Welcome to the community of ethical hackers.

We test the security of modern technologies.

Hacking Lab
Services

In our offer of services you will find a wide range of penetration tests and also specialized services, such as ATM hacking, Red Teaming or social engineering tests.

IoT Testing

Get your smart devices tested and get ahead of the competition. If a vulnerability is found, you will receive a detailed report with a description and a proposal for measures that will lead to the removal of the identified security threats.

Articles

DEVICE SECURITY
Audit ATM – Replay Attack

ATMs have been an integral part of our lives for several decades now. But is the money really safe?

APPLICATION SECURITY
PEnetration TEsting Proxy (PETEP)

Capturing network communication based on the TCP protocol and modifying it by creating a specialized Man-in-the-Middle proxy is one of many practices used for searching for security flaws in network applications. In this article, we will focus on the use of the cross-platform open-source application PETEP for testing fat clients using TCP protocols and show a simplified attack procedure on …

SOCIAL ENGINEERING
Bash Bunny – Guide

In this article, we will discuss detail a very interesting device called Bash Bunny in detail. Let’s take a look at how to obtain, configure, write your own custom payloads, and use the Bash Bunny to launch effective attacks.

REVERSE ENGINEERING
Analysing Suspicious File "Outstanding Payment.jar" - Part 3

What is the actual functional equipment of the malware under investigation, and what options does it offer to the attacker if successfully implemented? If there is an infection, is it enough to delete one file or is a complete system reinstallation required? The final part of the three articles on the analysis of a suspicious Java file discusses the very …

REVERSE ENGINEERING
Analysing Suspicious File "Outstanding Payment.jar" - Part 2

How to use static analysis for cracking the encryption used by the author of the malware, and what information can be revealed about the author? The second part of an article on the analysis of a suspicious Java file out …

WIRELESS SECURITY
Compromising Domain Accounts by Exploiting the Wi-Fi Network

Can it be easy to compromise domain accounts of users in an enterprise by exploiting the Wi-Fi connection to the internal network? If the devices are not configured correctly, it really can be a relatively simple task. In this article, we will take a look at different ways of compromising these networks, configuring the correct settings, and the differences in …

SOCIAL ENGINEERING
The Man Who Sold the Eiffel Tower

There is no better place to start than with the most famous con artist in history, Viktor Lustig. Although Viktor Lustig was a con man for most of his life, he became famous mainly for his scam in which he …

RED TEAMING
Red Teaming – Red Vs. Blue, Evolution in Penetration Testing

Is Red Teaming the next generation of penetration testing? Is it a replacement or an add-on to penetration testing? Is this an evolution? Let’s draw a clear comparison of these two services and then an explanation what Red Teaming really is and what methodologies can be used to formalize it.

DEVICE SECURITY
Wiretapping

How easy is eavesdropping on network traffic between two computers? Would it be enough to simply cut and split the network cable? Wiretapping is a way to connect to a network cable and start eavesdropping. During eavesdropping, the original communication …

REVERSE ENGINEERING
Analysing Suspicious File "Outstanding Payment.jar" - Part 1

Is antivirus a 100% protection against malicious files? What techniques are used by authors of malware to avoid detection? A series of articles describes our procedure during the static analysis of a suspicious Java file and reveals interesting findings about its structure as well as about the process of analysis as such.

Teams & Hackers

HackingLab

Choose team

Choose hacker

HackingLab

Choose team

Choose hacker