Please turn JavaScript on
HACKLIDO icon

HACKLIDO

Following HACKLIDO's news feed is very easy. Subscribe using the "follow" button on the top right and if you want to, choose the updates by topic or tag.

We will deliver them to your inbox, your phone, or you can use follow.it like your own online RSS reader. You can unsubscribe whenever you want with one click.

Keep up to date with HACKLIDO!

HACKLIDO: HACKLIDO

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  1.13 / day

Message History

Phishing with Modlishka Reverse HTTP Proxy

This lab shows how to setup a reverse HTTP proxy Modlishka that can be used in phishing campaigns to steal user passwords and 2FA tokens. Modlishka makes this possible, because it sits in the middle between the website you as an attacker are impersonating and the victim (MITM) while recording all the traffic/tokens/passwor...


Read full story

Hello Peeps…
It’s been a very long time, I haven’t posted any blogs because I’m busy doing nothing.

From now onwards, I will post blogs daily.
Hoping so.

Today, we are going to learn about the PyRIT Tool.

Artificial Intelligence is evolving faster and so are AI attacks.
From prompt injection to jailbreaks and indirect prompt manipulation, s...


Read full story

Not all cyber attacks are loud.

Some don’t crash systems.
Some don’t trigger alerts.
Some don’t even leave obvious traces.

They quietly run in the background…
collecting data, moving across systems, and staying hidden.

So how do organizations detect something that doesn’t want to be seen?

That’s where SIEM systems<...


Read full story

For a long time, cyber attacks were mostly about stealing data or disrupting systems.

But in 2010, something different happened.

A piece of malware didn’t just affect computers…
it physically damaged real-world infrastructure.

This attack was known as Stuxnet.

And it changed how the world sees cybe...


Read full story


When people think about malware, they usually imagine a file: something you can scan, detect, and delete.

But what if there was no file at all?

No suspicious download.
No obvious program.
Nothing stored on the disk.

And yet… the system is compromised.

This is the world of fileless malware.

What is Fileless Mal...

Read full story