4 minNetwork Forensics, Part 1Welcome back, my hacker apprentices! Network forensics is key element of most digital forensics and incident response (DFIR)...
4 minWeb App Hacking, Part 10: Directory or Path TraversalWelcome back, my novice hackers! In this series on Web App Hacking, we are examining multiple ways to hack web sites and web...
3 minMetasploit Basics, Part 18: Marrying the Power of Shodan with MetasploitWelcome back my rookie hackers! Every so often, I run across a new hacking tool that really gets me excited. Autosploit is one of those!...
4 minHow to Evade Detection with proxychainsThe worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or...