Home » Author Archives: TheInnocent

Author Archives: TheInnocent

Tor anonymizers.jpg

How To Configure Tor Properly

Tor is a renowned must in the anonymity field, and the first fundamental step in your fight for privacy. You could think that the only thing that you need to hide your identity while surfing the web is to download the Tor browser bundle, but this is not enough. There are, in fact, wrong behaviours that can reveal your real ... Read More »

How To Test Your Website’s Security With An Intercepting Proxy

We all know cybersecurity threats grow each day and, in these times of increasing danger, it is of great importance to test your website’s security before burglars do. While even the most dull-witted system administrator is able to run a scan with Nmap or Nessus (though he could ignore the myriad of options these scanners offer), it results slightly more ... Read More »

Best Ways Of Converting Bitcoin To Physical Money

In these exciting days, the Bitcoin price grows higher every week, and people are investing an increasing amount of money into cryptocurrencies. An important aspect of the swinging trend of crypto-money, is the trading activity. In simple words, trading is buying bitcoins when their price is low and selling them when it’s higher. Posed these conditions, it becomes of capital ... Read More »

Wireshark Tutorial

The following tutorial is intended as a brief introduction to the most famous packet sniffer in the world, Wireshark. The most complete guide you can find, is the user-guide-wireshark.pdf, that counts 192 pages. Anyway if you don’t want to read all those pages, you can find few easier tutorials on the web. This is one of them, and it will ... Read More »

Cyber Threat Intelligence: Hunting Cyber Criminals

Cyber Security differs from CTI (Cyber Threat Intelligence). While the first deals with the technical aspects of protecting informatic systems and web applications, the second regards the intelligence applied to information, taking form in different ways like OSINT (Open Source Intelligence), HUMINT (Human Intelligence) and SOCMINT (Social Media Intelligence). The first important thing to understand what “cyber threat intelligence” means, ... Read More »

DDoS Attack Explained

DDoS means Distributed Denial of Service and it occurs when an attacker overwhelms a target, that is generally a server, with a load of traffic that the target cannot manage. DDoS is a special kind of DoS, Denial of Service attack, and it is important to notice the difference between them. A Dos, in fact, involves a single machine trying ... Read More »

Malware Analysis Tools Explained

When it comes to malware infections, you can never get comfortable with your own system and paranoia is your best friend, as we can observe in the second episode of the third season of Mr Robot, when Elliot uses rkhunter to control if a malware has been installed on his computer. In this article we’ll see that is possible to ... Read More »

Risks Of The Double Spending Attack

You may not know that Bitcoin is not the first digital coin project in history. Before it, other ideas were developed in order to create a digital currency but they all failed due to a very serious security issue that developers were not able to solve. Just to use simple words, when you spend your banknotes, you have to physically ... Read More »

The Art Of Google Hacking

When it comes to Google, everyone feels confident in knowing what we’re talking about. Google is that nice site that allows us to search whatever we want on the web. More technically, it’s a search engine, something that knows our preferences, our tastes and even (sometimes) our secrets. Google is easy, isn’t it? It appears as a blank page with ... Read More »

How Hackers Avoid Honeypots

  Honeypots are networks, servers or web applications purposely built to appear vulnerable, thus showing obsolete operating systems and software, open services and ports, in order to attract malign visitors and induce them to try exploiting the system. While in a preceding tutorial I explained how to build your own honeypot, here I will explain how hackers try to avoid ... Read More »

How To Setup Your Own Pentest Lab

Are you an aspiring penetration tester, or a wannabe hacker? You started from the basics, querying google with a few simple words: hacking, hacker, how to be a hacker…then you found a lot of stupid tutorials that taught you how to hack your neighbour’s wpa with a network adapter called alfa awus036h (but didn’t work, did it ?) and finally ... Read More »

How To Setup Your Own Honeypot?

A honeypot is a system designed to appear vulnerable to attackers. The goal of a honeypot is to log all the attackers’ activities to study their behaviour, log their Ips, track their location, collect zero-days. The idea of “honeypot” is nothing but a server that offers any kind of services to the attacker, from SSH to telnet, showing several well ... Read More »

Malicious Websites Explained

Surfing the web you will have heard about the existence of malicious websites. Virustotal is a well known website that helps you to discover which site is malicious and which is not before actually requesting the suspected URL in your browser. But what does it mean that a website is classified as “malicious”? What actions do these sites perform and ... Read More »

Phishing: Tactics And Tools Explained

Phishing (password harvesting fishing) is one of the most effective technique that hackers use to steal your credentials. Phishing is a mix of social engineering and computer skills that consists of pretending to be a reputable organization asking you to do a certain security procedure; this procedure involves changing your password or revealing your bank credentials. The innocent user is ... Read More »


  Since 2006, security researchers have been watching a new technique used in cybercrime to hide malicious traffic behind an intricate network of proxies. This technique called fast-flux, was initially used by few people but lead to thousands of personal computers infected and criminal content like phishing sites and malwares successfully delivered to innocent users. Fast-flux networks are today the ... Read More »