Targeted DoS on Wireless client using DEAUTH attack

Hello everybody. In this post I will explain step by step how to perform a small DoS attack on a specific Wireless client using the concept of deauthentication attack. This attack targets communications between a client and the access-point on which it is connected. Technical details This attack acts in… Continue reading

Use of NTP can create CHAOS

NTP (Network Time Protocol) is the widely used protocol used by computers to ensure that their internal clocks are accurate. Surprisingly, connections between computers and NTP servers are rarely encrypted, making it possible for hackers to perform man-in-the-middle attacks that reset clocks to times that are months or even years in… Continue reading

[News] iDict, the Bruteforcer of iCloud account

Hello, everybody ! Hacker’s world starts new year with a cool gift from an hacker named “Pr0x13″ with the tool iDict which permits to bruteforce iCloud account. This tool is available to download on GitHub. This tool uses an exploit a security flaw of Apple iCloud security infrastructure to bypass restrictions… Continue reading