Skip to main content

Posts

Featured

Side Channel Attack

Is your browser data really safe? This new type of attack uses machine learning to identify the websites you browse and the credentials you use to access those websites, such as usernames and passwords. As the attack's name implies, it does not directly target the communication channels between your browser and the remote server. Instead, it observes computer behavior, such as temperature changes, interrupts that occur in other processes, and the computer's timer values at fixed intervals while a certain website is being visited. Hackers use this data to determine the website being accessed by running machine learning algorithms on their already collected data. This type of attack is almost similar to a burglar who tries to break into a safe with a stethoscope. In a side channel attack, the hacker attempts to decode information by collecting device behavioral data in the same way a burglar tries to open a safe by guessing the number combination based on the sounds the safe make

Latest Posts

Russian hackers are behind the recent ransomeware attacks on the UK hospitals

How To Upgrade To Kali Linux 2018.1 Release?

XAttacker Tutorial | Website Vulnerability Scanner & Auto Exploiter

Offensive Information And Vulnerability Scanning Using Striker

Generating A PHP Backdoor with weevely3 - Post Exploitation Stage

How to find your WiFi password on Windows , Linux and Mac OS

Tools used in Android app reverse engineering

How to check your Linux system for Meltodown and Spectre vulnerabilities

Advanced network scan and attack using NetAttack2

How to kick devices off your network using ARP spoofs

Gather sub domains from a domain using Sublist3r for penetration testing