Vulnerabilities of Small Office/Home Office routers
Ferenc Barta

Vulnerabilities of Small Office/Home Office routers

I'm quite sure that you have one of the small office/home office (SOHO) devices at home to share the Internet access for your computers, smartphones and IoT gadgets. These devices are really great, as they are capable of routing and address translation, they often have a built-in switch, an access point and a user-friendly web-based management interface.  In summary, they meet the requirements of home networking for an affordable price. Unfortunately, researchers and hackers often find serious vulnerabilities in these consumer-grade devices. Recently we have contacted several I...
Read more
The most common CMS attack types
Daniel Mecsei

The most common CMS attack types

Nowadays, the Internet plays a huge part in our lives. It gets bigger and bigger every day, now it has more than one billion websites. Most of these sites are built with CMS which stands for Content Management System. It is a tool that provides an easy-to-use method for users without any programming skills in creating websites. The most common CMSs are written in PHP because most shared-hosting providers only provide this way to share/operate your website with the community. According to the statistics, WordPress has the largest market share with 52%, followed by Joomla with only 6%. The...
Read more
Heckin Funny Hacks
Dani Molnár

Heckin Funny Hacks

Dani Molnár
Hacking became a huge part of our lives, partly because of popular culture and partly because they can give us some serious headaches when they mess with our beloved computers.  Usually people see them as either harmful cyber-criminals or as freedom-fighters. But in this article we are talking about a third group of hackers, those who are just doing it for the “lolz”. These pranksters - whether we agree with their method or not – will definitely make you laugh! AC/DC Power Plant What do you get when you combine AC/DC’s Thunderstruck with several nuclear research facilit...
Read more
Have you ever forgot the root password of your server?
Mariann Csorba

Have you ever forgot the root password of your server?

Mariann Csorba
We are all human beings and do not work like flawless creatures of artificial intelligence, we are prone to make mistakes and forget things. Although, sometimes we forget crucial information which might be essential to our daily life, like the root password of our server. For a sysadmin it can be a real disaster if s/he cannot log into the server. What can you do if this happens with you? Follow our easy step by step instructions, which will solve this matter.  Save this list and you will never have to stress about the lost or forgotten password again.      ...
Read more
WordPress, Curse or Blessing?
Mariann Csorba

WordPress, Curse or Blessing?

Mariann Csorba
WordPress is the most commonly used blog engine, which is free to use and has an open source code. It is used mainly for the operation of websites, blogs and webshops. If your purpose is to have a great website in a blink of an eye, which you are able to develop later in parallel with the change of unique demands, you have found the best solution. Why is it a blessing? As it gets more and more successful, the number of developers and supporters grow proportionately. They constantly look for bugs, vulnerabilities while they report and fix them. It is easy-to-use, so laymen can al...
Read more

Hydra: One of the most well-known bruteforce tools

Mariann Csorba
The Kali Linux is an open source code operational system which is based in Debian. In the system we can find several „penetration” applications, such as: Aircrack-ng Hydra Nmap Wireshark Metasplot framework Maltego Owasp-Zap SQLMap John Burpsuite Johnny Pyrit SIPcrack PWdump Rainbowcrack Maskgen Hexinject SSLSniff Dsniff In this article, I am going to tell you more about the Hydra’s operation and elaborate on how the BitNinja provides protection against it. Hydra works as a bruteforce program and it is one of the best password cracking tools in th...
Read more

How to build the most secure password of all times?

Nikoletta Szabo
Let’s start this article with a really simple simile, just to be on the safe side and make sure that everyone understands the function of a password. If your account is your home, the password is the key, while the login process is the threshold of your home. So if someone forgets the password, it equals with leaving the keys somewhere and if your account has been hacked, than your home has been sacked.       Two years ago in the USA, as much as 47% of the adult population’s account has been hacked and compromised. This is just one of the hard facts that sho...
Read more

How strong is a „strong” password? 1/2

Ferenc Barta
The idea   Authentication methods have gone through huge development in the past few years and I believe that the spread of IoT devices will bring further advancement. Currently, however, the most widely used authentication method on the Internet is password-based authentication and we know that this method is far from being ideal – at least in the way many people use it. Let’s imagine a website on which people can create accounts. The web application stores a non-decryptable hash (or more precisely the output of a hash function) of the password given by the user. A hash funct...
Read more

How bots rule the Internet – and your performance

Bots have been on the Internet for a really long time. Maybe you weren’t even born, when the first one was programmed to automate a task or pretend to be a real person. During the time, their role became more and more important. They are the majority of the internet by now. According to the latest studies, the traffic of a random website shows 56% bot traffic and only 44% human traffic. Have you ever thought  about this? Good bots – Bad bots Behind the scenes, bots hack, spam, scam, crawl and do whatever a human can do, on a bigger and automated scale. Good bots are l...
Read more