Part 5: Hacking the Car Alarm Systems to Take Control of the Vehicle

Welcome back, my budding cyber warriors! Automobile or car hacking is the cutting-edge of the cyber security world right now. With the advent of digital systems in automobiles and other vehicles and the soon-to-be autonomous driving cars, this field is rife with potential cyber security issues that will significantly impact our society and safety. This […]

Continue Reading