blackhat.pm Archive

Where do you get your stock photos from ?

One of the most important things when writing an article represents choosing the right image, but you can’t have images for all can you? So if you don’t have images for all articles then where do you get images? Well one choice would be to get a paid subscription from some stock sites, but that

Who uses cracked WinRAR ?

I kept seeing a lot of posts here and there throughout time across the p2p networks with cracked versions of WinRAR. These cracked versions contained basically a registry key and by the looks of it after all these years the developers behind WinRAR didn’t bother changing the algorithm to make the crack more difficult. And

Most people don’t really care

While reading an article on Ars Technica about the fact that 20 hotel chains were hacked and credit card data was exposed I remembered about a local case I came across a while back with a small rural hotel where the reservation system was using an old PHP form to submit the reservation data via

Public geolocation is a threat

I wrote an article a while back on Securitate Informatica [RO] detailing how the exif data of a picture taken with a mobile device could expose the location and other sensitive data about someone and most importantly how risky all this information actually is. Unfortunately, these claims I made back then were proven justified as

The density of connected devices

An imgur user created a map of all the devices connected to the internet by sending an ICMP Echo request, collecting the responses and mapping the active IPs using Python and here it is: The mind behind this map and the idea to make it is John Matherly, founder of the Shodan search engine and I must