Menu

Sniffing/Spoofing

In the context of network security, a spoofing attack is a situation in which a person or a program successfully masquerades as another
How to Create a Keylogger for Linux using Python
How to Create a Keylogger for Linux using Python

Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.

KeyloggerPythonKeystrokesEventsCrontabTrojan
How to use DNS Poisoning to redirect users to Fake Website
How to use DNS Poisoning to redirect users to Fake Website

DNS poisoning, also referred to as DNS cache spoofing, is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver's cache.

DNSEttercapNetworkPoisoningRoutingSniffingSpoofing
Inject arbitrary code during MITM attack using MITMf
Inject arbitrary code during MITM attack using MITMf

A MITM attack is an attack where the attacker secretly relays and possibly alters the communication between two parties that are directly communicating with each [...]

DNSHTTPKeyloggerMITMMITMFSMBSSLSTrip
How to do a Man-in-the-Middle attack using ARP Poisoning
How to do a Man-in-the-Middle attack using ARP Poisoning

ARP Poisoning, also known as ARP Spoofing is a technique by which an attacker sends spoofed Address Resolution Protocol messages onto a local area network.

ARPEttercapNetworkPoisoningRoutingSniffingSpoofing
How to Create a Web-Based Javascript Keylogger
How to Create a Web-Based Javascript Keylogger

Researchers estimate thousands of ecommerce sites are under attack by a single threat actor that has infected servers with a web-based keylogger.

InjectJavascriptjQueryKeyloggerKeystrokesPHP