3 minHack to Spy: Building a Raspberry Spy Pi, Part 3In my previous two posts in this series, I showed you how to set up a Raspberry Pi to be a spy device and then showed you how to use the...
3 minWeb App Hacking: Getting Started with OWASP-ZAPWeb apps are often the best vector to an organization's server/database, an entry point to their entire internal network. By definition,...
2 minDigital Forensics, Part 4: Finding Key Evidence in the Forensic ImageIn the previous articles in this series, we captured an forensic image of the suspect's hard drive, we captured a forensic image of the...
3 minSCADA Hacking: Testing and Monitoring our SCADA HoneyPotIn the previous article in this series, we built a sophisticated, low-interaction SCADA honeypot with conpot. In this article, we will...