Breached Data Search

Using the information that I obtained during Recon, I am now going to grep pieces of information through a collection of breached databases that I have. This is my collection. Any hits will be very beneficial. Breached data contains PPI and confidential information. Email/Password combos, SSN, Addresses, Full Names, Phone Numbers, Etc.. This information can […]

Bug Hunting Pt.1

I am participating in the above vulnerability disclosure program for the Defense Industrial Base. The Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) Pilot is a 12-month voluntary event established collaboratively by DC3’s DoD Defense Industrial Base Collaborative Information Sharing Environment (DCISE), DoD Vulnerability Disclosure Program (DoD VDP), and the Defense Counterintelligence and Security Agency (DCSA). […]

Homemade WiFi Deauther

What is a deauther? A deauther is a tool that executes a type of denial of service attack on any given WiFi network. The attack is called a deauthentication attack. Deauthentication attacks work by sending packets that tell the receiver they are disconnected. Similar to “jamming” but instead of attacking a frequency or frequency range, […]

APK Signing Using ZIPALIGN && APKSIGNER

I am going to demonstrate how to sign an APK using apksigner and zipalign on a Kali Linux machine. The first thing I need to do is build the APK. After doing that I will move into the directory containing the new APK. Now I’m going to sign the APK file using zipalign and apksigner. […]

Testing Password Strength&& Hacking A WIFI Network

Environment: I have used a mobile hotspot to create the target WiFi network. On this network, I have connected a laptop. Scenario: I will be using the Hak5 WiFi Pineapple Mark VII to obtain the 4-way handshake for the target SSID, use Hashcat to brute force the password hash, use the cracked password hash to […]