TCP based covert channel (ChorTCP)

While researching on data exfiltration techniques and covert channels, I thought of making one of my own, dubbed ChorTCP. Though protocol over protocol tunneling is a well known concept but I really wanted to actually try to hypothesize one aspect and then implement it, just for fun. The abstract below…

read more

Psychological Warfare

Human Beings are stupid by default ! Human Stupidity never fails to amaze any one. We do very very stupid things, unknowingly of-course. This article is about how hackers or any one can tap into the human mind and take advantage of it in every way possible, usually called exploitation….

read more

Cyber Deception

Cyber Deception has alot of meanings but in this context this means that  hackers start deceiving the government by creating Underground websites or Hackers news websites. These websites show that they are just finding updated news and posting it but  reality is actually somewhat different.You must have heard about the…

read more