Adéla HaníkováAug. 8, 2019
[-]

SMB Relay

What is the most common attack in the internal network that really works? What does it look like, what’s causing it and how can you defend yourself? This article will answer these questions. First, we will show the attack in practice and then we will discuss some technical details in the following paragraphs. Finally, we will add a few tips on how to defend against this type of attack.

Martin MusilAug. 7, 2019
[-]

Google Smart Lock - Trusted Face

At present, new frameless mobile phones offer biometric authentication with face recognition and it became very popular among users. But is this method secure and applicable in all circumstances? In our hacking lab, we took a good look at Google solution allowing usage of this modern authentication method even on cheap mobile devices.

Martin FojtíkAug. 2, 2019
[-]

The Man Who Sold the Eiffel Tower

There is no better place to start than with the most famous con artist in history, Viktor Lustig. Although Viktor Lustig was a con man for most of his life, he became famous mainly for his scam in which he "sold" the Eiffel Tower. Let's take a closer look at how this scam, unimaginable in our times, was carried out

Jan KislingerJuly 31, 2019
[-]

Wiretapping

How easy is eavesdropping on network traffic between two computers? Would it be enough to simply cut and split the network cable? Wiretapping is a way to connect to a network cable and start eavesdropping. During eavesdropping, the original communication is "copied" to the attacker's eavesdropping device. The transmitted data is not modified in any way.

Pavel RichtarikJuly 29, 2019
[-]

Analysing Suspicious File "Outstanding Payment.jar" - Part 1

Is antivirus a 100% protection against malicious files? What techniques are used by authors of malware to avoid detection? A series of articles describes our procedure during the static analysis of a suspicious Java file and reveals interesting findings about its structure as well as about the process of analysis as such.