I have recently contributed to Nullbyte by sharing one of my learned skill of finding hacked account online. http://null-byte.wonderhowto.com/how-to/find-hacked-accounts-online-part-1-haveibeenpwned-0164611/ Along with this, I also know and sometimes use other methods to acces ...more
Android libstagefright - Integer Overflow Remote Code Execution source code is now available at https://www.exploit-db.com/exploits/38226/ Something different than what we had a week ago. Lets brainstorm: What it is? How can we use it? Everything else it can be useful for
I am a regular user here and have been following many articles. I just want to understand, what if an attacker gets access to my router, what possible attacks can be carried out. One I can think of is MITM by diverting traffic... What others options work? Can internal networks ...more