AirDrive Keylogger – Forensisches Keyloggerkabel

Bereits vor einiger Zeit habe ich über den AirDrive Keylogger berichtet. Er verfügt über eine Wi-Fi Funktion und baut dafür ein eigenes Netzwerk auf. Nun hat AirDrive ein neues Produkte veröffentlicht, ein Keylogger in Form von einem USB Verlängerung Übersicht Arbeitet als WiFi-Hotspot, Verbindungsmöglichkeit von jedem Computer, Smartphone oder Tablet Zugriff auf die Tastenanschlagsdaten über den Webbrowser, […]

USB Password Stealer Turorial

Every security system has a vulnerability and all security systems have the same vulnerability – Human. Most people simply tick “Remember Me” on the websites they visit, as this is convenient. This happens especially often on private computers, which are not used by others, but often also on service devices, to which a hacker has […]

Fireeye Cyber Threat Map

FireEye, Inc. is a publicly traded company based in Milpitas, California, USA that provides network security software and services. It gained notoriety among other things with the discovery of several zero-day gaps in Microsoft’s Internet Explorer and participation in investigations of and actions against several botnets. A free Fireeye service is the browser-based Fireeye Cyber […]

Hack Excel passwords

In Excel you can protect tables with the so-called leaf protection with a password. In this tutorial, I’ll show you how to remove the password if you have forgotten it. The following tutorial may of course only be used for your own files, otherwise you would be liable to prosecution. Please note the disclaimer. Required […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 5 – Malware USB Sticks

USB sticks actually serve as storage media, but USB sticks can also be used as attack tools. The curiosity of what is probably for data on a found USB stick, entices many people to simply plug the USB stick into their computer. Once that happens, attackers have many options. In this tutorial, I’ll show you […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 4 – Social Engineering

You would not borrow your phone to a stranger in a hoodie? In one episode, Elliot asks Krista’s friend if he can use his cell phone to make a phone call. Then he calls himself and gets the phone number  of the victom and finally, access to many more private information. The exploitation of trust […]

Hacking Like Mr Robot

Hacking like Mr. Robot Part 3 – Cloning RFID Cards

To gain access to Sentinel, Darlene applies a well-known hardware hack and exploits her relationship with an FBI agent – Cloning RFID Cards Darlene invites FBI Agent Dom to the bar, where they first talked in person. Dom comes with all her usual FBI utensils, such as her badge, her gun, and the RFID card that […]

Eine Facebook Phishing-Seite erstellen

Create a Facebook phishing page

In this tutorial, I’ll show you how to create a Facebook phishing page to catch usernames and passwords that can hack other users’ Facebook accounts. But this knowledge should never be used to hack foreign Facebook accounts. It is simply not legal, in Germany it violates the Criminal Code StGB § 202c. Please also read […]

Google Dork Liste 2018

4500+ Google Dork List 2018

In this article, I’ve put together a Google Dork 2018 list. Google Dorks are mostly used over the Internet to attack SQL injections, such as website hacking. However, before a SQL injection can be performed, a vulnerability must be found. Google Dorks are the little codes that can help you find the flaws in Google […]