Important Hacking Sources And Links

In this article I have compiled important Hacker sources and links. Of course, not everyone needs all of these sources and links. That’s why I’ve divided them up according to certain areas of application. If you are missing an important source, I would be happy if you could write it to me in the comments […]

Fake Nintendo Amiibos with Android

Amiibos are plastic figures based on games released for Nintendo consoles, some of which have a high collector’s value. The figures include a small NFC chip in the base that allows users to unlock special bonuses when used with specific games. For example, there are many Amiibos for the game “The Legend of Zelda”. The […]

Kaspersky Cyber Attack Map

I recently introduced the FireEye Cyber ​​Threat Map, which clearly illustrates all cyberattacks in real time. Another well-presented alternative is Kaspersky’s Cyber ​​Attack Map. Link to the Kaspersky Cyber ​​Attack Map Link to the Kaspersky Cyber ​​Attack Map  

AirDrive Keylogger – Forensic Keylogger Cable

Some time ago I reported about the AirDrive keylogger. It has a Wi-Fi function and sets up its own network for this. Now AirDrive has released a new product, a keylogger in the form of a USB extension.   Overview Works as a WiFi hotspot, connectivity from any computer, smartphone or tablet Access to keystroke […]

USB Password Stealer Turorial

Every security system has a vulnerability and all security systems have the same vulnerability – Human. Most people simply tick “Remember Me” on the websites they visit, as this is convenient. This happens especially often on private computers, which are not used by others, but often also on service devices, to which a hacker has […]

Fireeye Cyber Threat Map

FireEye, Inc. is a publicly traded company based in Milpitas, California, USA that provides network security software and services. It gained notoriety among other things with the discovery of several zero-day gaps in Microsoft’s Internet Explorer and participation in investigations of and actions against several botnets. A free Fireeye service is the browser-based Fireeye Cyber […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 6 – Rubber Ducky

In an episode of Mr. Robot, Mobley gives Angela a Rubber Ducky. If she does not get the femtocell up and running, Mobley says she can simply plug in the USB flash drive, wait a few seconds and then pull out. What’s it all about? The USB Rubber Ducky is a keystroke injection tool disguised […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 5 – Malware USB Sticks

USB sticks actually serve as storage media, but USB sticks can also be used as attack tools. The curiosity of what is probably for data on a found USB stick, entices many people to simply plug the USB stick into their computer. Once that happens, attackers have many options. In this tutorial, I’ll show you […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 4 – Social Engineering

You would not borrow your phone to a stranger in a hoodie? In one episode, Elliot asks Krista’s friend if he can use his cell phone to make a phone call. Then he calls himself and gets the phone number  of the victom and finally, access to many more private information. The exploitation of trust […]