Tag Archives: Ethical Hacking

How to use Software Defined Radios

In this article we’ll cover how to use software defined radios. This will include following topics Introduction to radio frequency scanners Hands-on with RTLSDR scanner Playing around with gqrx Kalibrating device for GSM tapping Decoding ADS-B messages with Dump1090 The term software-defined radio means, implementation of hardware-based radio components such …

Read More »

How to Perform Browser Autopwn using Metasploit

Let us discuss about performing browser autopwn that how this module works. This auxiliary module used for performing client-side attacks. Now we need to explore how this module works. Following are steps of browser autopwn. Attacker/Penetration Tester executes the browser_autopwn auxiliary module. Web server is started (on the attacker’s system), which hosts …

Read More »

Penetration Testing Embedded Devices

Let’s discuss about penetration testing embedded devices. First we need to know about embedded devices and their types then we’ll cover penetration testing embedded devices and I would recommend you to follow this practical guide for penetration testing into IPSec VPNs if you are interested. Basically an embedded device is used for …

Read More »