Articles in the Other category

Sniffing Network Traffic on Android
Introduction There has been a lot of talk about how to connect your laptop though the Android network and use the bandwidth that you're already paying for. Usually, this requires setting up an access point on an Android device and connecting to it with the laptop. On some devices ...
Android and Java Native Interface
Java Native Interface (JNI) JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can also call C/C++ functions using Java code and vice versa ...
Getting Domain Information
1. Introduction When analyzing malware we can gather a lot of information just by identifying the IP addresses and domains the malware software uses. Most malware software programs use DNS addresses to find the resources online. The domain resolution system is a system where we provide a hostname which is ...
Network Topology
1. Introduction Whenever we're doing a penetration test, it's good to figure out the topology of the network we're testing. We can't figure out the whole topology, because we don't have access to their internal network, but even if we manage to figure out part ...
Q: A Collection of Metasploit Modules Not Accepted to Main Trunk for Various Policy or Quality Reasons
Introduction I guess we all know what Metasploit is, so we don't really need to present to the reader the basics of Metasploit. But it's still useful if we present the type of modules the Metasploit has. Metasploit has the following types of modules: Auxiliary Modules: perform scanning ...
Achieving Anonymity with Tor Part 5: Tor Bridges and Hidden Services
Introduction to Tor Bridging Running a Tor bridge is essentially the same as running a Tor relay, as far as configuration is concerned. We already mentioned that the only difference is that Tor bridges are not listed in the Tor directory. We also said that using a bridge is helpful ...
Achieving Anonymity with Tor Part 4: Tor Relays
Introduction We've seen that Tor network is constituted from Tor nodes, through which we tunnel our traffic to reach anonymity. So far we didn't bother with terminology, because it wasn't important; all we wanted to achieve was anonymity, which we did. But when we're trying to ...
Achieving Anonymity with Tor Part 3: Torbutton and Tsocks
Introduction In previous articles: Part 1 and Part 2 we extensively used the Tor Browser Bundle that helps us ensure our anonymity. With the Tor Browser Bundle, we can easily start using Tor without installing and configuring any additional items. It also contains one very interesting project, a web browser ...
Achieving Anonymity with Tor Part 2: Proxies and DNS servers
Using Burp with Tor So far we've looked at how to set up our web browser to use Privoxy, which in turn uses Tor to achieve anonymity on the Internet. But what if we want to intercept requests with Burp? To help us better understand what's really going ...
Achieving Anonymity with Tor Part 1
We all know that Tor enables us to be anonymous on the Internet. In this article we'll look at how to achieve this and truly know what we're up against. First, let's install Tor and start using it to get a grasp on things. There are many ...