Sniffing & Spoofing

This section talks about the newest information about sniffing and faking, such as new techniques, security holes, and steps that can be taken to protect against these methods. Know how criminals use spoofing and sniffing to trick systems and users and steal data. Our coverage tells you about new dangers, how to protect yourself from them, and the best ways to stop these kinds of cyberattacks.

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse complaints and temporary disruptions. While…

2 weeks ago

10 Most Common Types of Cyber Attacks in 2023

Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- Software Networks  The rise…

11 months ago

Sniffing as easy as possible with Ettercap Tool

Sniffing includes catching, translating, inspecting, and interpreting the data inside a network packet on a TCP/IP arrangement. In this Kali…

1 year ago

Driftnet – Tool used to Capture Images that Your Friend looking at Online

How we can launch a MITM attack with Websploit and the Driftnet - Tool used to capture images. MITM attack is a…

1 year ago

Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, Sniffing & DOS Attacks

Xerosploit is a penetration testing toolbox whose objective is to perform man-in-the-middle attacks. It brings different modules that permit to…

1 year ago

Man in the Middle Attack with “Cain and Abel” Tool

In this tutorial, we will use Cain and Abel to perform this attack. Active eavesdropping alters the communication between two parties…

1 year ago

Penetration Testing Mail Server with Email Spoofing – Exploiting Open Relay configured Public Mail Servers

Email spoofing is a way of delivering forged emails to recipients. These methods are used by criminals to launch attacks like phishing…

1 year ago

URLSnarf – Tool Used to Capture Website Links that Your Friend Looking Online

In this article, we can launch a MITM attack with Websploit and the Driftnet Tool - URLSnarf used to capture images.…

1 year ago

MITM attack over HTTPS connection with SSLStrip

MITM attack with SSLStrip transparently hijack HTTP traffic on a network, look for HTTPS links and redirects, then map those…

1 year ago

Malicious Android Apps From Google Play Store Steal The SMS verification Code From System Notifications

Researchers uncovered a new malicious Android app from the Google play store that disguised as a Photo Beautification App steal…

5 years ago